Friday, February 18, 2022

US says Russian hackers have collected intelligence from American defense contractors - CNNPolitics

Washington (CNN) Russian government-backed hackers have acquired sensitive information on the development and deployment of US weapons by breaching American defense contractors over the last two years, US security agencies said in a public advisory on Wednesday.

Publisher: CNN
Date: 2022-02-16T17:08:41Z
Author: Sean Lyngaas CNN
Reference: (Read more) Visit Source



VMware Horizon servers are under active exploit by Iranian state hackers | Ars Technica

Hackers aligned with the government of Iran are exploiting the critical Log4j vulnerability to infect unpatched VMware users with ransomware, researchers said on Thursday.

Security firm SentinelOne has dubbed the group TunnelVision. The name is meant to emphasize TunnelVision's heavy reliance on tunneling tools and the unique way it deploys them.

Publisher: Ars Technica
Author:
Twitter: @arstechnica
Reference: (Read more) Visit Source



Hackers slip into Microsoft Teams chats to distribute malware

Security researchers warn that some attackers are compromising Microsoft Teams accounts to slip into chats and spread malicious executables to participants in the conversation.

More than 270 million users are relying on Microsoft Teams every month, many of them trusting the platform implicitly, despite the absence of protections against malicious files.

Publisher: BleepingComputer
Twitter: @BleepinComputer
Reference: (Read more) Visit Source



How Ethical Hacking Can Stop Hackers

You may have heard of ethical hacking or “white-hat” hacking. It’s an increasingly widely utilized way to help companies uncover vulnerabilities that hackers may exploit later.

Ethical hacking occurs when a person receives permission to attempt to break into an app or system or steal data. The individual mimics the efforts a malicious hacker would likely make. They then provide a report of identified vulnerabilities and suggested steps for remediation.

logo
Publisher: MUO
Date: 2022-02-16T17:00:13Z
Twitter: @MUO_official
Reference: (Read more) Visit Source



Devious hackers are using NFT hype to hijack your PC and webcam | ZDNet

Danny Palmer is a senior reporter at ZDNet. Based in London, he writes about issues including cybersecurity, hacking and malware threats.

BitRAT is a remote access trojan (RAT) that first emerged for sale in underground forums in August 2020. What makes it notable is it can bypass User Account Control (UAC), a Windows feature that helps to prevent unauthorised changes to the operating system.

logo
Publisher: ZDNet
Author: Danny Palmer
Twitter: @ZDNet
Reference: (Read more) Visit Source



Cardano Foundation Doubles Reward Offered to Hackers for Uncovering Bugs on Its Blockchain –

The Cardano Foundation recently said it has doubled the payout offered to hackers and bounty hunters that identify bugs or vulnerabilities within the Cardano blockchain.

The Cardano Foundation recently announced the start of a promotion that will see it double the value of the reward given to bounty hunters that discover vulnerabilities within the Cardano ecosystem.

logo
Publisher: Bitcoin News
Date: 2022-02-18T13:00:49 00:00
Twitter: @BTCTN
Reference: (Read more) Visit Source



No comments:

Post a Comment