ntrust.live Open in urlscan Pro
13.214.211.66  Public Scan

URL: https://ntrust.live/
Submission: On August 04 via api from US — Scanned from SG

Form analysis 2 forms found in the DOM

GET https://www.google.com/cse

<form action="https://www.google.com/cse" id="searchform" method="get"><input autocomplete="off" id="s" name="q" placeholder="Search Here..." type="text">
  <input name="cx" type="hidden" value="partner-pub-7983783048239650:3179771210">
</form>

Name: f1POST https://inl02.netline.com/rssnews0001/

<form action="https://inl02.netline.com/rssnews0001/" class="clear cf" id="subform" method="post" name="f1" target="_blank">
  <div class="email-box-h3">Get Latest News in Your Inbox!</div>
  <p>Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free.</p>
  <div class="email-input">
    <input name="_submit" type="hidden" value="0001">
    <input id="brand" name="brand" type="hidden" value="thehackernews">
    <div class="e-book"><input checked="yes" id="opt_001" name="opt_001" type="checkbox" value="Y"><input checked="yes" id="opt_003" name="opt_003" type="checkbox" value="Y"></div><label class="visuallyhidden" for="input-email">Email</label><input
      class="text" id="input-email" name="email" placeholder="Your e-mail address" required="" type="email">
    <button aria-label="Subscribe" id="submitform" type="submit" value="Subscribe"></button>
  </div>
</form>

Text Content

Don't Get Pwnu#$^bf%Gzk[9J1{o

Followed by 4.50+ million  


 Subscribe – Get Latest News
 *  Home
 *  Newsletter
 *  Webinars

 * Home
 * Data Breaches
 * Cyber Attacks
 * Vulnerabilities
 * Webinars
 * Store
 * Contact





Resources
 * Webinars
 * THN Store
 * Free eBooks

About Site
 * About THN
 * Jobs
 * Advertise with us


Contact/Tip Us

Reach out to get featured—contact us to send your exclusive story idea,
research, hacks, or ask us a question or leave a comment/feedback!

Follow Us On Social Media
    
 RSS Feeds  Email Alerts  Telegram Channel



THE HACKER NEWS | #1 TRUSTED CYBERSECURITY NEWS SITE


DOJ AND FTC SUE TIKTOK FOR VIOLATING CHILDREN'S PRIVACY LAWS

Aug 03, 2024 Privacy / Data Protection
The U.S. Department of Justice (DoJ), along with the Federal Trade Commission
(FTC), filed a lawsuit against popular video-sharing platform TikTok for
"flagrantly violating" children's privacy laws in the country. The agencies
claimed the company knowingly permitted children to create TikTok accounts and
to view and share short-form videos and messages with adults and others on the
service. They also accused it of illegally collecting and retaining a wide
variety of personal information from these children without notifying or
obtaining consent from their parents, in contravention of the Children's Online
Privacy Protection Act (COPPA). TikTok's practices also infringed a 2019 consent
order between the company and the government in which it pledged to notify
parents before collecting children's data and remove videos from users under 13
years old, they added. COPPA requires online platforms to gather, use, or
disclose personal information from children unde


THE ESSENTIAL GUIDE TO SECURE WORKFLOW AUTOMATION FOR SECURITY TEAMS

TinesCyber Security / Workflow Automation
Learn how secure workflow automation (including AI-powered) could help solve
your team's biggest challenges.


HACKERS EXPLOIT MISCONFIGURED JUPYTER NOTEBOOKS WITH REPURPOSED MINECRAFT DDOS
TOOL

Aug 03, 2024 DDoS Attack / Server Security
Cybersecurity researchers have disclosed details of a new distributed
denial-of-service (DDoS) attack campaign targeting misconfigured Jupyter
Notebooks. The activity, codenamed Panamorfi by cloud security firm Aqua,
utilizes a Java-based tool called mineping to launch a TCP flood DDoS attack.
Mineping is a DDoS package designed for Minecraft game servers. Attack chains
entail the exploitation of internet-exposed Jupyter Notebook instances to run
wget commands for fetching a ZIP archive hosted on a file-sharing site called
Filebin. The ZIP file contains two Java archive (JAR) files, conn.jar and
mineping.jar, with the former used to establish connections to a Discord channel
and trigger the execution of the mineping.jar package. "This attack aims to
consume the resources of the target server by sending a large number of TCP
connection requests," Aqua researcher Assaf Morag said . "The results are
written to the Discord channel." The attack campaign has bee


APT41 HACKERS USE SHADOWPAD, COBALT STRIKE IN TAIWANESE INSTITUTE CYBER ATTACK

Aug 02, 2024 Cyber Espionage / Malware
A Taiwanese government-affiliated research institute that specializes in
computing and associated technologies was breached by nation-state threat actors
with ties to China, according to new findings from Cisco Talos. The unnamed
organization was targeted as early as mid-July 2023 to deliver a variety of
backdoors and post-compromise tools like ShadowPad and Cobalt Strike. It has
been attributed with medium confidence to a prolific hacking group tracked as
APT41 . "The ShadowPad malware used in the current campaign exploited an
outdated vulnerable version of Microsoft Office IME binary as a loader to load
the customized second-stage loader for launching the payload," security
researchers Joey Chen, Ashley Shen, and Vitor Ventura said . "The threat actor
compromised three hosts in the targeted environment and was able to exfiltrate
some documents from the network." Cisco Talos said it discovered the activity in
August 2023 after detecting what it described we


APT28 TARGETS DIPLOMATS WITH HEADLACE MALWARE VIA CAR SALE PHISHING LURE

Aug 02, 2024 Cyber Espionage / Malware
A Russia-linked threat actor has been linked to a new campaign that employed a
car for sale as a phishing lure to deliver a modular Windows backdoor called
HeadLace . "The campaign likely targeted diplomats and began as early as March
2024," Palo Alto Networks Unit 42 said in a report published today, attributing
it with medium to high level of confidence to APT28 , which is also referred to
as BlueDelta, Fancy Bear, Fighting Ursa, Forest Blizzard, FROZENLAKE, Iron
Twilight, ITG05, Pawn Storm, Sednit, Sofacy, and TA422. It's worth noting that
car-for-sale phishing lure themes have been previously put to use by a different
Russian nation-state group called APT29 since July 2023, indicating that APT28
is repurposing successful tactics for its own campaigns. Earlier this May, the
threat actor was implicated in a series of campaigns targeting networks across
Europe with the HeadLace malware and credential-harvesting web pages. The
attacks are characterized by the


WEBINAR: DISCOVER THE ALL-IN-ONE CYBERSECURITY SOLUTION FOR SMBS

Aug 02, 2024
In today's digital battlefield, small and medium businesses (SMBs) face the same
cyber threats as large corporations, but with fewer resources. Managed service
providers (MSPs) are struggling to keep up with the demand for protection. If
your current cybersecurity strategy feels like a house of cards – a complex,
costly mess of different vendors and tools – it's time for a change. Introducing
the All-in-One Cybersecurity Platform Imagine having all the protection you need
in one place, with one easy-to-use interface. That's the power of an All-in-One
platform. Join our upcoming webinar to learn how MSPs and SMBs are using these
platforms to: Simplify: Reduce costs and complexity by consolidating your
security tools. Accelerate: Speed up threat response and focus on growing your
business. Scale: Expand your cybersecurity capabilities without breaking the
bank. Cynet experts will demonstrate how their All-in-One platform combines a
full suite of security featur


MIRAI BOTNET TARGETING OFBIZ SERVERS VULNERABLE TO DIRECTORY TRAVERSAL

Aug 02, 2024 Vulnerability / Network Security
Enterprise Resource Planning (ERP) Software is at the heart of many enterprising
supporting human resources, accounting, shipping, and manufacturing. These
systems can become very complex and difficult to maintain. They are often highly
customized, which can make patching difficult. However, critical vulnerabilities
keep affecting these systems and put critical business data at risk.  The SANS
Internet Storm Center published a report showing how the open-source ERP
framework OFBiz is currently the target of new varieties of the Mirai botnet. As
part of its extensive project portfolio, the Apache Foundation supports OFBiz ,
a Java-based framework for creating ERP (Enterprise Resource Planning)
applications. OFBiz appears to be far less prevalent than commercial
alternatives. However, just as with any other ERP system, organizations rely on
it for sensitive business data, and the security of these ERP systems is
critical. In May this year, a critical security update was released f


WEBINAR: SECURING THE MODERN WORKSPACE: WHAT ENTERPRISES MUST KNOW ABOUT
ENTERPRISE BROWSER SECURITY

Jul 25, 2024Browser Security / Enterprise Security
The browser is the nerve center of the modern workspace. Ironically, however,
the browser is also one of the least protected threat surfaces of the modern
enterprise. Traditional security tools provide little protection against
browser-based threats, leaving organizations exposed. Modern cybersecurity
requires a new approach based on the protection of the browser itself, which
offers both security and frictionless deployment.  In an upcoming live webinar (
Register here ), Or Eshed, CEO of browser security company LayerX, and
Christopher Smedberg, Director of Cybersecurity at Advance Publishing, will
discuss the challenges facing modern enterprise in the new hybrid-work world,
the gaps found in existing security solutions, and a new approach to securing
the modern enterprise workspace, which is centered on the browser. The Browser
is Where Work Takes Place The browser is the key to the organization's critical
assets. It connects all organizational devices, identities, and SaaS and


NEW WINDOWS BACKDOOR BITSLOTH EXPLOITS BITS FOR STEALTHY COMMUNICATION

Aug 02, 2024 Cyber Attack / Windows Security
Cybersecurity researchers have discovered a previously undocumented Windows
backdoor that leverages a built-in feature called Background Intelligent
Transfer Service ( BITS ) as a command-and-control (C2) mechanism. The newly
identified malware strain has been codenamed BITSLOTH by Elastic Security Labs,
which made the discovery on June 25, 2024, in connection with a cyber attack
targeting an unspecified Foreign Ministry of a South American government. The
activity cluster is being tracked under the moniker REF8747. "The most current
iteration of the backdoor at the time of this publication has 35 handler
functions including keylogging and screen capture capabilities," security
researchers Seth Goodwin and Daniel Stepanic said . "In addition, BITSLOTH
contains many different features for discovery, enumeration, and command-line
execution." It's assessed that the tool – in development since December 2021 –
is being used by the threat actors for data gatheri


U.S. RELEASES HIGH-PROFILE RUSSIAN HACKERS IN DIPLOMATIC PRISONER EXCHANGE

Aug 02, 2024 Cyber Crime / Hacking News
In a historic prisoner exchange between Belarus, Germany, Norway, Russia,
Slovenia, and the U.S., two Russian nationals serving time for cybercrime
activities have been freed and repatriated to their country. This includes Roman
Valerevich Seleznev and Vladislav Klyushin, who are part of a group of eight
people who have been swapped back to Russia in exchange for the release of 16
people who were held in detention, counting four Americans, five Germans and
seven Russians citizens who were held as political prisoners. U.S. President Joe
Biden called the deal a "feat of diplomacy," adding "some of these women and men
have been unjustly held for years." Other nations that played a role in the swap
include Poland and Turkey. Among those released from Russia are former U.S.
Marine Paul Whelan, Wall Street Journal reporter Evan Gershkovich , Vladimir
Kara-Murza, a green-card holder and a prominent critic of Russian president
Vladimir Putin, and Russian-American jour


CYBERCRIMINALS ABUSING CLOUDFLARE TUNNELS TO EVADE DETECTION AND SPREAD MALWARE

Aug 02, 2024 Malware / Network Security
Cybersecurity companies are warning about an uptick in the abuse of Clouflare's
TryCloudflare free service for malware delivery. The activity, documented by
both eSentire and Proofpoint , entails the use of TryCloudflare to create a
rate-limited tunnel that acts as a conduit to relay traffic from an
attacker-controlled server to a local machine through Cloudflare's
infrastructure. Attack chains taking advantage of this technique have been
observed delivering a cocktail of malware families such as AsyncRAT, GuLoader,
PureLogs Stealer, Remcos RAT, Venom RAT, and XWorm. The initial access vector is
a phishing email containing a ZIP archive, which includes a URL shortcut file
that leads the message recipient to a Windows shortcut file hosted on a
TryCloudflare-proxied WebDAV server. The shortcut file, in turn, executes
next-stage batch scripts responsible for retrieving and executing additional
Python payloads, while simultaneously displaying a decoy PDF document hosted on
Next Page 

Trending News
Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing
Emails
Offensive AI: The Sine Qua Non of Cybersecurity
New Android Banking Trojan BingoMod Steals Money, Wipes Devices
VMware ESXi Flaw Exploited by Ransomware Groups for Admin Access
Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild
DigiCert to Revoke 83,000+ SSL Certificates Due to Domain Validation Oversight
New Mandrake Spyware Found in Google Play Store Apps After Two Years
Over 1 Million Domains at Risk of 'Sitting Ducks' Domain Hijacking Technique
APT41 Hackers Use ShadowPad, Cobalt Strike in Taiwanese Institute Cyber Attack
Popular Resources
New Strategies for CISOs: Download This Guide to Risk Reporting
Discover the Top SaaS Security Threats – and the Tools You Need
SaaS Security: Learn the Latest Attack Techniques and Defenses
Get a Demo to Uncover SaaS Weaknesses Before Hackers Do
Expert Insights


LEVERAGING AI AS A TOOL IN THREAT MANAGEMENT

July 21, 2024 Read ➝


7 RESOURCES TO INFORM YOUR NEXT HUNT FOR MALICIOUS INFRASTRUCTURE

July 15, 2024 Read ➝


EXPLOITABILITY IS THE MISSING PUZZLE PIECE OF SCA (SOFTWARE COMPOSITION
ANALYSIS)

June 10, 2024 Read ➝


9 CUSTOMER SERVICE CHATBOTS RANKED FOR RISK EXPOSURE

July 08, 2024 Read ➝
Cybersecurity Resources
Learn How to Improve Device Security with Partitioning
This free ebook leads you through partitioning MCU software, then imposing
limits on what hackers can do from inside partitions.
Intel Innovation 2024: Accelerating the Future Together
Join us September 24-25 in San Jose, CA, and discover how Intel technology is
unleashing AI's potential and empowering developers.
The State of Threat Exposure Management
Understand top attack strategies and how adversaries jump laterally to attain
domain access.
Want To Excel as a Cybersecurity Professional?
Develop cybersecurity strategies that increase security with Georgetown.

Get Latest News in Your Inbox!

Get the latest news, expert insights, exclusive resources, and strategies from
industry leaders – all for free.


Email

Connect with us!

920,000 Followers

575,000 Followers

22,200 Subscribers

147,000 Followers

1,880,000 Followers

125,000 Subscribers
Company
 * About THN
 * Advertise with us
 * Contact

Pages
 * Webinars
 * Deals Store
 * Privacy Policy

Deals
 * Hacking
 * Development
 * Android

 RSS Feeds
 Contact Us
© The Hacker News, 2024. All Rights Reserved.