ntrust.live
Open in
urlscan Pro
13.214.211.66
Public Scan
URL:
https://ntrust.live/
Submission: On August 04 via api from US — Scanned from SG
Submission: On August 04 via api from US — Scanned from SG
Form analysis
2 forms found in the DOMGET https://www.google.com/cse
<form action="https://www.google.com/cse" id="searchform" method="get"><input autocomplete="off" id="s" name="q" placeholder="Search Here..." type="text">
<input name="cx" type="hidden" value="partner-pub-7983783048239650:3179771210">
</form>
Name: f1 — POST https://inl02.netline.com/rssnews0001/
<form action="https://inl02.netline.com/rssnews0001/" class="clear cf" id="subform" method="post" name="f1" target="_blank">
<div class="email-box-h3">Get Latest News in Your Inbox!</div>
<p>Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free.</p>
<div class="email-input">
<input name="_submit" type="hidden" value="0001">
<input id="brand" name="brand" type="hidden" value="thehackernews">
<div class="e-book"><input checked="yes" id="opt_001" name="opt_001" type="checkbox" value="Y"><input checked="yes" id="opt_003" name="opt_003" type="checkbox" value="Y"></div><label class="visuallyhidden" for="input-email">Email</label><input
class="text" id="input-email" name="email" placeholder="Your e-mail address" required="" type="email">
<button aria-label="Subscribe" id="submitform" type="submit" value="Subscribe"></button>
</div>
</form>
Text Content
Don't Get Pwnu#$^bf%Gzk[9J1{o Followed by 4.50+ million Subscribe – Get Latest News * Home * Newsletter * Webinars * Home * Data Breaches * Cyber Attacks * Vulnerabilities * Webinars * Store * Contact Resources * Webinars * THN Store * Free eBooks About Site * About THN * Jobs * Advertise with us Contact/Tip Us Reach out to get featured—contact us to send your exclusive story idea, research, hacks, or ask us a question or leave a comment/feedback! Follow Us On Social Media RSS Feeds Email Alerts Telegram Channel THE HACKER NEWS | #1 TRUSTED CYBERSECURITY NEWS SITE DOJ AND FTC SUE TIKTOK FOR VIOLATING CHILDREN'S PRIVACY LAWS Aug 03, 2024 Privacy / Data Protection The U.S. Department of Justice (DoJ), along with the Federal Trade Commission (FTC), filed a lawsuit against popular video-sharing platform TikTok for "flagrantly violating" children's privacy laws in the country. The agencies claimed the company knowingly permitted children to create TikTok accounts and to view and share short-form videos and messages with adults and others on the service. They also accused it of illegally collecting and retaining a wide variety of personal information from these children without notifying or obtaining consent from their parents, in contravention of the Children's Online Privacy Protection Act (COPPA). TikTok's practices also infringed a 2019 consent order between the company and the government in which it pledged to notify parents before collecting children's data and remove videos from users under 13 years old, they added. COPPA requires online platforms to gather, use, or disclose personal information from children unde THE ESSENTIAL GUIDE TO SECURE WORKFLOW AUTOMATION FOR SECURITY TEAMS TinesCyber Security / Workflow Automation Learn how secure workflow automation (including AI-powered) could help solve your team's biggest challenges. HACKERS EXPLOIT MISCONFIGURED JUPYTER NOTEBOOKS WITH REPURPOSED MINECRAFT DDOS TOOL Aug 03, 2024 DDoS Attack / Server Security Cybersecurity researchers have disclosed details of a new distributed denial-of-service (DDoS) attack campaign targeting misconfigured Jupyter Notebooks. The activity, codenamed Panamorfi by cloud security firm Aqua, utilizes a Java-based tool called mineping to launch a TCP flood DDoS attack. Mineping is a DDoS package designed for Minecraft game servers. Attack chains entail the exploitation of internet-exposed Jupyter Notebook instances to run wget commands for fetching a ZIP archive hosted on a file-sharing site called Filebin. The ZIP file contains two Java archive (JAR) files, conn.jar and mineping.jar, with the former used to establish connections to a Discord channel and trigger the execution of the mineping.jar package. "This attack aims to consume the resources of the target server by sending a large number of TCP connection requests," Aqua researcher Assaf Morag said . "The results are written to the Discord channel." The attack campaign has bee APT41 HACKERS USE SHADOWPAD, COBALT STRIKE IN TAIWANESE INSTITUTE CYBER ATTACK Aug 02, 2024 Cyber Espionage / Malware A Taiwanese government-affiliated research institute that specializes in computing and associated technologies was breached by nation-state threat actors with ties to China, according to new findings from Cisco Talos. The unnamed organization was targeted as early as mid-July 2023 to deliver a variety of backdoors and post-compromise tools like ShadowPad and Cobalt Strike. It has been attributed with medium confidence to a prolific hacking group tracked as APT41 . "The ShadowPad malware used in the current campaign exploited an outdated vulnerable version of Microsoft Office IME binary as a loader to load the customized second-stage loader for launching the payload," security researchers Joey Chen, Ashley Shen, and Vitor Ventura said . "The threat actor compromised three hosts in the targeted environment and was able to exfiltrate some documents from the network." Cisco Talos said it discovered the activity in August 2023 after detecting what it described we APT28 TARGETS DIPLOMATS WITH HEADLACE MALWARE VIA CAR SALE PHISHING LURE Aug 02, 2024 Cyber Espionage / Malware A Russia-linked threat actor has been linked to a new campaign that employed a car for sale as a phishing lure to deliver a modular Windows backdoor called HeadLace . "The campaign likely targeted diplomats and began as early as March 2024," Palo Alto Networks Unit 42 said in a report published today, attributing it with medium to high level of confidence to APT28 , which is also referred to as BlueDelta, Fancy Bear, Fighting Ursa, Forest Blizzard, FROZENLAKE, Iron Twilight, ITG05, Pawn Storm, Sednit, Sofacy, and TA422. It's worth noting that car-for-sale phishing lure themes have been previously put to use by a different Russian nation-state group called APT29 since July 2023, indicating that APT28 is repurposing successful tactics for its own campaigns. Earlier this May, the threat actor was implicated in a series of campaigns targeting networks across Europe with the HeadLace malware and credential-harvesting web pages. The attacks are characterized by the WEBINAR: DISCOVER THE ALL-IN-ONE CYBERSECURITY SOLUTION FOR SMBS Aug 02, 2024 In today's digital battlefield, small and medium businesses (SMBs) face the same cyber threats as large corporations, but with fewer resources. Managed service providers (MSPs) are struggling to keep up with the demand for protection. If your current cybersecurity strategy feels like a house of cards – a complex, costly mess of different vendors and tools – it's time for a change. Introducing the All-in-One Cybersecurity Platform Imagine having all the protection you need in one place, with one easy-to-use interface. That's the power of an All-in-One platform. Join our upcoming webinar to learn how MSPs and SMBs are using these platforms to: Simplify: Reduce costs and complexity by consolidating your security tools. Accelerate: Speed up threat response and focus on growing your business. Scale: Expand your cybersecurity capabilities without breaking the bank. Cynet experts will demonstrate how their All-in-One platform combines a full suite of security featur MIRAI BOTNET TARGETING OFBIZ SERVERS VULNERABLE TO DIRECTORY TRAVERSAL Aug 02, 2024 Vulnerability / Network Security Enterprise Resource Planning (ERP) Software is at the heart of many enterprising supporting human resources, accounting, shipping, and manufacturing. These systems can become very complex and difficult to maintain. They are often highly customized, which can make patching difficult. However, critical vulnerabilities keep affecting these systems and put critical business data at risk. The SANS Internet Storm Center published a report showing how the open-source ERP framework OFBiz is currently the target of new varieties of the Mirai botnet. As part of its extensive project portfolio, the Apache Foundation supports OFBiz , a Java-based framework for creating ERP (Enterprise Resource Planning) applications. OFBiz appears to be far less prevalent than commercial alternatives. However, just as with any other ERP system, organizations rely on it for sensitive business data, and the security of these ERP systems is critical. In May this year, a critical security update was released f WEBINAR: SECURING THE MODERN WORKSPACE: WHAT ENTERPRISES MUST KNOW ABOUT ENTERPRISE BROWSER SECURITY Jul 25, 2024Browser Security / Enterprise Security The browser is the nerve center of the modern workspace. Ironically, however, the browser is also one of the least protected threat surfaces of the modern enterprise. Traditional security tools provide little protection against browser-based threats, leaving organizations exposed. Modern cybersecurity requires a new approach based on the protection of the browser itself, which offers both security and frictionless deployment. In an upcoming live webinar ( Register here ), Or Eshed, CEO of browser security company LayerX, and Christopher Smedberg, Director of Cybersecurity at Advance Publishing, will discuss the challenges facing modern enterprise in the new hybrid-work world, the gaps found in existing security solutions, and a new approach to securing the modern enterprise workspace, which is centered on the browser. The Browser is Where Work Takes Place The browser is the key to the organization's critical assets. It connects all organizational devices, identities, and SaaS and NEW WINDOWS BACKDOOR BITSLOTH EXPLOITS BITS FOR STEALTHY COMMUNICATION Aug 02, 2024 Cyber Attack / Windows Security Cybersecurity researchers have discovered a previously undocumented Windows backdoor that leverages a built-in feature called Background Intelligent Transfer Service ( BITS ) as a command-and-control (C2) mechanism. The newly identified malware strain has been codenamed BITSLOTH by Elastic Security Labs, which made the discovery on June 25, 2024, in connection with a cyber attack targeting an unspecified Foreign Ministry of a South American government. The activity cluster is being tracked under the moniker REF8747. "The most current iteration of the backdoor at the time of this publication has 35 handler functions including keylogging and screen capture capabilities," security researchers Seth Goodwin and Daniel Stepanic said . "In addition, BITSLOTH contains many different features for discovery, enumeration, and command-line execution." It's assessed that the tool – in development since December 2021 – is being used by the threat actors for data gatheri U.S. RELEASES HIGH-PROFILE RUSSIAN HACKERS IN DIPLOMATIC PRISONER EXCHANGE Aug 02, 2024 Cyber Crime / Hacking News In a historic prisoner exchange between Belarus, Germany, Norway, Russia, Slovenia, and the U.S., two Russian nationals serving time for cybercrime activities have been freed and repatriated to their country. This includes Roman Valerevich Seleznev and Vladislav Klyushin, who are part of a group of eight people who have been swapped back to Russia in exchange for the release of 16 people who were held in detention, counting four Americans, five Germans and seven Russians citizens who were held as political prisoners. U.S. President Joe Biden called the deal a "feat of diplomacy," adding "some of these women and men have been unjustly held for years." Other nations that played a role in the swap include Poland and Turkey. Among those released from Russia are former U.S. Marine Paul Whelan, Wall Street Journal reporter Evan Gershkovich , Vladimir Kara-Murza, a green-card holder and a prominent critic of Russian president Vladimir Putin, and Russian-American jour CYBERCRIMINALS ABUSING CLOUDFLARE TUNNELS TO EVADE DETECTION AND SPREAD MALWARE Aug 02, 2024 Malware / Network Security Cybersecurity companies are warning about an uptick in the abuse of Clouflare's TryCloudflare free service for malware delivery. The activity, documented by both eSentire and Proofpoint , entails the use of TryCloudflare to create a rate-limited tunnel that acts as a conduit to relay traffic from an attacker-controlled server to a local machine through Cloudflare's infrastructure. Attack chains taking advantage of this technique have been observed delivering a cocktail of malware families such as AsyncRAT, GuLoader, PureLogs Stealer, Remcos RAT, Venom RAT, and XWorm. The initial access vector is a phishing email containing a ZIP archive, which includes a URL shortcut file that leads the message recipient to a Windows shortcut file hosted on a TryCloudflare-proxied WebDAV server. The shortcut file, in turn, executes next-stage batch scripts responsible for retrieving and executing additional Python payloads, while simultaneously displaying a decoy PDF document hosted on Next Page Trending News Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails Offensive AI: The Sine Qua Non of Cybersecurity New Android Banking Trojan BingoMod Steals Money, Wipes Devices VMware ESXi Flaw Exploited by Ransomware Groups for Admin Access Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild DigiCert to Revoke 83,000+ SSL Certificates Due to Domain Validation Oversight New Mandrake Spyware Found in Google Play Store Apps After Two Years Over 1 Million Domains at Risk of 'Sitting Ducks' Domain Hijacking Technique APT41 Hackers Use ShadowPad, Cobalt Strike in Taiwanese Institute Cyber Attack Popular Resources New Strategies for CISOs: Download This Guide to Risk Reporting Discover the Top SaaS Security Threats – and the Tools You Need SaaS Security: Learn the Latest Attack Techniques and Defenses Get a Demo to Uncover SaaS Weaknesses Before Hackers Do Expert Insights LEVERAGING AI AS A TOOL IN THREAT MANAGEMENT July 21, 2024 Read ➝ 7 RESOURCES TO INFORM YOUR NEXT HUNT FOR MALICIOUS INFRASTRUCTURE July 15, 2024 Read ➝ EXPLOITABILITY IS THE MISSING PUZZLE PIECE OF SCA (SOFTWARE COMPOSITION ANALYSIS) June 10, 2024 Read ➝ 9 CUSTOMER SERVICE CHATBOTS RANKED FOR RISK EXPOSURE July 08, 2024 Read ➝ Cybersecurity Resources Learn How to Improve Device Security with Partitioning This free ebook leads you through partitioning MCU software, then imposing limits on what hackers can do from inside partitions. Intel Innovation 2024: Accelerating the Future Together Join us September 24-25 in San Jose, CA, and discover how Intel technology is unleashing AI's potential and empowering developers. The State of Threat Exposure Management Understand top attack strategies and how adversaries jump laterally to attain domain access. Want To Excel as a Cybersecurity Professional? Develop cybersecurity strategies that increase security with Georgetown. Get Latest News in Your Inbox! Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free. Email Connect with us! 920,000 Followers 575,000 Followers 22,200 Subscribers 147,000 Followers 1,880,000 Followers 125,000 Subscribers Company * About THN * Advertise with us * Contact Pages * Webinars * Deals Store * Privacy Policy Deals * Hacking * Development * Android RSS Feeds Contact Us © The Hacker News, 2024. All Rights Reserved.