dev.akitari.ru
Open in
urlscan Pro
188.134.81.22
Public Scan
URL:
https://dev.akitari.ru/
Submission: On July 20 via api from US — Scanned from US
Submission: On July 20 via api from US — Scanned from US
Form analysis
2 forms found in the DOMGET https://www.google.com/cse
<form action="https://www.google.com/cse" id="searchform" method="get"><input autocomplete="off" id="s" name="q" placeholder="Search Here..." type="text">
<input name="cx" type="hidden" value="partner-pub-7983783048239650:3179771210">
</form>
Name: f1 — POST https://inl02.netline.com/rssnews0001/
<form action="https://inl02.netline.com/rssnews0001/" class="clear cf" id="subform" method="post" name="f1" target="_blank">
<div class="email-box-h3">Get Latest News in Your Inbox!</div>
<p>Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free.</p>
<div class="email-input">
<input name="_submit" type="hidden" value="0001">
<input id="brand" name="brand" type="hidden" value="thehackernews">
<div class="e-book"><input checked="yes" id="opt_001" name="opt_001" type="checkbox" value="Y"><input checked="yes" id="opt_003" name="opt_003" type="checkbox" value="Y"></div><label class="visuallyhidden" for="input-email">Email</label><input
class="text" id="input-email" name="email" placeholder="Your e-mail address" required="" type="email">
<button aria-label="Subscribe" id="submitform" type="submit" value="Subscribe"></button>
</div>
</form>
Text Content
#1 Trusted Cybersecurity News Platform Followed by 4.50+ million Subscribe – Get Latest News * Home * Newsletter * Webinars * Home * Data Breaches * Cyber Attacks * Vulnerabilities * Webinars * Store * Contact Resources * Webinars * THN Store * Free eBooks About Site * About THN * Jobs * Advertise with us Contact/Tip Us Reach out to get featured—contact us to send your exclusive story idea, research, hacks, or ask us a question or leave a comment/feedback! Follow Us On Social Media RSS Feeds Email Alerts Telegram Channel THE HACKER NEWS | #1 TRUSTED CYBERSECURITY NEWS SITE 17-YEAR-OLD LINKED TO SCATTERED SPIDER CYBERCRIME SYNDICATE ARRESTED IN U.K. Jul 20, 2024 Cybercrime / Data Breach Law enforcement officials in the U.K. have arrested a 17-year-old boy from Walsall who is suspected to be a member of the notorious Scattered Spider cybercrime syndicate. The arrest was made "in connection with a global cyber online crime group which has been targeting large organizations with ransomware and gaining access to computer networks," West Midlands police said . "The arrest is part of a global investigation into a large-scale cyber hacking community which has targeted a number of major companies which includes MGM Resorts in America." The teen's arrest, carried out in coordination with the U.K. National Crime Agency (NCA) and the U.S. Federal Bureau of Investigation (FBI), comes a little over a month after another 22-year-old member of the e-crime syndicate from the U.K. was apprehended in Spain. Scattered Spider, an offshoot of a loose-knit group called The Com, has evolved into an initial access broker and affiliate, delivering ransomware fa FAULTY CROWDSTRIKE UPDATE CRASHES WINDOWS SYSTEMS, IMPACTING BUSINESSES WORLDWIDE Jul 19, 2024 Businesses across the world have been hit by widespread disruptions to their Windows workstations stemming from a faulty update pushed out by cybersecurity company CrowdStrike. "CrowdStrike is actively working with customers impacted by a defect found in a single content update for Windows hosts," the company's CEO George Kurtz said in a statement . "Mac and Linux hosts are not impacted. This is not a security incident or cyber attack." The company, which acknowledged "reports of [ Blue Screens of Death ] on Windows hosts," further said it has identified the issue and a fix has been deployed for its Falcon Sensor product, urging customers to refer to the support portal for the latest updates. For systems that have been already impacted by the problem, the mitigation instructions are listed below - Boot Windows in Safe Mode or Windows Recovery Environment Navigate to the C:\Windows\System32\drivers\CrowdStrike directory Find the file named &qu TOP 4 SECURITY RISKS OF GENAI WizGenAI Security / Technology Gain a competitive edge and unlock the top 4 major emerging risks within GenAI. This report from Gartner provides insights and recommended actions for security and product leaders. TWO RUSSIAN NATIONALS PLEAD GUILTY IN LOCKBIT RANSOMWARE ATTACKS Jul 19, 2024 Ransomware / Cybercrime Two Russian nationals have pleaded guilty in a U.S. court for their participation as affiliates in the LockBit ransomware scheme and helping facilitate ransomware attacks across the world. The defendants include Ruslan Magomedovich Astamirov, 21, of Chechen Republic, and Mikhail Vasiliev, 34, a dual Canadian and Russian national of Bradford, Ontario. Astamirov was arrested in Arizona by U.S. law enforcement agencies in May 2023. Vasiliev, who is already wanted for similar charges in Canada, was sentenced to nearly four years in jail. He was subsequently extradited to the U.S. last month. The development comes more than two months after the U.K. National Crime Agency (NCA) unmasked a 31-year-old Russian national named Dmitry Yuryevich Khoroshev as the administrator and developer of the LockBit ransomware operation. LockBit, which is estimated to have attacked over 2,500 entities since its appearance towards the end of 2019, raking in at least approximately $500 million in ranso SAFEGUARD PERSONAL AND CORPORATE IDENTITIES WITH IDENTITY INTELLIGENCE Jul 19, 2024 Machine Learning / Corporate Security Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill's threat experts. Each story shines a light on underground activities, the threat actors involved, and why you should care, along with what you can do to mitigate risk. In the current cyber threat landscape, the protection of personal and corporate identities has become vital. Once in the hands of cybercriminals, compromised credentials and accounts provide unauthorized access to corporations' sensitive information and an entry point to launch costly ransomware and other malware attacks. To properly mitigate threats stemming from compromised credentials and accounts, organizations need identity intelligence. Understanding the significance of identity intelligence and the benefits it delivers is foundational to maintaining a secure posture and minimizing risk. There is a perception that security teams and threat analysts are already overloaded by too much data. By these PRO-HOUTHI GROUP TARGETS YEMEN AID ORGANIZATIONS WITH ANDROID SPYWARE Jul 19, 2024 Malware / Mobile Security A suspected pro-Houthi threat group targeted at least three humanitarian organizations in Yemen with Android spyware designed to harvest sensitive information. These attacks, attributed to an activity cluster codenamed OilAlpha , entail a new set of malicious mobile apps that come with their own supporting infrastructure, Recorded Future's Insikt Group said . Targets of the ongoing campaign include, CARE International, the Norwegian Refugee Council (NRC), and the Saudi Arabian King Salman Humanitarian Aid and Relief Centre. "The OilAlpha threat group is highly likely active and executing targeted activity against humanitarian and human rights organizations operating in Yemen, and potentially throughout the Middle East," the cybersecurity company said. OilAlpha was first documented in May 2023 in connection with an espionage campaign targeting development, humanitarian, media, and non-governmental organizations in the Arabian peninsula. These attacks leveraged What APT41 INFILTRATES NETWORKS IN ITALY, SPAIN, TAIWAN, TURKEY, AND THE U.K. Jul 19, 2024 Cyber Espionage / Threat Intelligence Several organizations operating within global shipping and logistics, media and entertainment, technology, and automotive sectors in Italy, Spain, Taiwan, Thailand, Turkey, and the U.K. have become the target of a "sustained campaign" by the prolific China-based APT41 hacking group. "APT41 successfully infiltrated and maintained prolonged, unauthorized access to numerous victims' networks since 2023, enabling them to extract sensitive data over an extended period," Google-owned Mandiant said in a new report published Thursday. The threat intelligence firm described the adversarial collective as unique among China-nexus actors owing to its use of "non-public malware typically reserved for espionage operations in activities that appear to fall outside the scope of state-sponsored missions." Attack chains involve the use of web shells (ANTSWORD and BLUEBEAM), custom droppers (DUSTPAN and DUSTTRAP), and publicly available tools (SQLULDR2 and PINEGROV SUMMARY OF "AI LEADERS SPILL THEIR SECRETS" WEBINAR Jul 19, 2024 Technology / Artificial Intelligence Event Overview The " AI Leaders Spill Their Secrets " webinar, hosted by Sigma Computing, featured prominent AI experts sharing their experiences and strategies for success in the AI industry. The panel included Michael Ward from Sardine, Damon Bryan from Hyperfinity, and Stephen Hillian from Astronomer, moderated by Zalak Trivedi, Sigma Computing's Product Manager. Key Speakers and Their Backgrounds 1. Michael Ward Senior Risk Data Analyst at Sardine. Over 25 years of experience in software engineering. Focuses on data science, analytics, and machine learning to prevent fraud and money laundering. 2. Damon Bryan Co-founder and CTO at Hyperfinity. Specializes in decision intelligence software for retailers and brands. Background in data science, AI, and analytics, transitioning from consultancy to a full-fledged software company. 3. Stephen Hillian SVP of Data and AI at Astronomer. Manages data science teams and focuses on the development and scaling of 10,000 VICTIMS A DAY: INFOSTEALER GARDEN OF LOW-HANGING FRUIT Jul 15, 2024Cyber Crime / Data Protection Imagine you could gain access to any Fortune 100 company for $10 or less, or even for free. Terrifying thought, isn't it? Or exciting, depending on which side of the cybersecurity barricade you are on. Well, that's basically the state of things today. Welcome to the infostealer garden of low-hanging fruit. Over the last few years, the problem has grown bigger and bigger, and only now are we slowly learning its full destructive potential. In this article, we will describe how the entire cybercriminal ecosystem operates, the ways various threat actors exploit data originating from it, and most importantly, what you can do about it. Let's start with what infostealer malware actually is. As the name suggests, it's malware that... steals data. Depending on the specific type, the information it extracts might differ slightly, but most will try to extract the following: Cryptocurrency wallets Bank account information and saved credit card details Saved passwords from various apps Bro SOLARWINDS PATCHES 8 CRITICAL FLAWS IN ACCESS RIGHTS MANAGER SOFTWARE Jul 19, 2024 Vulnerability / Enterprise Security SolarWinds has addressed a set of critical security flaws impacting its Access Rights Manager (ARM) software that could be exploited to access sensitive information or execute arbitrary code. Of the 13 vulnerabilities, eight are rated Critical in severity and carry a CVSS score of 9.6 out of 10.0. The remaining five weaknesses have been rated High in severity, with four of them having a CVSS score of 7.6 and one scoring 8.3. The most severe of the flaws are listed below - CVE-2024-23472 - SolarWinds ARM Directory Traversal Arbitrary File Deletion and Information Disclosure Vulnerability CVE-2024-28074 - SolarWinds ARM Internal Deserialization Remote Code Execution Vulnerability CVE-2024-23469 - Solarwinds ARM Exposed Dangerous Method Remote Code Execution Vulnerability CVE-2024-23475 - Solarwinds ARM Traversal and Information Disclosure Vulnerability CVE-2024-23467 - Solarwinds ARM Traversal Remote Code Execution Vulnerability CVE-2024-23466 - Solarwinds ARM Directory WAZIRX CRYPTOCURRENCY EXCHANGE LOSES $230 MILLION IN MAJOR SECURITY BREACH Jul 19, 2024 Cryptocurrency / Cybercrime Indian cryptocurrency exchange WazirX has confirmed that it was the target of a security breach that led to the theft of $230 million in cryptocurrency assets. "A cyber attack occurred in one of our [multi-signature] wallets involving a loss of funds exceeding $230 million," the company said in a statement. "This wallet was operated utilizing the services of Liminal's digital asset custody and wallet infrastructure from February 2023." The Mumbai-based company said the attack stemmed from a mismatch between the information that was displayed on Liminal's interface and what was actually signed. It said the payload was replaced to transfer wallet control to an attacker. Crypto custody firm Liminal is one of the six signatories on the wallet and is responsible for transaction verifications. "Our preliminary investigations show that one of the self custody multi-sig smart contract wallets created outside of the Liminal ecosystem has been compromised Next Page Trending News Faulty CrowdStrike Update Crashes Windows Systems, Impacting Businesses Worldwide True Protection or False Promise? The Ultimate ITDR Shortlisting Guide AT&T Confirms Data Breach Affecting Nearly All Wireless Customers WazirX Cryptocurrency Exchange Loses $230 Million in Major Security Breach APT41 Infiltrates Networks in Italy, Spain, Taiwan, Turkey, and the U.K. Alert: HotPage Adware Disguised as Ad Blocker Installs Malicious Kernel Driver DarkGate Malware Exploits Samba File Shares in Short-Lived Campaign GitHub Token Leak Exposes Python's Core Repositories to Potential Attacks SAP AI Core Vulnerabilities Expose Customer Data to Cyber Attacks Popular Resources Audit Your Active Directory for Weak Passwords – Download This Free Tool Discover the Top SaaS Security Threats for 2024 – Read Latest Report Master Exposure Management: A Must-Have Skill for Cyber Experts Discover the Top 10 Cybersecurity Vulnerabilities Exposed by Experts Expert Insights 7 RESOURCES TO INFORM YOUR NEXT HUNT FOR MALICIOUS INFRASTRUCTURE July 15, 2024 Read ➝ EXPLOITABILITY IS THE MISSING PUZZLE PIECE OF SCA (SOFTWARE COMPOSITION ANALYSIS) June 10, 2024 Read ➝ 9 CUSTOMER SERVICE CHATBOTS RANKED FOR RISK EXPOSURE July 08, 2024 Read ➝ SECURING SAAS APPS IN THE ERA OF GENERATIVE AI July 6, 2024 Watch ➝ Cybersecurity Resources Essential Guide to Workflow Automation for Security Teams Discover how secure workflow automation could solve some of your team's biggest challenges. Unlocking DORA: Insights & Strategies for Financial Institutions Join experts from XM Cyber and KPMG to unravel DORA's complexities. Gain actionable insights on compliance, resilience, and cybersecurity strategies. Plus, receive an exclusive whitepaper! Register now. SMBs are left out of the network security conversation, but not by threat actors. Free guide for you: The IT Admins Guide to Evaluating Network Security Solutions. Earn a Master's in Cybersecurity Risk Management Lead the future of cybersecurity risk management with an online Master's from Georgetown. Get Latest News in Your Inbox! Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free. Email Connect with us! 920,000 Followers 575,000 Followers 22,200 Subscribers 147,000 Followers 1,880,000 Followers 125,000 Subscribers Company * About THN * Advertise with us * Contact Pages * Webinars * Deals Store * Privacy Policy Deals * Hacking * Development * Android RSS Feeds Contact Us © The Hacker News, 2024. All Rights Reserved.