dev.akitari.ru Open in urlscan Pro
188.134.81.22  Public Scan

URL: https://dev.akitari.ru/
Submission: On July 20 via api from US — Scanned from US

Form analysis 2 forms found in the DOM

GET https://www.google.com/cse

<form action="https://www.google.com/cse" id="searchform" method="get"><input autocomplete="off" id="s" name="q" placeholder="Search Here..." type="text">
  <input name="cx" type="hidden" value="partner-pub-7983783048239650:3179771210">
</form>

Name: f1POST https://inl02.netline.com/rssnews0001/

<form action="https://inl02.netline.com/rssnews0001/" class="clear cf" id="subform" method="post" name="f1" target="_blank">
  <div class="email-box-h3">Get Latest News in Your Inbox!</div>
  <p>Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free.</p>
  <div class="email-input">
    <input name="_submit" type="hidden" value="0001">
    <input id="brand" name="brand" type="hidden" value="thehackernews">
    <div class="e-book"><input checked="yes" id="opt_001" name="opt_001" type="checkbox" value="Y"><input checked="yes" id="opt_003" name="opt_003" type="checkbox" value="Y"></div><label class="visuallyhidden" for="input-email">Email</label><input
      class="text" id="input-email" name="email" placeholder="Your e-mail address" required="" type="email">
    <button aria-label="Subscribe" id="submitform" type="submit" value="Subscribe"></button>
  </div>
</form>

Text Content

#1 Trusted Cybersecurity News Platform

Followed by 4.50+ million  


 Subscribe – Get Latest News
 *  Home
 *  Newsletter
 *  Webinars

 * Home
 * Data Breaches
 * Cyber Attacks
 * Vulnerabilities
 * Webinars
 * Store
 * Contact





Resources
 * Webinars
 * THN Store
 * Free eBooks

About Site
 * About THN
 * Jobs
 * Advertise with us


Contact/Tip Us

Reach out to get featured—contact us to send your exclusive story idea,
research, hacks, or ask us a question or leave a comment/feedback!

Follow Us On Social Media
    
 RSS Feeds  Email Alerts  Telegram Channel



THE HACKER NEWS | #1 TRUSTED CYBERSECURITY NEWS SITE


17-YEAR-OLD LINKED TO SCATTERED SPIDER CYBERCRIME SYNDICATE ARRESTED IN U.K.

Jul 20, 2024 Cybercrime / Data Breach
Law enforcement officials in the U.K. have arrested a 17-year-old boy from
Walsall who is suspected to be a member of the notorious Scattered Spider
cybercrime syndicate. The arrest was made "in connection with a global cyber
online crime group which has been targeting large organizations with ransomware
and gaining access to computer networks," West Midlands police said . "The
arrest is part of a global investigation into a large-scale cyber hacking
community which has targeted a number of major companies which includes MGM
Resorts in America." The teen's arrest, carried out in coordination with the
U.K. National Crime Agency (NCA) and the U.S. Federal Bureau of Investigation
(FBI), comes a little over a month after another 22-year-old member of the
e-crime syndicate from the U.K. was apprehended in Spain. Scattered Spider, an
offshoot of a loose-knit group called The Com, has evolved into an initial
access broker and affiliate, delivering ransomware fa


FAULTY CROWDSTRIKE UPDATE CRASHES WINDOWS SYSTEMS, IMPACTING BUSINESSES
WORLDWIDE

Jul 19, 2024
Businesses across the world have been hit by widespread disruptions to their
Windows workstations stemming from a faulty update pushed out by cybersecurity
company CrowdStrike. "CrowdStrike is actively working with customers impacted by
a defect found in a single content update for Windows hosts," the company's CEO
George Kurtz said in a statement . "Mac and Linux hosts are not impacted. This
is not a security incident or cyber attack." The company, which acknowledged
"reports of [ Blue Screens of Death ] on Windows hosts," further said it has
identified the issue and a fix has been deployed for its Falcon Sensor product,
urging customers to refer to the support portal for the latest updates. For
systems that have been already impacted by the problem, the mitigation
instructions are listed below - Boot Windows in Safe Mode or Windows Recovery
Environment Navigate to the C:\Windows\System32\drivers\CrowdStrike directory
Find the file named &qu


TOP 4 SECURITY RISKS OF GENAI

WizGenAI Security / Technology
Gain a competitive edge and unlock the top 4 major emerging risks within GenAI.
This report from Gartner provides insights and recommended actions for security
and product leaders.


TWO RUSSIAN NATIONALS PLEAD GUILTY IN LOCKBIT RANSOMWARE ATTACKS

Jul 19, 2024 Ransomware / Cybercrime
Two Russian nationals have pleaded guilty in a U.S. court for their
participation as affiliates in the LockBit ransomware scheme and helping
facilitate ransomware attacks across the world. The defendants include Ruslan
Magomedovich Astamirov, 21, of Chechen Republic, and Mikhail Vasiliev, 34, a
dual Canadian and Russian national of Bradford, Ontario. Astamirov was arrested
in Arizona by U.S. law enforcement agencies in May 2023. Vasiliev, who is
already wanted for similar charges in Canada, was sentenced to nearly four years
in jail. He was subsequently extradited to the U.S. last month. The development
comes more than two months after the U.K. National Crime Agency (NCA) unmasked a
31-year-old Russian national named Dmitry Yuryevich Khoroshev as the
administrator and developer of the LockBit ransomware operation. LockBit, which
is estimated to have attacked over 2,500 entities since its appearance towards
the end of 2019, raking in at least approximately $500 million in ranso


SAFEGUARD PERSONAL AND CORPORATE IDENTITIES WITH IDENTITY INTELLIGENCE

Jul 19, 2024 Machine Learning / Corporate Security
Learn about critical threats that can impact your organization and the bad
actors behind them from Cybersixgill's threat experts. Each story shines a light
on underground activities, the threat actors involved, and why you should care,
along with what you can do to mitigate risk.  In the current cyber threat
landscape, the protection of personal and corporate identities has become vital.
Once in the hands of cybercriminals, compromised credentials and accounts
provide unauthorized access to corporations' sensitive information and an entry
point to launch costly ransomware and other malware attacks. To properly
mitigate threats stemming from compromised credentials and accounts,
organizations need identity intelligence. Understanding the significance of
identity intelligence and the benefits it delivers is foundational to
maintaining a secure posture and minimizing risk.  There is a perception that
security teams and threat analysts are already overloaded by too much data. By
these


PRO-HOUTHI GROUP TARGETS YEMEN AID ORGANIZATIONS WITH ANDROID SPYWARE

Jul 19, 2024 Malware / Mobile Security
A suspected pro-Houthi threat group targeted at least three humanitarian
organizations in Yemen with Android spyware designed to harvest sensitive
information. These attacks, attributed to an activity cluster codenamed OilAlpha
, entail a new set of malicious mobile apps that come with their own supporting
infrastructure, Recorded Future's Insikt Group said . Targets of the ongoing
campaign include, CARE International, the Norwegian Refugee Council (NRC), and
the Saudi Arabian King Salman Humanitarian Aid and Relief Centre. "The OilAlpha
threat group is highly likely active and executing targeted activity against
humanitarian and human rights organizations operating in Yemen, and potentially
throughout the Middle East," the cybersecurity company said. OilAlpha was first
documented in May 2023 in connection with an espionage campaign targeting
development, humanitarian, media, and non-governmental organizations in the
Arabian peninsula. These attacks leveraged What


APT41 INFILTRATES NETWORKS IN ITALY, SPAIN, TAIWAN, TURKEY, AND THE U.K.

Jul 19, 2024 Cyber Espionage / Threat Intelligence
Several organizations operating within global shipping and logistics, media and
entertainment, technology, and automotive sectors in Italy, Spain, Taiwan,
Thailand, Turkey, and the U.K. have become the target of a "sustained campaign"
by the prolific China-based APT41 hacking group. "APT41 successfully infiltrated
and maintained prolonged, unauthorized access to numerous victims' networks
since 2023, enabling them to extract sensitive data over an extended period,"
Google-owned Mandiant said in a new report published Thursday. The threat
intelligence firm described the adversarial collective as unique among
China-nexus actors owing to its use of "non-public malware typically reserved
for espionage operations in activities that appear to fall outside the scope of
state-sponsored missions." Attack chains involve the use of web shells (ANTSWORD
and BLUEBEAM), custom droppers (DUSTPAN and DUSTTRAP), and publicly available
tools (SQLULDR2 and PINEGROV


SUMMARY OF "AI LEADERS SPILL THEIR SECRETS" WEBINAR

Jul 19, 2024 Technology / Artificial Intelligence
Event Overview The " AI Leaders Spill Their Secrets " webinar, hosted by Sigma
Computing, featured prominent AI experts sharing their experiences and
strategies for success in the AI industry. The panel included Michael Ward from
Sardine, Damon Bryan from Hyperfinity, and Stephen Hillian from Astronomer,
moderated by Zalak Trivedi, Sigma Computing's Product Manager. Key Speakers and
Their Backgrounds 1. Michael Ward Senior Risk Data Analyst at Sardine. Over 25
years of experience in software engineering. Focuses on data science, analytics,
and machine learning to prevent fraud and money laundering. 2. Damon Bryan
Co-founder and CTO at Hyperfinity. Specializes in decision intelligence software
for retailers and brands. Background in data science, AI, and analytics,
transitioning from consultancy to a full-fledged software company. 3. Stephen
Hillian SVP of Data and AI at Astronomer. Manages data science teams and focuses
on the development and scaling of


10,000 VICTIMS A DAY: INFOSTEALER GARDEN OF LOW-HANGING FRUIT

Jul 15, 2024Cyber Crime / Data Protection
Imagine you could gain access to any Fortune 100 company for $10 or less, or
even for free. Terrifying thought, isn't it? Or exciting, depending on which
side of the cybersecurity barricade you are on. Well, that's basically the state
of things today. Welcome to the infostealer garden of low-hanging fruit. Over
the last few years, the problem has grown bigger and bigger, and only now are we
slowly learning its full destructive potential. In this article, we will
describe how the entire cybercriminal ecosystem operates, the ways various
threat actors exploit data originating from it, and most importantly, what you
can do about it. Let's start with what infostealer malware actually is. As the
name suggests, it's malware that... steals data. Depending on the specific type,
the information it extracts might differ slightly, but most will try to extract
the following: Cryptocurrency wallets Bank account information and saved credit
card details Saved passwords from various apps Bro


SOLARWINDS PATCHES 8 CRITICAL FLAWS IN ACCESS RIGHTS MANAGER SOFTWARE

Jul 19, 2024 Vulnerability / Enterprise Security
SolarWinds has addressed a set of critical security flaws impacting its Access
Rights Manager (ARM) software that could be exploited to access sensitive
information or execute arbitrary code. Of the 13 vulnerabilities, eight are
rated Critical in severity and carry a CVSS score of 9.6 out of 10.0. The
remaining five weaknesses have been rated High in severity, with four of them
having a CVSS score of 7.6 and one scoring 8.3. The most severe of the flaws are
listed below - CVE-2024-23472 - SolarWinds ARM Directory Traversal Arbitrary
File Deletion and Information Disclosure Vulnerability CVE-2024-28074 -
SolarWinds ARM Internal Deserialization Remote Code Execution Vulnerability
CVE-2024-23469 - Solarwinds ARM Exposed Dangerous Method Remote Code Execution
Vulnerability CVE-2024-23475 - Solarwinds ARM Traversal and Information
Disclosure Vulnerability CVE-2024-23467 - Solarwinds ARM Traversal Remote Code
Execution Vulnerability CVE-2024-23466 - Solarwinds ARM Directory


WAZIRX CRYPTOCURRENCY EXCHANGE LOSES $230 MILLION IN MAJOR SECURITY BREACH

Jul 19, 2024 Cryptocurrency / Cybercrime
Indian cryptocurrency exchange WazirX has confirmed that it was the target of a
security breach that led to the theft of $230 million in cryptocurrency assets.
"A cyber attack occurred in one of our [multi-signature] wallets involving a
loss of funds exceeding $230 million," the company said in a statement. "This
wallet was operated utilizing the services of Liminal's digital asset custody
and wallet infrastructure from February 2023." The Mumbai-based company said the
attack stemmed from a mismatch between the information that was displayed on
Liminal's interface and what was actually signed. It said the payload was
replaced to transfer wallet control to an attacker. Crypto custody firm Liminal
is one of the six signatories on the wallet and is responsible for transaction
verifications. "Our preliminary investigations show that one of the self custody
multi-sig smart contract wallets created outside of the Liminal ecosystem has
been compromised
Next Page 

Trending News
Faulty CrowdStrike Update Crashes Windows Systems, Impacting Businesses
Worldwide
True Protection or False Promise? The Ultimate ITDR Shortlisting Guide
AT&T Confirms Data Breach Affecting Nearly All Wireless Customers
WazirX Cryptocurrency Exchange Loses $230 Million in Major Security Breach
APT41 Infiltrates Networks in Italy, Spain, Taiwan, Turkey, and the U.K.
Alert: HotPage Adware Disguised as Ad Blocker Installs Malicious Kernel Driver
DarkGate Malware Exploits Samba File Shares in Short-Lived Campaign
GitHub Token Leak Exposes Python's Core Repositories to Potential Attacks
SAP AI Core Vulnerabilities Expose Customer Data to Cyber Attacks
Popular Resources
Audit Your Active Directory for Weak Passwords – Download This Free Tool
Discover the Top SaaS Security Threats for 2024 – Read Latest Report
Master Exposure Management: A Must-Have Skill for Cyber Experts
Discover the Top 10 Cybersecurity Vulnerabilities Exposed by Experts
Expert Insights


7 RESOURCES TO INFORM YOUR NEXT HUNT FOR MALICIOUS INFRASTRUCTURE

July 15, 2024 Read ➝


EXPLOITABILITY IS THE MISSING PUZZLE PIECE OF SCA (SOFTWARE COMPOSITION
ANALYSIS)

June 10, 2024 Read ➝


9 CUSTOMER SERVICE CHATBOTS RANKED FOR RISK EXPOSURE

July 08, 2024 Read ➝


SECURING SAAS APPS IN THE ERA OF GENERATIVE AI

July 6, 2024 Watch ➝
Cybersecurity Resources
Essential Guide to Workflow Automation for Security Teams
Discover how secure workflow automation could solve some of your team's biggest
challenges.
Unlocking DORA: Insights & Strategies for Financial Institutions
Join experts from XM Cyber and KPMG to unravel DORA's complexities. Gain
actionable insights on compliance, resilience, and cybersecurity strategies.
Plus, receive an exclusive whitepaper! Register now.
SMBs are left out of the network security conversation, but not by threat
actors.
Free guide for you: The IT Admins Guide to Evaluating Network Security
Solutions.
Earn a Master's in Cybersecurity Risk Management
Lead the future of cybersecurity risk management with an online Master's from
Georgetown.

Get Latest News in Your Inbox!

Get the latest news, expert insights, exclusive resources, and strategies from
industry leaders – all for free.


Email

Connect with us!

920,000 Followers

575,000 Followers

22,200 Subscribers

147,000 Followers

1,880,000 Followers

125,000 Subscribers
Company
 * About THN
 * Advertise with us
 * Contact

Pages
 * Webinars
 * Deals Store
 * Privacy Policy

Deals
 * Hacking
 * Development
 * Android

 RSS Feeds
 Contact Us
© The Hacker News, 2024. All Rights Reserved.