Russian APT28 Hackers Targeting High-Value Orgs with NTLM Relay Attacks

[ad_1] Russian state-sponsored actors have staged NT LAN Manager (NTLM) v2 hash relay attacks through various methods from April 2022 to November 2023, targeting high-value targets worldwide. The attacks, attributed to an “aggressive” hacking crew called APT28, have set their eyes on organizations dealing with foreign affairs, energy, defense, and transportation, as well as those…

Read More

Integrating Insights from Recorded Future to Revolutionize Cloud Security

[ad_1] Feb 02, 2024The Hacker NewsThreat Intelligence / Cloud Security Cloudzy, a prominent cloud infrastructure provider, proudly announces a significant enhancement in its cybersecurity landscape. This breakthrough has been achieved through a recent consultation with Recorded Future, a leader in providing real-time threat intelligence and cybersecurity analytics. This initiative, coupled with an overhaul of Cloudzy’s…

Read More

Nation-State Hackers Access Source Code and Internal Docs

[ad_1] Feb 02, 2024NewsroomData Breach / Cloud Security Cloudflare has revealed that it was the target of a likely nation-state attack in which the threat actor leveraged stolen credentials to gain unauthorized access to its Atlassian server and ultimately access some documentation and a limited amount of source code. The intrusion, which took place between…

Read More

HeadCrab 2.0 Goes Fileless, Targeting Redis Servers for Crypto Mining

[ad_1] Feb 01, 2024NewsroomCryptocurrency / Botnet Cybersecurity researchers have detailed an updated version of the malware HeadCrab that’s known to target Redis database servers across the world since early September 2021. The development, which comes exactly a year after the malware was first publicly disclosed by Aqua, is a sign that the financially-motivated threat actor…

Read More

FritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your Network

[ad_1] Feb 01, 2024NewsroomCyber Attack / Botnet The threat actor behind a peer-to-peer (P2P) botnet known as FritzFrog has made a return with a new variant that leverages the Log4Shell vulnerability to propagate internally within an already compromised network. “The vulnerability is exploited in a brute-force manner that attempts to target as many vulnerable Java…

Read More

Exposed Docker APIs Under Attack in ‘Commando Cat’ Cryptojacking Campaign

[ad_1] Feb 01, 2024NewsroomCryptojacking / Linux Security Exposed Docker API endpoints over the internet are under assault from a sophisticated cryptojacking campaign called Commando Cat. “The campaign deploys a benign container generated using the Commando project,” Cado security researchers Nate Bill and Matt Muir said in a new report published today. “The attacker escapes this…

Read More