The Hacker News Daily Updates

Hackers exploit mitel VoIP zero-day in likely ransomware attack.

Views expressed in this cybersecurity-cyber crime update are those of the reporters and correspondents.

Accessed on 24 June 2022, 1514 UTC.

Content provided by "The Hacker News Daily Updates."

Source:  https://mail.google.com/mail/u/0/#inbox/FMfcgzGpGdjMgnlzNKxXmFCqpFpsDhpm

Please click link or scroll down to read your selections.

Thanks for joining us today.

Russ Roberts

https://www.hawaiicybersecurityjournal.net

https://paper.li/RussellRoberts (machine learning, artificial intelligence, IoT, and information security)

The Hacker News Daily Updates
Newsletter
cover

SASE for Dummies 2nd Edition

SASE for Dummies 2nd edition is here. Understand all the SASE basics, and much more. It’s a concise, 5-chapter, a must-read for IT leaders looking to support their digital business needs today and into the future.

Download NowSponsored
LATEST NEWSJun 24, 2022

Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

A suspected ransomware intrusion against an unnamed target leveraged a Mitel VoIP appliance as an entry point to achieve remote code execution and gain initial access to the environment. The findings come from cybersecurity firm CrowdStrike, which traced the source of the attack to a Linux-based ...

Read More
TwitterFacebookLinkedIn

Google Says ISPs Helped Attackers Infect Targeted Smartphones with Hermit Spyware

A week after it emerged that a sophisticated mobile spyware dubbed Hermit was used by the government of Kazakhstan within its borders, Google said it has notified Android users of infected devices. Additionally, necessary changes have been implemented in Google Play Protect — Android's built-in ...

Read More
TwitterFacebookLinkedIn

Multiple Backdoored Python Libraries Caught Stealing AWS Secrets and Keys

Researchers have discovered a number of malicious Python packages in the official third-party software repository that are engineered to exfiltrate AWS credentials and environment variables to a publicly exposed endpoint. The list of packages includes loglib-modules, pyg-modules, pygrata, ...

Read More
TwitterFacebookLinkedIn

State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks

A China-based advanced persistent threat (APT) group is possibly deploying short-lived ransomware families as a decoy to cover up the true operational and tactical objectives behind its campaigns. The activity cluster, attributed to a hacking group dubbed Bronze Starlight by Secureworks, involves ...

Read More
TwitterFacebookLinkedIn

New 'Quantum' Builder Lets Attackers Easily Create Malicious Windows Shortcuts

A new malware tool that enables cybercriminal actors to build malicious Windows shortcut (.LNK) files has been spotted for sale on cybercrime forums. Dubbed Quantum Lnk Builder, the software makes it possible to spoof any extension and choose from over 300 icons, not to mention ...

Read More
TwitterFacebookLinkedIn
cover

Data Privacy in Risk Management

Simplifying the compliance equation for fraud prevention

Download NowSponsored

Comments

Popular posts from this blog

SecurityWeek Briefing.

Cyber War Newswire

SecurityWeek Briefing.