Thursday 25 July 2019

Popular Malware Families Using 'Process Doppelgänging' to Evade Detection

The Hacker News Daily Updates
Newsletter
cover

The Present and Future of Security Operations

Today, hackers are taking advantage of vulnerabilities created by the disconnected tools within an organization’s environment. This siloed approach to cybersecurity makes it difficult for security teams to detect cyberattacks, quickly respond to incidents or even assess an organization’s security status.

Download Now Sponsored
LATEST NEWS Jul 25, 2019

Popular Malware Families Using 'Process Doppelgänging' to Evade Detection

The fileless code injection technique called Process Doppelgänging is actively being used by not just one or two but a large number of malware families in the wild, a new report shared with The Hacker News revealed. Discovered in late 2017, Process Doppelgänging is a fileless variation of Process ...

Read More
Twitter Facebook LinkedIn

Linux Botnet Adding BlueKeep-Flawed Windows RDP Servers to Its Target List

Cybersecurity researchers have discovered a new variant of WatchBog, a Linux-based cryptocurrency mining malware botnet, which now also includes a module to scan the Internet for Windows RDP servers vulnerable to the Bluekeep flaw. BlueKeep is a highly-critical, wormable, remote code execution ...

Read More
Twitter Facebook LinkedIn

New Android Spyware Created by Russian Defense Contractor Found in the Wild

Cybersecurity researchers have uncovered a new piece of mobile surveillance malware believed to be developed by a Russian defense contractor that has been sanctioned for interfering with the 2016 U.S. presidential election. Dubbed Monokle, the mobile remote-access trojan has been actively ...

Read More
Twitter Facebook LinkedIn

Facebook Agrees to Pay $5 Billion Fine and Setup New Privacy Program for 20 Years

The Federal Trade Commission (FTC) today officially confirmed that Facebook has agreed to pay a record-breaking $5 billion fine over privacy violations surrounding the Cambridge Analytica scandal. Besides the multibillion-dollar penalty, the company has also accepted a 20-year-long agreement that ...

Read More
Twitter Facebook LinkedIn

Siemens Contractor Pleads Guilty to Planting 'Logic Bomb' in Spreadsheets

A former Siemens contractor has pledged guilty in federal court Friday to secretly planting code in automated spreadsheets he had created for the company over a decade ago that deliberately crashes the program every few years. David Tinley, a 62-year-old resident of Harrison City, Pennsylvania, ...

Read More
Twitter Facebook LinkedIn
cover

The Present and Future of Security Operations

Today, hackers are taking advantage of vulnerabilities created by the disconnected tools within an organization’s environment. This siloed approach to cybersecurity makes it difficult for security teams to detect cyberattacks, quickly respond to incidents or even assess an organization’s security status.

Download Now Sponsored

This email was sent to balvistudio4.raaj@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

No comments:

Post a Comment