All News
The Hacker News
The Hacker News
September 20, 2024
Europol Shuts Down Major Phishing Scheme Targeting Mobile Phone Credentials
Global authorities dismantle iServer phishing platform, responsible for unlocking 1.2M stolen phones, impacting 483,000 victims.
The Hacker News
September 20, 2024
Passwordless AND Keyless: The Future of (Privileged) Access Management
Learn why traditional PAMs fail at SSH key management and how ephemeral secrets reduce security risks.
The Hacker News
September 20, 2024
Iranian APT UNC1860 Linked to MOIS Facilitates Cyber Intrusions in Middle East
Mandiant links Iranian APT UNC1860 to MOIS, revealing its sophisticated remote access tools and persistent backdoors targeting high-priority...
The Hacker News
September 20, 2024
Chrome Users Can Now Sync Passkeys Across Devices with New Google PIN Feature
Google introduces a new Password Manager PIN, enabling secure passkey syncing across devices in Chrome.
The Hacker News
September 20, 2024
Critical Ivanti Cloud Appliance Vulnerability Exploited in Active Cyberattacks
Critical Ivanti CSA flaw actively exploited. Patch now to prevent unauthorized access and remote code execution. CISA adds to KEV catalog.
The Hacker News
September 19, 2024
Wherever There's Ransomware, There's Service Account Compromise. Are You Protected?
Learn why service accounts are vulnerable to ransomware attacks and how to secure them effectively
The Hacker News
September 19, 2024
Hackers Exploit Default Credentials in FOUNDATION Software to Breach Construction Firms
Hackers exploit FOUNDATION software vulnerabilities in construction companies, brute-forcing default credentials to gain access.
The Hacker News
September 19, 2024
New Brazilian-Linked SambaSpy Malware Targets Italian Users via Phishing Emails
New SambaSpy malware targets users in Italy using phishing techniques that exploit language and browser settings.
The Hacker News
September 19, 2024
New TeamTNT Cryptojacking Campaign Targets CentOS Servers with Rootkit
TeamTNT resurfaces with a cryptojacking campaign targeting CentOS VPS servers, disabling security and deploying rootkits.
The Hacker News
September 19, 2024
Healthcare's Diagnosis is Critical: The Cure is Cybersecurity Hygiene
Rising cyberattacks threaten healthcare systems. Learn how improving cybersecurity hygiene can protect patients and prevent ransomware.
The Hacker News
September 19, 2024
Microsoft Warns of New INC Ransomware Targeting U.S. Healthcare Sector
Microsoft reveals Vanilla Tempest using INC ransomware to target U.S. healthcare. Threat actor exploits GootLoader, deploys various tools fo...
The Hacker News
September 19, 2024
The Microsoft 365 Backup Game Just Changed: Ransomware Recovery Revolutionized
Microsoft 365 Backup boosts ransomware recovery with faster, scalable solutions, redefining data protection for cloud businesses.
The Hacker News
September 19, 2024
GitLab Patches Critical SAML Authentication Bypass Flaw in CE and EE Editions
GitLab patches critical authentication bypass flaw in SAML library. Users urged to update and enable 2FA to protect against potential accoun...
The Hacker News
September 18, 2024
New "Raptor Train" IoT Botnet Compromises Over 200,000 Devices Worldwide
Cybersecurity researchers uncover massive Chinese-linked IoT botnet "Raptor Train," infecting 200,000+ devices and targeting US and Taiwan s...
The Hacker News
September 18, 2024
Chinese Engineer Charged in U.S. for Years-Long Cyber Espionage Targeting NASA and Military
Chinese engineer indicted in U.S. for multi-year spear-phishing campaign targeting NASA, military, and universities.
The Hacker News
September 18, 2024
Why Pay A Pentester?
Automated penetration testing disrupts cybersecurity by offering faster, cheaper, and broader testing coverage.
The Hacker News
September 18, 2024
North Korean Hackers Target Energy and Aerospace Industries with New MISTPEN Malware
North Korean hackers use job-themed phishing to deploy the MISTPEN backdoor, targeting global aerospace and energy sectors.
The Hacker News
September 18, 2024
Chrome Introduces One-Time Permissions and Enhanced Safety Check for Safer Browsing
Google Chrome's latest update enhances user privacy and security with improved Safety Check, one-time permissions, and easier notification m...
The Hacker News
September 18, 2024
GSMA Plans End-to-End Encryption for Cross-Platform RCS Messaging
GSMA aims to implement end-to-end encryption for RCS messaging across Android and iOS, following Apple's iOS 18 RCS support rollout.
The Hacker News
September 18, 2024
Patch Issued for Critical VMware vCenter Flaw Allowing Remote Code Execution
Broadcom patches critical VMware vCenter Server vulnerability, CVE-2024-38812, preventing remote code execution. Update now.
The Hacker News
September 17, 2024
Google Chrome Switches to ML-KEM for Post-Quantum Cryptography Defense
Google adopts ML-KEM in Chrome for post-quantum security, as EUCLEAK vulnerability impacts YubiKey devices. Tech giants prepare for quantum...
The Hacker News
September 17, 2024
U.S. Treasury Sanctions Executives Linked to Intellexa Predator Spyware Operation
U.S. Treasury sanctions Intellexa Consortium executives for developing and distributing Predator spyware, citing national security and priva...
The Hacker News
September 17, 2024
Meta to Train AI Models Using Public U.K. Facebook and Instagram Posts
Meta will use public UK Facebook and Instagram content to train AI. Users can easily opt out.
The Hacker News
September 17, 2024
How to Investigate ChatGPT activity in Google Workspace
Learn how ChatGPT’s integration with Google Drive poses cybersecurity risks and how to monitor file access.
The Hacker News
September 17, 2024
Binance Warns of Rising Clipper Malware Attacks Targeting Cryptocurrency Users
Binance warns of a global clipper malware targeting cryptocurrency users, replacing wallet addresses to steal funds.
The Hacker News
September 17, 2024
SolarWinds Issues Patch for Critical ARM Vulnerability Enabling RCE Attacks
SolarWinds patches critical remote code execution vulnerability in Access Rights Manager (ARM) software. Update now to protect your systems.
The Hacker News
September 16, 2024
Google Fixes GCP Composer Flaw That Could've Led to Remote Code Execution
Google patches critical Cloud Composer vulnerability that could enable remote code execution via dependency confusion.
The Hacker News
September 16, 2024
North Korean Hackers Target Cryptocurrency Users on LinkedIn with RustDoor Malware
North Korean threat actors are using LinkedIn to spread RustDoor malware, targeting professionals in the crypto sector.
The Hacker News
September 16, 2024
From Breach to Recovery: Designing an Identity-Focused Incident Response Playbook
Learn the latest tactics hackers use, proven strategies for rapid detection and containment, and how to build a robust Identity Incident Res...
The Hacker News
September 16, 2024
Master Your PCI DSS v4 Compliance with Innovative Smart Approvals
Achieve PCI DSS v4.0 compliance by 2025 with Reflectiz's streamlined script monitoring and smart approvals.
The Hacker News
September 16, 2024
Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence Exposure
Apple drops lawsuit against NSO Group, citing risk of exposing critical threat intelligence amid growing spyware threats.
The Hacker News
September 16, 2024
How Does Threat Intelligence Apply to SaaS Security? And Why You Should Care
SaaS apps face growing cyber threats. Learn how tailored threat intelligence can protect against breaches, leaks, and credential theft.
The Hacker News
September 16, 2024
Cybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacks
Cybercriminals exploit HTTP header refresh techniques in phishing campaigns targeting corporations, government agencies, and schools for cre...
The Hacker News
September 14, 2024
Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability
Ivanti warns of active exploitation of Cloud Appliance flaw CVE-2024-8190. Patch urgently required.
The Hacker News
September 13, 2024
Apple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackers
Apple patches Vision Pro vulnerability after GAZEploit attack exposes keystroke inference risk via gaze tracking.
The Hacker News
September 13, 2024
17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London
17-year-old arrested over cyber attack on TfL, exposing 5,000 customers' sensitive data. Investigation ongoing.
The Hacker News
September 13, 2024
TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud
Researchers reveal TrickMo banking trojan targeting Android users with anti-detection tactics and accessibility abuse to steal credentials a...
The Hacker News
September 13, 2024
Say Goodbye to Phishing: Must-Haves to Eliminate Credential Theft
Discover how Beyond Identity's deterministic security approach eliminates phishing, credential theft, and other cyber threats with passwordl...
The Hacker News
September 13, 2024
Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw
Critical WhatsUp Gold vulnerabilities exploited within hours of PoC release. Attackers bypass authentication to install remote access tools.
The Hacker News
September 13, 2024
New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency
New Linux malware 'Hadooken' targets Oracle Weblogic, deploys crypto miners and DDoS botnet. Exploits vulnerabilities for lateral movement.
The Hacker News
September 12, 2024
New Android Malware 'Ajina.Banker' Steals Financial Data and Bypasses 2FA via Telegram
New Android malware 'Ajina.Banker' targets bank customers in Central Asia, stealing financial data and intercepting 2FA messages via Telegra...
The Hacker News
September 12, 2024
Urgent: GitLab Patches Critical Flaw Allowing Unauthorized Pipeline Job Execution
GitLab patches critical flaw (CVE-2024-6678) allowing unauthorized pipeline job execution. Update to latest version to protect your reposito...
The Hacker News
September 12, 2024
Beware: New Vo1d Malware Infects 1.3 Million Android TV Boxes Worldwide
Vo1d malware infects 1.3M Android TV boxes in 197 countries. Learn about this new backdoor threat and how it compromises device security.
The Hacker News
September 12, 2024
Exposed Selenium Grid Servers Targeted for Crypto Mining and Proxyjacking
Exposed Selenium Grid servers targeted for crypto mining and proxyjacking. Learn about the vulnerabilities and how to protect your infrastru...
The Hacker News
September 12, 2024
Top 3 Threat Report Insights for Q2 2024
IntelBroker threats, Amazon spoofing, and Log4j exploits dominate Cato CTRL’s Q2 2024 Cyber Threat Report.
The Hacker News
September 12, 2024
Iranian Cyber Group OilRig Targets Iraqi Government in Sophisticated Malware Attack
Iranian threat actor OilRig targets Iraq's government networks with new malware, exploiting advanced C2 protocols.
The Hacker News
September 12, 2024
Ireland's Watchdog Launches Inquiry into Google's AI Data Practices in Europe
Irish Data Protection Commission launches inquiry into Google's AI model PaLM 2, investigating GDPR compliance in personal data processing f...
The Hacker News
September 12, 2024
WordPress Mandates Two-Factor Authentication for Plugin and Theme Developers
WordPress.org mandates 2FA for plugin/theme developers, introduces SVN passwords to enhance security and prevent unauthorized access.
The Hacker News
September 11, 2024
Quad7 Botnet Expands to Target SOHO Routers and VPN Appliances
Quad7 botnet evolves, targeting routers with new stealth techniques, compromising major brands globally in expanding attacks.
The Hacker News
September 11, 2024
DragonRank Black Hat SEO Campaign Targeting IIS Servers Across Asia and Europe
Chinese hackers launch DragonRank campaign, targeting multiple countries for SEO manipulation using BadIIS malware and compromised IIS serve...- 1
- 2
Showing 50 results of 55 — Page 1