All News
The Hacker News
The Hacker News
November 22, 2024
Russian Hackers Deploy HATVIBE and CHERRYSPY Malware Across Europe and Asia
Russia-linked TAG-110 hacks 62 victims across 11 nations using HATVIBE and CHERRYSPY malware.
The Hacker News
November 22, 2024
Unlocking Google Workspace Security: Are You Doing Enough to Protect Your Data?
This article underscores the importance of having a reliable backup for your Google Workspace data. Learn more.
The Hacker News
November 22, 2024
Microsoft, Meta, and DOJ Disrupt Global Cybercrime and Fraudulent Networks
Microsoft, Meta, and DOJ disrupt global cybercrime operations, including ONNX phishing scams and PopeyeTools fraud.
The Hacker News
November 22, 2024
PyPI Attack: ChatGPT, Claude Impersonators Deliver JarkaStealer via Python Libraries
Fake Python libraries on PyPI impersonate AI tools like GPT-4 and Claude, spreading JarkaStealer malware.
The Hacker News
November 21, 2024
Warning: Over 2,000 Palo Alto Networks Devices Hacked in Ongoing Attack Campaign
Palo Alto Networks urges fixes as 2,000 devices are hacked in exploits targeting critical flaws.
The Hacker News
November 21, 2024
Chinese APT Gelsemium Targets Linux Systems with New WolfsBane Backdoor
Gelsemium debuts Linux malware WolfsBane in cyber espionage attacks on East Asia, ESET reveals.
The Hacker News
November 21, 2024
10 Most Impactful PAM Use Cases for Enhancing Organizational Security
Reduce cybersecurity risks and streamline compliance with PAM solutions. Discover 10 ways PAM enhances your security.
The Hacker News
November 21, 2024
North Korean Front Companies Impersonate U.S. IT Firms to Fund Missile Programs
North Korea exploits fake IT firms and workers globally to fund weapons programs, evade sanctions, and conduct cyberattacks.
The Hacker News
November 21, 2024
Cyber Story Time: The Boy Who Cried "Secure!"
Learn why Automated Security Validation is critical for cybersecurity, addressing false positives and hidden threats.
The Hacker News
November 21, 2024
Over 145,000 Industrial Control Systems Across 175 Countries Found Exposed Online
More than 145,000 internet-exposed ICS devices found globally, revealing significant vulnerabilities in critical infrastructure.
The Hacker News
November 21, 2024
5 Scattered Spider Gang Members Indicted in Multi-Million Dollar Cybercrime Scheme
Five hackers indicted in U.S. for phishing attacks, stealing $11M in cryptocurrency, and data breaches.
The Hacker News
November 21, 2024
Google's AI-Powered OSS-Fuzz Tool Finds 26 Vulnerabilities in Open-Source Projects
Google’s AI tool OSS-Fuzz uncovers 26 vulnerabilities, including a decades-old OpenSSL flaw, boosting open-source security.
The Hacker News
November 21, 2024
NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card Data
NodeStealer malware targets Facebook Ads accounts, harvesting credit card data and spreading via malvertising
The Hacker News
November 20, 2024
Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments
Hackers exploit NFC technology and mobile payments, enabling global fraud through Google Pay and Apple Pay.
The Hacker News
November 20, 2024
NHIs Are the Future of Cybersecurity: Meet NHIDR
NHIDR secures non-human identities with real-time detection and automated response, preventing sophisticated breaches
The Hacker News
November 20, 2024
Decades-Old Security Vulnerabilities Found in Ubuntu's Needrestart Package
Critical Ubuntu needrestart flaws allow local root privilege escalation; update immediately to safeguard systems.
The Hacker News
November 20, 2024
Microsoft Launches Windows Resiliency Initiative to Boost Security and System Integrity
Microsoft is launching a new Windows Resiliency Initiative to enhance security and system integrity.
The Hacker News
November 20, 2024
China-Backed Hackers Leverage SIGTRAN, GSM Protocols to Infiltrate Telecom Networks
China-linked "Liminal Panda" exploits telecom vulnerabilities in South Asia and Africa, using advanced malware for espionage since 2020.
The Hacker News
November 20, 2024
Apple Releases Urgent Updates to Patch Actively Exploited Zero-Day Vulnerabilities
Apple issues security updates for iOS, macOS, and Safari to fix two active zero-day exploits.
The Hacker News
November 20, 2024
Oracle Warns of Agile PLM Vulnerability Currently Under Active Exploitation
Critical flaw CVE-2024-21287 in Oracle Agile PLM allows unauthenticated file leaks; urgent patch advised.
The Hacker News
November 19, 2024
Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices
Ngioweb malware fuels NSOCKS proxy service, exploiting IoT vulnerabilities for botnet monetization in minutes
The Hacker News
November 19, 2024
Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts
Hackers hijack Jupyter Notebooks to exploit FFmpeg for illegal sports streaming, posing serious risks.
The Hacker News
November 19, 2024
Privileged Accounts, Hidden Threats: Why Privileged Access Security Must Be a Top Priority
Discover why managing privileged access isn’t enough and learn strategies to secure privileged accounts
The Hacker News
November 19, 2024
New 'Helldown' Ransomware Expands Attacks to VMware and Linux Systems
Helldown ransomware targets VMware and Linux systems using Zyxel flaws, disrupting IT, healthcare, and more.
The Hacker News
November 19, 2024
Chinese Hackers Exploit T-Mobile and Other U.S. Telecoms in Broader Espionage Campaign
T-Mobile targeted in Chinese cyber espionage campaign stealing telecom data; U.S. warns of ongoing threats.
The Hacker News
November 19, 2024
CISA Alert: Active Exploitation of VMware vCenter and Kemp LoadMaster Flaws
Critical flaws in Progress Kemp LoadMaster and VMware vCenter Server are under active exploitation, warns CISA.
The Hacker News
November 18, 2024
New Stealthy BabbleLoader Malware Spotted Delivering WhiteSnake and Meduza Stealers
New stealthy malware loader BabbleLoader evades antivirus and sandboxes, delivering WhiteSnake and Meduza stealers globally.
The Hacker News
November 18, 2024
The Problem of Permissions and Non-Human Identities - Why Remediating Credentials Takes Longer Than You Think
79% of IT leaders face secrets leaks with 12.7M credentials exposed on GitHub. Learn solutions now.
The Hacker News
November 18, 2024
The Problem of Permissions and Non-Human Identities - Why Remediating Credentials Takes Longer Than You Think
79% of IT leaders face secrets leaks with 12.7M credentials exposed on GitHub. Learn solutions now.
The Hacker News
November 18, 2024
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11
Ready to outsmart the hackers? Dive into this week’s must-know updates.
The Hacker News
November 18, 2024
Shielded Email: Google's Latest Tool for Protecting Your Primary Email Address
Google launches Shielded Email, enabling unique aliases for sign-ups to boost privacy and reduce spam.
The Hacker News
November 18, 2024
Fake Discount Sites Exploit Black Friday to Hijack Shopper Information
New phishing campaign targets Black Friday e-commerce shoppers in Europe and US, stealing personal and financial data via fake brand website...
The Hacker News
November 18, 2024
Beyond Compliance: The Advantage of Year-Round Network Pen Testing
Cut pen testing costs by 60% with automated solutions like vPenTest. Achieve frequent, real-time network security beyond compliance schedule...
The Hacker News
November 18, 2024
NSO Group Exploited WhatsApp to Install Pegasus Spyware Even After Meta's Lawsuit
NSO Group exploited WhatsApp to install Pegasus spyware even after Meta sued, controlling operations themselves, not clients, legal document...
The Hacker News
November 18, 2024
Urgent: Critical WordPress Plugin Vulnerability Exposes Over 4 Million Sites
Critical vulnerability (CVE-2024-10924) in Really Simple Security plugin allows attackers admin access to WordPress sites. Over 4 million af...
The Hacker News
November 16, 2024
PAN-OS Firewall Vulnerability Under Active Exploitation – IoCs and Patch Released
Palo Alto Networks confirms active exploitation of a critical zero-day in PAN-OS firewalls; users urged to secure interfaces immediately.
The Hacker News
November 16, 2024
Warning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials
BrazenBamboo exploits an unpatched FortiClient flaw to steal VPN credentials using DEEPDATA malware. Fortinet users advised to stay alert.
The Hacker News
November 15, 2024
Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations
WezRat malware, linked to Iranian hackers, uses phishing and Trojanized Chrome installers to steal data.
The Hacker News
November 15, 2024
Researchers Warn of Privilege Escalation Risks in Google's Vertex AI ML Platform
Two Vertex AI flaws let attackers escalate privileges and exfiltrate sensitive ML models. Risks now mitigated.
The Hacker News
November 15, 2024
Master Certificate Management: Join This Webinar on Crypto Agility and Best Practices
Learn how automation, crypto agility, and best practices can tackle certificate revocation risks.
The Hacker News
November 15, 2024
Vietnamese Hacker Group Deploys New PXA Stealer Targeting Europe and Asia
Vietnam-linked hackers target Europe and Asia with PXA Stealer malware, stealing credentials and Facebook ad data.
The Hacker News
November 15, 2024
How AI Is Transforming IAM and Identity Security
AI revolutionizes IAM by enabling real-time monitoring, anomaly detection, and adaptive governance for better security.
The Hacker News
November 15, 2024
High-Severity Flaw in PostgreSQL Allows Hackers to Exploit Environment Variables
Critical PostgreSQL flaw (CVE-2024-10979) patched; update now to prevent code execution and data breaches.
The Hacker News
November 15, 2024
Bitfinex Hacker Sentenced to 5 Years, Guilty of Laundering $10.5 Billion in Bitcoin
Bitfinex hacker Ilya Lichtenstein sentenced for laundering $10.5B in bitcoin from 2016 crypto heist
The Hacker News
November 15, 2024
CISA Flags Two Actively Exploited Palo Alto Flaws; New RCE Attack Confirmed
Critical Palo Alto Expedition flaws exploited in attacks; CISA mandates urgent patch by December 5
The Hacker News
November 14, 2024
Experts Uncover 70,000 Hijacked Domains in Widespread 'Sitting Ducks' Attack Scheme
Cybercriminals exploit 'Sitting Ducks' attacks, hijacking thousands of domains for phishing and fraud, Infoblox reports.
The Hacker News
November 14, 2024
Google Warns of Rising Cloaking Scams, AI-Driven Fraud, and Crypto Schemes
Google exposes cloaking scams targeting users with fake sites and AI-driven fraud, bolstering defenses with real-time scam detection.
The Hacker News
November 14, 2024
5 BCDR Oversights That Leave You Exposed to Ransomware
This article highlights the top five BCDR mistakes businesses make that leave them vulnerable to ransomware attacks. Learn more.
The Hacker News
November 14, 2024
An Agent’s Identity: Is Your Authentication AI-Proof?
AI agents challenge access control. Discover why new authentication frameworks are essential for secure, dynamic agent use
The Hacker News
November 14, 2024
TikTok Pixel Privacy Nightmare: A New Case Study
Reflectiz identified a TikTok pixel misconfiguration at a travel site, preventing a costly GDPR breach.- 1
- 2
Showing 50 results of 54 — Page 1