Category: TheHackerNews

Even Great Companies Get Breached
17
Dec
2024

Even Great Companies Get Breached — Find Out Why and How to Stop It

Dec 17, 2024The Hacker NewsWebinar / Risk Management Even the best companies with the most advanced tools can still get…

Cyber Threat Hunting
17
Dec
2024

5 Practical Techniques for Effective Cyber Threat Hunting

Addressing cyber threats before they have a chance to strike or inflict serious damage is by far the best security…

WmRAT and MiyaRAT Malware
17
Dec
2024

Bitter APT Targets Turkish Defense Sector with WmRAT and MiyaRAT Malware

Dec 17, 2024Ravie LakshmananCyber Espionage / Malware A suspected South Asian cyber espionage threat group known as Bitter targeted a…

CoinLurker Malware
17
Dec
2024

Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection

Bogus software update lures are being used by threat actors to deliver a new stealer malware called CoinLurker. “Written in…

CISA and FBI Raise Alerts
17
Dec
2024

CISA and FBI Raise Alerts on Exploited Flaws and Expanding HiatusRAT Campaign

Dec 17, 2024Ravie LakshmananNetwork Security / IoT Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two…

Multi-Platform Malware Arsenal
17
Dec
2024

The Mask APT Resurfaces with Sophisticated Multi-Platform Malware Arsenal

Dec 17, 2024Ravie LakshmananCyber Espionage / Mobile Security A little-known cyber espionage actor known as The Mask has been linked…

DeceptionAds
16
Dec
2024

DeceptionAds Delivers 1M+ Daily Impressions via 3,000 Sites, Fake CAPTCHA Pages

Dec 16, 2024Ravie LakshmananMalvertising / Threat Intelligence Cybersecurity researchers have shed light on a previously undocumented aspect associated with ClickFix-style…

NoviSpy Spyware
16
Dec
2024

NoviSpy Spyware Installed on Journalist’s Phone After Unlocking It With Cellebrite Tool

Dec 16, 2024Ravie LakshmananSpyware / Surveillance A Serbian journalist had his phone first unlocked by a Cellebrite tool and subsequently…

Data Governance in DevOps
16
Dec
2024

Ensuring Compliance in the AI Era

With the evolution of modern software development, CI/CD pipeline governance has emerged as a critical factor in maintaining both agility…

Glutton PHP Malware
16
Dec
2024

New Glutton Malware Exploits Popular PHP Frameworks Like Laravel and ThinkPHP

Cybersecurity researchers have discovered a new PHP-based backdoor called Glutton that has been put to use in cyber attacks targeting…

New Investment Scam Leverages AI, Social Media Ads to Target Victims Worldwide
16
Dec
2024

New Investment Scam Leverages AI, Social Media Ads to Target Victims Worldwide

Dec 16, 2024Ravie LakshmananCryptocurrency / Phishing Attack Cybersecurity researchers are calling attention to a new kind of investment scam that…

Cyber Ops and Reconnaissance
16
Dec
2024

Ukrainian Minors Recruited for Cyber Ops and Reconnaissance in Russian Airstrikes

Dec 16, 2024Ravie LakshmananCyber Attack / Cyber Espionage The Security Service of Ukraine (SBU or SSU) has exposed a novel…