Category: TheHackerNews

Ivanti VPN Flaws
29
Feb
2024

Chinese Hackers Exploiting Ivanti VPN Flaws to Deploy New Malware

At least two different suspected China-linked cyber espionage clusters, tracked as UNC5325 and UNC3886, have been attributed to the exploitation…

President Biden
29
Feb
2024

President Biden Blocks Mass Transfer of Personal Data to High-Risk Nations

U.S. President Joe Biden has issued an Executive Order that prohibits the mass transfer of citizens’ personal data to countries…

Aerospace & Defense Sectors
28
Feb
2024

Iran-Linked UNC1549 Hackers Target Middle East Aerospace & Defense Sectors

Feb 28, 2024NewsroomCyber Espionage / Malware An Iran-nexus threat actor known as UNC1549 has been attributed with medium confidence to…

BlackCat Ransomware Attacks
28
Feb
2024

FBI Warns U.S. Healthcare Sector of Targeted BlackCat Ransomware Attacks

Feb 28, 2024NewsroomRansomware / Healthcare The U.S. government is warning about the resurgence of BlackCat (aka ALPHV) ransomware attacks targeting…

Privacy-Compliant Customer Data Platform (CDP)
28
Feb
2024

Building Your Privacy-Compliant Customer Data Platform (CDP) with First-Party Data

Feb 28, 2024The Hacker NewsWebinar / Privacy In today’s digital era, data privacy isn’t just a concern; it’s a consumer…

Privileged Access Management
28
Feb
2024

How to Bridge Privileged Access Management and Identity Management

Feb 28, 2024The Hacker NewsZero Trust / Cyber Threat Traditional perimeter-based security has become costly and ineffective. As a result,…

TimbreStealer Malware
28
Feb
2024

TimbreStealer Malware Spreading via Tax-themed Phishing Scam Targets IT Users

Feb 28, 2024NewsroomPhishing Attack / Malware Mexican users have been targeted with tax-themed phishing lures at least since November 2023…

MooBot Threat
28
Feb
2024

Cybersecurity Agencies Warn Ubiquiti EdgeRouter Users of APT28’s MooBot Threat

Feb 28, 2024NewsroomFirmware Security / Vulnerability In a new joint advisory, cybersecurity and intelligence agencies from the U.S. and other…

Hugging Face Vulnerability
27
Feb
2024

New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks

Feb 27, 2024NewsroomSupply Chain Attack / Data Security Cybersecurity researchers have found that it’s possible to compromise the Hugging Face…

WordPress LiteSpeed Plugin
27
Feb
2024

WordPress LiteSpeed Plugin Vulnerability Puts 5 Million Sites at Risk

Feb 27, 2024NewsroomVulnerability / Website Security A security vulnerability has been disclosed in the LiteSpeed Cache plugin for WordPress that…

RAT Trojan
27
Feb
2024

Open-Source Xeno RAT Trojan Emerges as a Potent Threat on GitHub

Feb 27, 2024The Hacker NewsMalware / Network Security An “intricately designed” remote access trojan (RAT) called Xeno RAT has been…

Cloud Attack Tactics
27
Feb
2024

Five Eyes Agencies Expose APT29’s Evolving Cloud Attack Tactics

Feb 27, 2024NewsroomCloud Security / Threat Intelligence Cybersecurity and intelligence agencies from the Five Eyes nations have released a joint…