Category: TheHackerNews

SOC Investigations
27
Feb
2024

How to Speed Up Your SOC Investigations

Processing alerts quickly and efficiently is the cornerstone of a Security Operations Center (SOC) professional’s role. Threat intelligence platforms can…

WordPress
27
Feb
2024

WordPress Plugin Alert – Critical SQLi Vulnerability Threatens 200K+ Websites

Feb 27, 2024NewsroomWebsite Security / Cryptojacking A critical security flaw has been disclosed in a popular WordPress plugin called Ultimate…

Malicious npm Packages
26
Feb
2024

North Korean Hackers Targeting Developers with Malicious npm Packages

Feb 26, 2024The Hacker NewsSoftware Security / Cryptocurrency A set of fake npm packages discovered on the Node.js repository has…

New IDAT Loader Attacks Using Steganography to Deploy Remcos RAT
26
Feb
2024

New IDAT Loader Attacks Using Steganography to Deploy Remcos RAT

Feb 26, 2024The Hacker NewsSteganography / Malware Ukrainian entities based in Finland have been targeted as part of a malicious…

Massive Spam Operation
26
Feb
2024

8,000+ Subdomains of Trusted Brands Hijacked for Massive Spam Operation

More than 8,000 subdomains belonging to legitimate brands and institutions have been hijacked as part of a sophisticated distribution architecture…

AI Accidents
26
Feb
2024

Three Tips to Protect Your Secrets from AI Accidents

Last year, the Open Worldwide Application Security Project (OWASP) published multiple versions of the “OWASP Top 10 For Large Language…

Banking Trojan
26
Feb
2024

Banking Trojans Target Latin America and Europe Through Google Cloud Run

Cybersecurity researchers are warning about a spike in email phishing campaigns that are weaponizing the Google Cloud Run service to…

LockBit Ransomware Group
26
Feb
2024

LockBit Ransomware Group Resurfaces After Law Enforcement Takedown

The threat actors behind the LockBit ransomware operation have resurfaced on the dark web using new infrastructure, days after an…

LockBitSupp
25
Feb
2024

Authorities Claim LockBit Admin “LockBitSupp” Has Engaged with Law Enforcement

LockBitSupp, the individual(s) behind the persona representing the LockBit ransomware service on cybercrime forums such as Exploit and XSS, “has…

Free Logging
24
Feb
2024

Microsoft Expands Free Logging Capabilities for all U.S. Federal Agencies

Feb 24, 2024NewsroomActive Directory / Data Protection Microsoft has expanded free logging capabilities to all U.S. federal agencies using Microsoft…

Nova Sentinel Malware
23
Feb
2024

Dormant PyPI Package Compromised to Spread Nova Sentinel Malware

Feb 23, 2024NewsroomSupply Chain Attack / Malware A dormant package available on the Python Package Index (PyPI) repository was updated…

SOC Automation
23
Feb
2024

How to Use Tines’s SOC Automation Capability Matrix

Created by John Tuckner and the team at workflow and automation platform Tines, the SOC Automation Capability Matrix (SOC ACM)…