Category: TheHackerNews

Generative AI
23
Feb
2024

Microsoft Releases PyRIT – A Red Teaming Tool for Generative AI

Feb 23, 2024NewsroomRed Teaming / Artificial Intelligence Microsoft has released an open access automation framework called PyRIT (short for Python…

Zero-Click Shortcuts Vulnerability
23
Feb
2024

Researchers Detail Apple’s Recent Zero-Click Shortcuts Vulnerability

Feb 23, 2024NewsroomData Privacy / iOS Security Details have emerged about a now-patched high-severity security flaw in Apple’s Shortcuts app…

FTC Slams Avast with $16.5 Million Fine for Selling Users' Browsing Data
23
Feb
2024

FTC Slams Avast with $16.5 Million Fine for Selling Users’ Browsing Data

Feb 23, 2024NewsroomPrivacy / Regulatory Compliance The U.S. Federal Trade Commission (FTC) has hit antivirus vendor Avast with a $16.5…

Quantum-Proof Encryption for iMessage
22
Feb
2024

Apple Unveils PQ3 Protocol – Post-Quantum Encryption for iMessage

Feb 22, 2024NewsroomQuantum Computing / Encryption Apple has announced a new post-quantum cryptographic protocol called PQ3 that it said will…

Konni RAT Malware
22
Feb
2024

Russian Government Software Backdoored to Deploy Konni RAT Malware

Feb 22, 2024NewsroomMalware / Cyber Espionage An installer for a tool likely used by the Russian Consular Department of the…

Open-Source SSH-Snake Tool
22
Feb
2024

Cybercriminals Weaponizing Open-Source SSH-Snake Tool for Network Attacks

Feb 22, 2024NewsroomNetwork Security / Penetration Testing A recently open-sourced network mapping tool called SSH-Snake has been repurposed by threat…

LockBit
22
Feb
2024

U.S. Offers $15 Million Bounty to Hunt Down LockBit Ransomware Leaders

The U.S. State Department has announced monetary rewards of up to $15 million for information that could lead to the…

VMware EAP
21
Feb
2024

VMware Alert: Uninstall EAP Now

Feb 21, 2024NewsroomActive Directory / Vulnerability VMware is urging users to uninstall the deprecated Enhanced Authentication Plugin (EAP) following the…

New Wi-Fi Vulnerabilities
21
Feb
2024

New Wi-Fi Vulnerabilities Expose Android and Linux Devices to Hackers

Feb 21, 2024NewsroomNetwork Security / Vulnerability Cybersecurity researchers have identified two authentication bypass flaws in open-source Wi-Fi software found in…

SaaS Identity Governance
21
Feb
2024

6 Ways to Simplify SaaS Identity Governance

With SaaS applications now making up the vast majority of technology used by employees in most organizations, tasks related to…

PlugX Variant DOPLUGS
21
Feb
2024

Mustang Panda Targets Asia with Advanced PlugX Variant DOPLUGS

Feb 21, 2024NewsroomMalware / Cyber Espionage The China-linked threat actor known as Mustang Panda has targeted various Asian countries using…

Cybersecurity for Healthcare
21
Feb
2024

Cybersecurity for Healthcare—Diagnosing the Threat Landscape and Prescribing Solutions for Recovery

On Thanksgiving Day 2023, while many Americans were celebrating, hospitals across the U.S. were doing quite the opposite. Systems were…