Category: TheHackerNews

LockBit Ransomware
20
Feb
2024

LockBit Ransomware’s Darknet Domains Seized in Global Law Enforcement Raid

Feb 20, 2024NewsroomDark Web / Cybercrime An international law enforcement operation has led to the seizure of multiple darknet domains…

Anatsa Android Trojan
19
Feb
2024

Anatsa Android Trojan Bypasses Google Play Security, Expands Reach to New Countries

Feb 19, 2024NewsroomMalware / Mobile Security The Android banking trojan known as Anatsa has expanded its focus to include Slovakia,…

Spyware Firms
19
Feb
2024

Meta Warns of 8 Spyware Firms Targeting iOS, Android, and Windows Devices

Meta Platforms said it took a series of steps to curtail malicious activity from eight different firms based in Italy,…

Network Detection and Response (NDR)
19
Feb
2024

How to Achieve the Best Risk-Based Alerting (Bye-Bye SIEM)

Did you know that Network Detection and Response (NDR) has become the most effective technology to detect cyber threats? In…

Roundcube Flaws
19
Feb
2024

Russian-Linked Hackers Breach 80+ Organizations via Roundcube Flaws

Feb 19, 2024NewsroomCyber Espionage / Vulnerability Threat actors operating with interests aligned to Belarus and Russia have been linked to…

New BASICSTAR Backdoor
19
Feb
2024

Iranian Hackers Target Middle East Policy Experts with New BASICSTAR Backdoor

Feb 19, 2024NewsroomMalware / Cyber Espionage The Iranian-origin threat actor known as Charming Kitten has been linked to a new…

Zeus and IcedID Malware
18
Feb
2024

FBI’s Most-Wanted Zeus and IcedID Malware Mastermind Pleads Guilty

Feb 18, 2024NewsroomMalware / Cybercrime A Ukrainian national has pleaded guilty in the U.S. to his role in two different…

Channels Against Hackers
17
Feb
2024

How Businesses Can Safeguard Their Communication Channels Against Hackers

Efficient communication is a cornerstone of business success. Internally, making sure your team communicates seamlessly helps you avoid friction losses,…

AI-Powered File Identification Tool
17
Feb
2024

Google Open Sources Magika: AI-Powered File Identification Tool

Feb 17, 2024NewsroomArtificial Intelligence / Data Protection Google has announced that it’s open-sourcing Magika, an artificial intelligence (AI)-powered tool to…

Akira Ransomware Exploiting Cisco ASA/FTD Vulnerability
16
Feb
2024

Akira Ransomware Exploiting Cisco ASA/FTD Vulnerability

Feb 16, 2024NewsroomRansomware / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched security flaw…

Cryptocurrency Firms
16
Feb
2024

RustDoor macOS Backdoor Targets Cryptocurrency Firms with Fake Job Offers

Feb 16, 2024NewsroomEndpoint Security / Cryptocurrency Multiple companies operating in the cryptocurrency sector are the target of an ongoing malware…

Bulk Smishing Attacks
16
Feb
2024

Malicious ‘SNS Sender’ Script Abuses AWS for Bulk Smishing Attacks

Feb 16, 2024NewsroomCyber Threat / Cloud Security A malicious Python script known as SNS Sender is being advertised as a…