Category: TheHackerNews

Fake reCAPTCHA and Turnstile
19
Mar
2025

ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers

Mar 19, 2025Ravie LakshmananCloud Security / Web Security The threat actors behind the ClearFake campaign are using fake reCAPTCHA or…

Watch This Webinar to Learn How to Eliminate Identity-Based Attacks—Before They Happen
19
Mar
2025

Watch This Webinar to Learn How to Eliminate Identity-Based Attacks—Before They Happen

Mar 19, 2025The Hacker NewsIdentity Security / Webinar In today’s digital world, security breaches are all too common. Despite the…

5 Identity Threat Detection & Response Must-Haves for Super SaaS Security
19
Mar
2025

5 Identity Threat Detection & Response Must-Haves for Super SaaS Security

Mar 19, 2025The Hacker NewsSaaS Security / Threat Detection Identity-based attacks are on the rise. Attackers are targeting identities with…

Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems
19
Mar
2025

Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems

Mar 19, 2025Ravie LakshmananVulnerability / Network Security Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a…

GitHub Action Supply Chain Compromise
19
Mar
2025

CISA Warns of Active Exploitation in GitHub Action Supply Chain Compromise

Mar 19, 2025Ravie LakshmananVulnerability / DevSecOps The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a vulnerability linked…

AMI BMC Vulnerability
18
Mar
2025

New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking

Mar 18, 2025Ravie LakshmananVulnerability / Firmware Security A critical security vulnerability has been disclosed in AMI’s MegaRAC Baseboard Management Controller…

Malicious Code via AI Code Editors
18
Mar
2025

New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors

Mar 18, 2025Ravie LakshmananAI Security / Software Security Cybersecurity researchers have disclosed details of a new supply chain attack vector…

Google Acquires Wiz
18
Mar
2025

Google Acquires Wiz for $32 Billion in Its Biggest Deal Ever to Boost Cloud Security

Mar 18, 2025Ravie LakshmananCloud Security / Enterprise Security Google is making the biggest ever acquisition in its history by purchasing…

Windows Zero-Day Flaw
18
Mar
2025

Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017

Mar 18, 2025Ravie LakshmananVulnerability / Windows Security An unpatched security flaw impacting Microsoft Windows has been exploited by 11 state-sponsored…

New Ad Fraud Campaign
18
Mar
2025

New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads

Mar 18, 2025Ravie LakshmananAd Fraud / Mobile Security Cybersecurity researchers have warned about a large-scale ad fraud campaign that has…

BADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy Abuse
18
Mar
2025

BADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy Abuse

Mar 18, 2025Ravie LakshmananCyber Attack / Malware At least four different threat actors have been identified as involved in an…

Cyber Espionage Operation
18
Mar
2025

China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation

Mar 18, 2025Ravie LakshmananCyber Espionage / Malware Threat hunters have shed more light on a previously disclosed malware campaign undertaken…