Category: TheHackerNews

Okta Security
18
Mar
2025

How to Improve Okta Security in Four Steps

Mar 18, 2025The Hacker NewsAuthentication / Identity Security While Okta provides robust native security features, configuration drift, identity sprawl, and…

StilachiRAT Targeting Credentials and Crypto Wallets
18
Mar
2025

A Stealthy RAT Targeting Credentials and Crypto Wallets

Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to…

Apache Tomcat Vulnerability
17
Mar
2025

Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure

Mar 17, 2025Ravie LakshmananVulnerability / Web Security A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation…

CSS to Evade Spam Filters
17
Mar
2025

Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users’ Actions

Mar 17, 2025Ravie LakshmananWeb Security / Cyber Threat Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to…

Mirai Botnet Attacks
17
Mar
2025

Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year

Mar 17, 2025Ravie LakshmananBotnet / Vulnerability An unpatched security flaw impacting the Edimax IC-7100 network camera is being exploited by…

Cloud-Native Ransomware Attacks
17
Mar
2025

SANS Institute Warns of Novel Cloud-Native Ransomware Attacks

Mar 17, 2025The Hacker NewsCloud Security / Threat Intelligence The latest Palo Alto Networks Unit 42 Cloud Threat Report found…

GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories
17
Mar
2025

GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories

Mar 17, 2025Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers are calling attention to an incident in which the popular GitHub…

Malicious PyPI Packages
15
Mar
2025

Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before Removal

Mar 15, 2025Ravie Lakshmanan Malware / Supply Chain Security Cybersecurity researchers have warned of a malicious campaign targeting users of…

Israeli LockBit Developer Rostislav Panev
14
Mar
2025

Alleged Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime Charges

Mar 14, 2025Ravie LakshmananCybercrime / Ransomware A 51-year-old dual Russian and Israeli national who is alleged to be a developer…

End-to-End Encryption for RCS
14
Mar
2025

GSMA Confirms End-to-End Encryption for RCS, Enabling Secure Cross-Platform Messaging

Mar 14, 2025Ravie LakshmananMobile Security / Encryption The GSM Association (GSMA) has formally announced support for end-to-end encryption (E2EE) for…

Policy Enforcement
14
Mar
2025

Why Most Microsegmentation Projects Fail—And How Andelyn Biosciences Got It Right

Most microsegmentation projects fail before they even get off the ground—too complex, too slow, too disruptive. But Andelyn Biosciences proved…

Ransomware Demo
14
Mar
2025

See How Hackers Breach Networks and Demand a Ransom

Mar 14, 2025The Hacker NewsData Protection / Ransomware Cyber threats evolve daily. In this live webinar, learn exactly how ransomware…