Category: TheHackerNews

ClickFix Tactic to Deploy GolangGhost Malware
03
Apr
2025

Lazarus Group Targets Job Seekers With ClickFix Tactic to Deploy GolangGhost Malware

The North Korean threat actors behind Contagious Interview have adopted the increasingly popular ClickFix social engineering tactic to lure job…

AI Threats Are Evolving Fast — Learn Practical Defense Tactics in this Expert Webinar
03
Apr
2025

AI Threats Are Evolving Fast — Learn Practical Defense Tactics in this Expert Webinar

Apr 03, 2025The Hacker News The rules have changed. Again. Artificial intelligence is bringing powerful new tools to businesses. But…

Google Patches Quick Share Vulnerability
03
Apr
2025

Google Patches Quick Share Vulnerability Enabling Silent File Transfers Without Consent

Apr 03, 2025Ravie LakshmananData Privacy / Vulnerability Cybersecurity researchers have disclosed details of a new vulnerability impacting Google’s Quick Share…

Malware Preloaded on Android
03
Apr
2025

Triada Malware Preloaded on Counterfeit Android Phones Infects 2,600+ Devices

Apr 03, 2025Ravie LakshmananThreat Intelligence / Mobile Security Counterfeit versions of popular smartphone models that are sold at reduced prices…

Europol Dismantles Kidflix With 72,000 CSAM Videos Seized in Major Operation
03
Apr
2025

Europol Dismantles Kidflix With 72,000 CSAM Videos Seized in Major Operation

In one of the largest coordinated law enforcement operations, authorities have dismantled Kidflix, a streaming platform that offered child sexual…

Web Skimmer Campaign
03
Apr
2025

Legacy Stripe API Exploited to Validate Stolen Payment Cards in Web Skimmer Campaign

Apr 03, 2025Ravie LakshmananCybersecurity / Threat Intelligence Threat hunters are warning of a sophisticated web skimmer campaign that leverages a…

Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse
02
Apr
2025

Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse

Apr 02, 2025Ravie LakshmananCloud Security / Vulnerability Cybersecurity researchers have disclosed details of a now-patched privilege escalation vulnerability in Google…

Cryptojacking Malware on Linux Servers
02
Apr
2025

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers

Apr 02, 2025Ravie LakshmananCryptojacking / Malware Cybersecurity researchers have shed light on an “auto-propagating” cryptocurrency mining botnet called Outlaw (aka…

A Step by Step Guide for Service Providers
02
Apr
2025

A Step by Step Guide for Service Providers

Apr 02, 2025The Hacker NewsCompliance / Data Protection Introduction As the cybersecurity landscape evolves, service providers play an increasingly vital…

SSL Misconfigurations
02
Apr
2025

How SSL Misconfigurations Impact Your Attack Surface

Apr 02, 2025The Hacker NewsWeb Security / Attack Surface When assessing an organization’s external attack surface, encryption-related issues (especially SSL…

Hijack Windows Systems
02
Apr
2025

FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites

Apr 02, 2025Ravie LakshmananRansomware / Email Security The financially motivated threat actor known as FIN7 has been linked to a…

New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth
02
Apr
2025

New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth

Apr 02, 2025Ravie LakshmananThreat Detection / Malware Cybersecurity researchers have discovered an updated version of a malware loader called Hijack…