Category: TheHackerNews

Spam Emails and Phone Calls
14
May
2024

Ongoing Campaign Bombarded Enterprises with Spam Emails and Phone Calls

Cybersecurity researchers have uncovered an ongoing social engineering campaign that bombards enterprises with spam emails with the goal of obtaining…

Advanced Authentication
14
May
2024

6 Mistakes Organizations Make When Deploying Advanced Authentication

May 14, 2024The Hacker NewsCyber Threat / Machine Learning Deploying advanced authentication measures is key to helping organizations address their…

Bluetooth Tracking Devices
14
May
2024

Apple and Google Launch Cross-Platform Feature to Detect Unwanted Bluetooth Tracking Devices

May 14, 2024NewsroomLocation Tracking / Privacy Apple and Google on Monday officially announced the rollout of a new feature that…

A Threat-Modeling Framework for Embedded Devices
13
May
2024

A Threat-Modeling Framework for Embedded Devices

May 13, 2024Newsroom The MITRE Corporation has officially made available a new threat-modeling framework called EMB3D for makers of embedded…

2024 Browser Security Report
13
May
2024

The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security Minefield

May 13, 2024The Hacker NewsBrowser Security / Data Protection With the browser becoming the most prevalent workspace in the enterprise,…

Black Basta Ransomware
13
May
2024

Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia

The Black Basta ransomware-as-a-service (RaaS) operation has targeted more than 500 private industry and critical infrastructure entities in North America,…

Cinterion Cellular Modems
13
May
2024

Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries

May 13, 2024NewsroomVulnerability / IoT Security Cybersecurity researchers have disclosed multiple security flaws in Cinterion cellular modems that could be…

SHQ Response Platform
13
May
2024

SHQ Response Platform and Risk Centre to Enable Management and Analysts Alike

May 13, 2024The Hacker NewsThreat Detection / SoC / SIEM In the last decade, there has been a growing disconnect…

Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
13
May
2024

Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo

May 13, 2024NewsroomSoftware Security / Malware Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot…

FIN7 Hacker Group
11
May
2024

FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT

The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a…

North Korean Hackers
10
May
2024

North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms

May 10, 2024NewsroomMalware / Cyber Espionage The North Korean threat actor tracked as Kimsuky has been observed deploying a previously…

AI-Powered Threat Hunting for Cybersecurity Pros (Webinar)
10
May
2024

AI-Powered Threat Hunting for Cybersecurity Pros (Webinar)

May 10, 2024The Hacker NewsArtificial Intelligence / Threat Hunting Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge…