Category: TheHackerNews

Deezer Music Downloads
26
Feb
2025

Malicious PyPI Package “automslc” Enables 104K+ Unauthorized Deezer Music Downloads

Feb 26, 2025Ravie LakshmananMalware / Cryptocurrency Cybersecurity researchers have flagged a malicious Python library on the Python Package Index (PyPI)…

CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries
26
Feb
2025

CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries

Feb 26, 2025Ravie LakshmananNetwork Security / Threat Intelligence The Computer Emergency Response Team of Ukraine (CERT-UA) on Tuesday warned of…

Password Cracking Techniques
26
Feb
2025

Three Password Cracking Techniques and How to Defend Against Them

Feb 26, 2025The Hacker NewsIdentity Protection / Password Security Passwords are rarely appreciated until a security breach occurs; suffice to…

New Linux Malware 'Auto-Color' Grants Hackers Full Remote Access to Compromised Systems
26
Feb
2025

New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems

Feb 26, 2025Ravie LakshmananLinux / Endpoint Security Universities and government organizations in North America and Asia have been targeted by…

Leaked Black Basta Chat Logs
26
Feb
2025

Leaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles

More than a year’s worth of internal chat logs from a ransomware gang known as Black Basta have been published…

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware
25
Feb
2025

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware

Feb 25, 2025Ravie LakshmananMalware / Cyber Espionage Opposition activists in Belarus as well as Ukrainian military and government organizations are…

LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile
25
Feb
2025

LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile

Cybersecurity researchers have flagged an updated version of the LightSpy implant that comes equipped with an expanded set of data…

GitVenom Malware
25
Feb
2025

GitVenom Malware Steals $456K in Bitcoin Using Fake GitHub Projects to Hijack Wallets

Feb 25, 2025Ravie LakshmananGaming / Threat Intelligence Cybersecurity researchers are calling attention to an ongoing campaign that’s targeting gamers and…

Truesight.sys Driver Variants
25
Feb
2025

2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT

Feb 25, 2025Ravie LakshmananWindows Security / Vulnerability A large-scale malware campaign has been found leveraging a vulnerable Windows driver associated…

5 Active Malware Campaigns in Q1 2025
25
Feb
2025

5 Active Malware Campaigns in Q1 2025

The first quarter of 2025 has been a battlefield in the world of cybersecurity. Cybercriminals continued launching aggressive new campaigns…

Chinese Cloud Services
25
Feb
2025

FatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services

Various industrial organizations in the Asia-Pacific (APAC) region have been targeted as part of phishing attacks designed to deliver a…

Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA
25
Feb
2025

Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA

Feb 25, 2025Ravie LakshmananNetwork Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two security flaws…