Category: TheHackerNews

Apple Zero-Day
28
Jan
2025

Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More

Jan 28, 2025Ravie LakshmananVulnerability / Endpoint Security Apple has released software updates to address several security flaws across its portfolio,…

GitHub Desktop Vulnerability
27
Jan
2025

GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs

Jan 27, 2025Ravie LakshmananVulnerability / Software Security Multiple security vulnerabilities have been disclosed in GitHub Desktop as well as other…

OWASP NHI Top 10
27
Jan
2025

Do We Really Need The OWASP NHI Top 10?

The Open Web Application Security Project has recently introduced a new Top 10 project – the Non-Human Identity (NHI) Top…

Cyber Espionage
27
Jan
2025

GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entities

Jan 27, 2025Ravie LakshmananCyber Espionage / Threat Intelligence A previously unknown threat actor has been observed copying the tradecraft associated…

MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks
27
Jan
2025

MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacks

Jan 27, 2025Ravie LakshmananMalware / SEO Poisoning Threat hunters have detailed an ongoing campaign that leverages a malware loader called…

Llama Framework
26
Jan
2025

Meta’s Llama Framework Flaw Exposes AI Systems to Remote Code Execution Risks

A high-severity security flaw has been disclosed in Meta’s Llama large language model (LLM) framework that, if successfully exploited, could…

LTE and 5G Network Implementations
24
Jan
2025

Over 100 Security Flaws Found in LTE and 5G Network Implementations

Jan 24, 2025Ravie LakshmananTelecom Security / Vulnerability A group of academics has disclosed details of over 100 security vulnerabilities impacting…

SaaS Backup and Recovery
24
Jan
2025

2025 State of SaaS Backup and Recovery Report

The modern workplace has undergone a seismic transformation over recent years, with hybrid work becoming the norm and businesses rapidly…

North Korean IT Worker Scheme
24
Jan
2025

DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violations

The U.S. Department of Justice (DoJ) on Thursday indicted two North Korean nationals, a Mexican national, and two of its…

Android's New Identity Check Feature Locks Device Settings Outside Trusted Locations
24
Jan
2025

Android’s New Identity Check Feature Locks Device Settings Outside Trusted Locations

Jan 24, 2025Ravie LakshmananBiometric / Mobile Security Google has launched a new feature called Identity Check for supported Android devices…

jQuery XSS
24
Jan
2025

CISA Adds Five-Year-Old jQuery XSS Flaw to Exploited Vulnerabilities List

Jan 24, 2025Ravie LakshmananVulnerability / JavaScript The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday placed a now-patched security…

Custom Backdoor Exploiting Magic Packet Vulnerability in Juniper Routers
23
Jan
2025

Custom Backdoor Exploiting Magic Packet Vulnerability in Juniper Routers

Jan 23, 2025Ravie LakshmananMalware / Enterprise Security Enterprise-grade Juniper Networks routers have become the target of a custom backdoor as…