Category: TheHackerNews

Npm malware
19
Jan
2024

Npm Trojan Bypasses UAC, Installs AnyDesk with “Oscompatible” Package

Jan 19, 2024NewsroomSoftware Security / Spyware A malicious package uploaded to the npm registry has been found deploying a sophisticated…

Ivanti EPMM Vulnerability
19
Jan
2024

U.S. Cybersecurity Agency Warns of Actively Exploited Ivanti EPMM Vulnerability

Jan 19, 2024NewsroomCyber Theat / Zero-Day The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical…

Docker Malware
18
Jan
2024

New Docker Malware Steals CPU for Crypto & Drives Fake Website Traffic

Jan 18, 2024NewsroomServer Security / Cryptocurrency Vulnerable Docker services are being targeted by a novel campaign in which the threat…

Russian COLDRIVER Hackers Expand Beyond Phishing with Custom Malware
18
Jan
2024

Russian COLDRIVER Hackers Expand Beyond Phishing with Custom Malware

The Russia-linked threat actor known as COLDRIVER has been observed evolving its tradecraft to go beyond credential harvesting to deliver…

MFA Spamming
18
Jan
2024

When Security Measures Go Wrong

Jan 18, 2024The Hacker NewsAuthentication Security / Passwords In today’s digital landscape, traditional password-only authentication systems have proven to be…

Poisoning Attacks
18
Jan
2024

TensorFlow CI/CD Flaw Exposed Supply Chain to Poisoning Attacks

Jan 18, 2024NewsroomSupply Chain Attacks / AI Security Continuous integration and continuous delivery (CI/CD) misconfigurations discovered in the open-source TensorFlow…

PixieFail UEFI Flaws
18
Jan
2024

PixieFail UEFI Flaws Expose Millions of Computers to RCE, DoS, and Data Theft

Jan 18, 2024NewsroomFirmware Security / Vulnerability Multiple security vulnerabilities have been disclosed in the TCP/IP network protocol stack of an…

Iranian Hackers Masquerade as Journalists to Spy on Israel-Hamas War Experts
18
Jan
2024

Iranian Hackers Masquerade as Journalists to Spy on Israel-Hamas War Experts

Jan 18, 2024NewsroomCyber Espionage / Threat Intelligence High-profile individuals working on Middle Eastern affairs at universities and research organizations in…

Pegasus on Your iPhone
17
Jan
2024

New iShutdown Method Exposes Hidden Spyware Like Pegasus on Your iPhone

Jan 17, 2024NewsroomSpyware / Forensic Analysis Cybersecurity researchers have identified a “lightweight method” called iShutdown for reliably identifying signs of…

Free Discovery And Risk Reduction Automation
17
Jan
2024

Combating IP Leaks into AI Applications with Free Discovery and Risk Reduction Automation

Wing Security announced today that it now offers free discovery and a paid tier for automated control over thousands of…

point-of-sale
17
Jan
2024

PAX PoS Terminal Flaw Could Allow Attackers to Tamper with Transactions

Jan 17, 2024NewsroomFinancial Data / Vulnerability The point-of-sale (PoS) terminals from PAX Technology are impacted by a collection of high-severity…

Art of Privilege Escalation
17
Jan
2024

Webinar: The Art of Privilege Escalation

Jan 17, 2024The Hacker NewsCyber Threat / Live Webinar In the digital age, the battleground for security professionals is not…