Category: TheHackerNews

Israeli Paragon Spyware
20
Mar
2025

Six Governments Likely Use Israeli Paragon Spyware to Hack IM Apps and Harvest Data

Mar 20, 2025Ravie LakshmananSpyware / Mobile Security The governments of Australia, Canada, Cyprus, Denmark, Israel, and Singapore are likely customers…

Why Continuous Compliance Monitoring Is Essential For IT Managed Service Providers
20
Mar
2025

Why Continuous Compliance Monitoring Is Essential For IT Managed Service Providers

Regulatory compliance is no longer just a concern for large enterprises. Small and mid-sized businesses (SMBs) are increasingly subject to…

Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal Messages
20
Mar
2025

Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal Messages

Mar 20, 2025Ravie LakshmananCybercrime / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of a new campaign…

PHP Flaw to Deploy Quasar RAT
19
Mar
2025

Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners

Mar 19, 2025Ravie LakshmananThreat Intelligence / Cryptojacking Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurrency…

Leaked Black Basta Chats Suggest Russian Officials Aided Leader's Escape from Armenia
19
Mar
2025

Leaked Black Basta Chats Suggest Russian Officials Aided Leader’s Escape from Armenia

Mar 19, 2025Ravie LakshmananCybercrime / Threat Intelligence The recently leaked trove of internal chat logs among members of the Black…

Fake reCAPTCHA and Turnstile
19
Mar
2025

ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers

Mar 19, 2025Ravie LakshmananCloud Security / Web Security The threat actors behind the ClearFake campaign are using fake reCAPTCHA or…

Watch This Webinar to Learn How to Eliminate Identity-Based Attacks—Before They Happen
19
Mar
2025

Watch This Webinar to Learn How to Eliminate Identity-Based Attacks—Before They Happen

Mar 19, 2025The Hacker NewsIdentity Security / Webinar In today’s digital world, security breaches are all too common. Despite the…

5 Identity Threat Detection & Response Must-Haves for Super SaaS Security
19
Mar
2025

5 Identity Threat Detection & Response Must-Haves for Super SaaS Security

Mar 19, 2025The Hacker NewsSaaS Security / Threat Detection Identity-based attacks are on the rise. Attackers are targeting identities with…

Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems
19
Mar
2025

Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systems

Mar 19, 2025Ravie LakshmananVulnerability / Network Security Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a…

GitHub Action Supply Chain Compromise
19
Mar
2025

CISA Warns of Active Exploitation in GitHub Action Supply Chain Compromise

Mar 19, 2025Ravie LakshmananVulnerability / DevSecOps The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a vulnerability linked…

AMI BMC Vulnerability
18
Mar
2025

New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Bricking

Mar 18, 2025Ravie LakshmananVulnerability / Firmware Security A critical security vulnerability has been disclosed in AMI’s MegaRAC Baseboard Management Controller…

Malicious Code via AI Code Editors
18
Mar
2025

New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors

Mar 18, 2025Ravie LakshmananAI Security / Software Security Cybersecurity researchers have disclosed details of a new supply chain attack vector…