Category: TheHackerNews

Bosch Thermostats and Smart Nutrunners
15
Jan
2024

High-Severity Flaws Uncovered in Bosch Thermostats and Smart Nutrunners

Jan 15, 2024NewsroomOperational Technology / Network Security Multiple security vulnerabilities have been disclosed in Bosch BCC100 thermostats and Rexroth NXA015S-36V-B…

DDoS Attack
15
Jan
2024

DDoS Attacks on the Environmental Services Industry Surge by 61,839% in 2023

Jan 15, 2024NewsroomServer Security / Cyber Attack The environmental services industry witnessed an “unprecedented surge” in HTTP-based distributed denial-of-service (DDoS)…

Denmark's Energy Sector Cyberattacks
14
Jan
2024

New Findings Challenge Attribution in Denmark’s Energy Sector Cyberattacks

Jan 14, 2024NewsroomCyber Attack / Vulnerability The cyber attacks targeting the energy sector in Denmark last year may not have…

Juniper Vulnerability
13
Jan
2024

Critical RCE Vulnerability Uncovered in Juniper SRX Firewalls and EX Switches

Jan 13, 2024NewsroomVulnerability / Network Security Juniper Networks has released updates to fix a critical remote code execution (RCE) vulnerability…

Cryptojacking
13
Jan
2024

29-Year-Old Ukrainian Cryptojacking Kingpin Arrested for Exploiting Cloud Services

Jan 13, 2024NewsroomCryptojacking / Cloud Security A 29-year-old Ukrainian national has been arrested in connection with running a “sophisticated cryptojacking…

Gitlab Vulnerabilities
12
Jan
2024

Urgent: GitLab Releases Patch for Critical Vulnerabilities

Jan 12, 2024NewsroomDevSecOps / Software security GitLab has released security updates to address two critical vulnerabilities, including one that could…

Medusa Ransomware
12
Jan
2024

From Data Leaks to Multi-Extortion

The threat actors associated with the Medusa ransomware have ramped up their activities following the debut of a dedicated data…

Ivanti Zero-Days
12
Jan
2024

Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families

Jan 12, 2024NewsroomVulnerability / Threat Intelligence As many as five different malware families were deployed by suspected nation-state actors as…

Principle to Cybersecurity
12
Jan
2024

Why Attack Simulation is Key to Avoiding a KO

Picture a cybersecurity landscape where defenses are impenetrable, and threats are nothing more than mere disturbances deflected by a strong…

Apache Hadoop and Flink
12
Jan
2024

Cryptominers Targeting Misconfigured Apache Hadoop and Flink with Rootkit in New Attacks

Jan 12, 2024NewsroomCryptocurrency / Malware Cybersecurity researchers have identified a new attack that exploits misconfigurations in Apache Hadoop and Flink…

Microsoft SharePoint Vulnerability
12
Jan
2024

CISA Flags Active Exploitation of Microsoft SharePoint Vulnerability

Jan 12, 2024NewsroomCyber Attack / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security vulnerability…

FBot Hacking Toolkit
11
Jan
2024

New Python-based FBot Hacking Toolkit Aims at Cloud and SaaS Platforms

Jan 11, 2024NewsroomCloud Security / Cyber Attacks A new Python-based hacking tool called FBot has been uncovered targeting web servers,…