Category: TheHackerNews

Google Acquires Wiz
18
Mar
2025

Google Acquires Wiz for $32 Billion in Its Biggest Deal Ever to Boost Cloud Security

Mar 18, 2025Ravie LakshmananCloud Security / Enterprise Security Google is making the biggest ever acquisition in its history by purchasing…

Windows Zero-Day Flaw
18
Mar
2025

Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017

Mar 18, 2025Ravie LakshmananVulnerability / Windows Security An unpatched security flaw impacting Microsoft Windows has been exploited by 11 state-sponsored…

New Ad Fraud Campaign
18
Mar
2025

New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads

Mar 18, 2025Ravie LakshmananAd Fraud / Mobile Security Cybersecurity researchers have warned about a large-scale ad fraud campaign that has…

BADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy Abuse
18
Mar
2025

BADBOX 2.0 Botnet Infects 1 Million Android Devices for Ad Fraud and Proxy Abuse

Mar 18, 2025Ravie LakshmananCyber Attack / Malware At least four different threat actors have been identified as involved in an…

Cyber Espionage Operation
18
Mar
2025

China-Linked MirrorFace Deploys ANEL and AsyncRAT in New Cyber Espionage Operation

Mar 18, 2025Ravie LakshmananCyber Espionage / Malware Threat hunters have shed more light on a previously disclosed malware campaign undertaken…

Okta Security
18
Mar
2025

How to Improve Okta Security in Four Steps

Mar 18, 2025The Hacker NewsAuthentication / Identity Security While Okta provides robust native security features, configuration drift, identity sprawl, and…

StilachiRAT Targeting Credentials and Crypto Wallets
18
Mar
2025

A Stealthy RAT Targeting Credentials and Crypto Wallets

Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to…

Apache Tomcat Vulnerability
17
Mar
2025

Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure

Mar 17, 2025Ravie LakshmananVulnerability / Web Security A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation…

CSS to Evade Spam Filters
17
Mar
2025

Cybercriminals Exploit CSS to Evade Spam Filters and Track Email Users’ Actions

Mar 17, 2025Ravie LakshmananWeb Security / Cyber Threat Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to…

Mirai Botnet Attacks
17
Mar
2025

Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year

Mar 17, 2025Ravie LakshmananBotnet / Vulnerability An unpatched security flaw impacting the Edimax IC-7100 network camera is being exploited by…

Cloud-Native Ransomware Attacks
17
Mar
2025

SANS Institute Warns of Novel Cloud-Native Ransomware Attacks

Mar 17, 2025The Hacker NewsCloud Security / Threat Intelligence The latest Palo Alto Networks Unit 42 Cloud Threat Report found…

GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories
17
Mar
2025

GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories

Mar 17, 2025Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers are calling attention to an incident in which the popular GitHub…