Category: TheHackerNews

Operational Technology
04
Apr
2024

Considerations for Operational Technology Cybersecurity

Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise’s physical devices, processes,…

Ivanti
04
Apr
2024

Ivanti Rushes Patches for 4 New Flaw in Connect Secure and Policy Secure

Apr 04, 2024NewsroomNetwork Security / Vulnerability Ivanti has released security updates to address four security flaws impacting Connect Secure and…

Cookie-Stealing Attacks
03
Apr
2024

Google Chrome Beta Tests New DBSC Protection Against Cookie-Stealing Attacks

Apr 03, 2024NewsroomBrowser Security / Session Hijacking Google on Tuesday said it’s piloting a new feature in Chrome called Device…

Microsoft
03
Apr
2024

U.S. Cyber Safety Board Slams Microsoft Over Breach by China-Based Hackers

Apr 03, 2024NewsroomData Breach / Incident Response The U.S. Cyber Safety Review Board (CSRB) has criticized Microsoft for a series…

Android Zero-Day Flaw
03
Apr
2024

Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies

Apr 03, 2024NewsroomMobile Security / Zero Day Google has disclosed that two Android security flaws impacting its Pixel smartphones have…

Attack Surface management
03
Apr
2024

Attack Surface Management vs. Vulnerability Management

Apr 03, 2024The Hacker NewsCybersecurity / Penetration Testing Attack surface management (ASM) and vulnerability management (VM) are often confused, and…

Mispadu Trojan
03
Apr
2024

Mispadu Trojan Targets Europe, Thousands of Credentials Compromised

The banking trojan known as Mispadu has expanded its focus beyond Latin America (LATAM) and Spanish-speaking individuals to target users…

WordPress Security Flaw
03
Apr
2024

Critical Security Flaw Found in Popular LayerSlider WordPress Plugin

Apr 03, 2024NewsroomWeb Security / Vulnerability A critical security flaw impacting the LayerSlider plugin for WordPress could be abused to…

XZ Utils for Linux
02
Apr
2024

Malicious Code in XZ Utils for Linux Systems Enables Remote Code Execution

Apr 02, 2024NewsroomFirmware Security / Vulnerability The malicious code inserted into the open-source library XZ Utils, a widely used package…

Chinese Malware
02
Apr
2024

China-linked Hackers Deploy New ‘UNAPIMON’ Malware for Stealthy Operations

Apr 02, 2024NewsroomCyber Espionage / Threat Intelligence A threat activity cluster tracked as Earth Freybug has been observed using a…

Harnessing the Power of CTEM for Cloud Security
02
Apr
2024

Harnessing the Power of CTEM for Cloud Security

Cloud solutions are more mainstream – and therefore more exposed – than ever before. In 2023 alone, a staggering 82%…

Incognito Mode Privacy Lawsuit
02
Apr
2024

Google to Delete Billions of Browsing Records in ‘Incognito Mode’ Privacy Lawsuit Settlement

Apr 02, 2024NewsroomBrowser Security / Data Security Google has agreed to purge billions of data records reflecting users’ browsing activities…