Category: TheHackerNews

Rsync File Synchronization Tool
15
Jan
2025

Google Cloud Researchers Uncover Flaws in Rsync File Synchronization Tool

Jan 15, 2025Ravie LakshmananVulnerability / Software Update As many as six security vulnerabilities have been disclosed in the popular Rsync…

FBI Deletes PlugX Malware
15
Jan
2025

FBI Deletes PlugX Malware from 4,250 Hacked Computers in Multi-Month Operation

Jan 15, 2025Ravie LakshmananMalware / Threat Intelligence The U.S. Department of Justice (DoJ) on Tuesday disclosed that a court-authorized operation…

Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks
15
Jan
2025

Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks

Jan 15, 2025Ravie LakshmananVulnerability / Server Security Cybersecurity researchers have disclosed multiple security flaws in SimpleHelp remote access software that…

Microsoft Latest Security Update
15
Jan
2025

3 Actively Exploited Zero-Day Flaws Patched in Microsoft’s Latest Security Update

Microsoft kicked off 2025 with a new set of patches for a total of 161 security vulnerabilities across its software…

Google OAuth Vulnerability
14
Jan
2025

Google OAuth Vulnerability Exposes Millions via Failed Startup Domains

Jan 14, 2025Ravie LakshmananVulnerability / Data Privacy New research has pulled back the curtain on a “deficiency” in Google’s “Sign…

macOS SIP Vulnerability
14
Jan
2025

Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation

Jan 14, 2025Ravie LakshmananEndpoint Security / Vulnerability Microsoft has shed light on a now-patched security flaw impacting Apple macOS that,…

Espionage Campaign
14
Jan
2025

Russian-Linked Hackers Target Kazakhstan in Espionage Campaign with HATVIBE Malware

Russia-linked threat actors have been attributed to an ongoing cyber espionage campaign targeting Kazakhstan as part of the Kremlin’s efforts…

4 Reasons Your SaaS Attack Surface Can No Longer be Ignored
14
Jan
2025

4 Reasons Your SaaS Attack Surface Can No Longer be Ignored

What do identity risks, data security risks and third-party risks all have in common? They are all made much worse…

Zero-Day Vulnerability
14
Jan
2025

Zero-Day Vulnerability Suspected in Attacks on Fortinet Firewalls with Exposed Interfaces

Jan 14, 2025Ravie LakshmananVulnerability / Network Security Threat hunters are calling attention to a new campaign that has targeted Fortinet…

HuiOne Telegram Market
14
Jan
2025

Illicit HuiOne Telegram Market Surpasses Hydra, Hits $24 Billion in Crypto Transactions

Jan 14, 2025Ravie LakshmananCryptocurrency / Online Scam The Telegram-based online marketplace known as HuiOne Guarantee and its vendors have cumulatively…

CISA Adds Second BeyondTrust Flaw to KEV Catalog Amid Active Attacks
14
Jan
2025

CISA Adds Second BeyondTrust Flaw to KEV Catalog Amid Active Attacks

Jan 14, 2025Ravie LakshmananVulnerability / Cybersecurity The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a second security…

Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners
13
Jan
2025

Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners

Jan 13, 2025Ravie LakshmananVulnerability / Cloud Security A recently disclosed critical security flaw impacting the Aviatrix Controller cloud networking platform…