Category: TheHackerNews

Free Risk Assessment
22
Jan
2025

Free Risk Assessment for GenAI, Identity, Web, and SaaS Risks

Jan 22, 2025The Hacker NewsRisk Assessment / Browser Security As GenAI tools and SaaS platforms become a staple component in…

PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attack
22
Jan
2025

PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attack

A previously undocumented China-aligned advanced persistent threat (APT) group named PlushDaemon has been linked to a supply chain attack targeting…

Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products
22
Jan
2025

Oracle Releases January 2025 Patch to Address 318 Flaws Across Major Products

Jan 22, 2025Ravie LakshmananVulnerability / Enterprise Security Oracle is urging customers to apply its January 2025 Critical Patch Update (CPU)…

Mirai Botnet
22
Jan
2025

Mirai Botnet Launches Record 5.6 Tbps DDoS Attack with 13,000+ IoT Device

Jan 22, 2025Ravie LakshmananBotnet / Network Security Web infrastructure and security company Cloudflare on Tuesday said it detected and blocked…

Murdoc_Botnet
21
Jan
2025

Mirai Variant Murdoc_Botnet Exploits AVTECH IP Cameras and Huawei Routers

Jan 21, 2025Ravie LakshmananBotnet / Vulnerability Cybersecurity researchers have warned of a new large-scale campaign that exploits security flaws in…

MikroTik Routers Hijacked
21
Jan
2025

13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks

Jan 21, 2025Ravie LakshmananEmail Security / Botnet A global network of about 13,000 hijacked Mikrotik routers has been employed as…

Ex-CIA Analyst Pleads Guilty
21
Jan
2025

Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties

A former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to transmitting top secret National Defense Information…

Setting New Standards for Visibility and Control in Penetration Testing Projects
21
Jan
2025

Setting New Standards for Visibility and Control in Penetration Testing Projects

Imagine receiving a penetration test report that leaves you with more questions than answers. Questions like, “Were all functionalities of…

PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers
21
Jan
2025

PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers

Jan 21, 2025Ravie LakshmananCyber Attack / Windows Security Cybersecurity researchers are calling attention to a series of cyber attacks that…

Fake AnyDesk
21
Jan
2025

CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits

Jan 21, 2025Ravie LakshmananMalware / Cyber Threat The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts…

Android Malware
20
Jan
2025

DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection

Jan 20, 2025Ravie LakshmananAndroid / Malware The Threat actor known as DoNot Team has been linked to a new Android…

Tunneling Protocols
20
Jan
2025

Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers

Jan 20, 2025Ravie LakshmananNetwork Security / Vulnerability New research has uncovered security vulnerabilities in multiple tunneling protocols that could allow…