Category: TheHackerNews

Money Laundering Operations
04
Mar
2024

How Cybercriminals are Exploiting India’s UPI for Money Laundering Operations

Cybercriminals are using a network of hired money mules in India using an Android-based application to orchestrate a massive money…

SaaS Security 101
04
Mar
2024

From 500 to 5000 Employees

Mar 04, 2024The Hacker NewsSaaS Security / Vulnerability Assessment A company’s lifecycle stage, size, and state have a significant impact…

Hugging Face Platform
04
Mar
2024

Over 100 Malicious AI/ML Models Found on Hugging Face Platform

Mar 04, 2024NewsroomAI Security / Vulnerability As many as 100 malicious artificial intelligence (AI)/machine learning (ML) models have been discovered…

U.S. Critical Infrastructure
04
Mar
2024

Phobos Ransomware Aggressively Targeting U.S. Critical Infrastructure

U.S. cybersecurity and intelligence agencies have warned of Phobos ransomware attacks targeting government and critical infrastructure entities, outlining the various…

Pegasus Spyware
02
Mar
2024

U.S. Court Orders NSO Group to Hand Over Pegasus Spyware Code to WhatsApp

Mar 02, 2024NewsroomSpyware / Privacy A U.S. judge has ordered NSO Group to hand over its source code for Pegasus…

Iranian Hacker
02
Mar
2024

U.S. Charges Iranian Hacker, Offers $10 Million Reward for Capture

Mar 02, 2024NewsroomCybercrime / Social Engineering The U.S. Department of Justice (DoJ) on Friday unsealed an indictment against an Iranian…

Phishing Kit
01
Mar
2024

New Phishing Kit Leverages SMS, Voice Calls to Target Cryptocurrency Users

Mar 01, 2024NewsroomPhishing Kit / Cryptocurrency A novel phishing kit has been observed impersonating the login pages of well-known cryptocurrency…

BIFROSE Linux Variant
01
Mar
2024

New BIFROSE Linux Malware Variant Using Deceptive VMware Domain for Evasion

Mar 01, 2024NewsroomLinux / Cyber Threat Cybersecurity researchers have discovered a new Linux variant of a remote access trojan (RAT)…

Data Downtime and Loss
01
Mar
2024

4 Instructive Postmortems on Data Downtime and Loss

More than a decade ago, the concept of the ‘blameless’ postmortem changed how tech companies recognize failures at scale. John…

Ivanti Connect Secure
01
Mar
2024

Five Eyes Agencies Warn of Active Exploitation of Ivanti Gateway Vulnerabilities

Mar 01, 2024NewsroomRootkit / Threat Intelligence The Five Eyes (FVEY) intelligence alliance has issued a new cybersecurity advisory warning of…

GitHub
01
Mar
2024

GitHub Rolls Out Default Secret Scanning Push Protection for Public Repositories

Mar 01, 2024NewsroomDevSecOps / Cybersecurity GitHub on Thursday announced that it’s enabling secret scanning push protection by default for all…

Silver SAML Attack
29
Feb
2024

New Silver SAML Attack Evades Golden SAML Defenses in Identity Systems

Feb 29, 2024NewsroomThreat Intelligence / Cyber Threat Cybersecurity researchers have disclosed a new attack technique called Silver SAML that can…