Category: TheHackerNews

A Free Vulnerability Intelligence Platform For Staying Ahead of the Latest Threats
26
Nov
2024

A Free Vulnerability Intelligence Platform For Staying Ahead of the Latest Threats

Nov 26, 2024The Hacker NewsPentest / Vulnerability Assessment When CVEs go viral, separating critical vulnerabilities from the noise is essential…

Zero-Day Firefox and Windows Flaws
26
Nov
2024

RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks

Nov 26, 2024Ravie LakshmananVulnerability / Cybercrime The Russia-aligned threat actor known as RomCom has been linked to the zero-day exploitation…

Active Attacks
26
Nov
2024

CISA Urges Agencies to Patch Critical “Array Networks” Flaw Amid Active Attacks

Nov 26, 2024Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a now-patched…

Crypto Keys via Telegram Bot
25
Nov
2024

PyPI Python Library “aiocpa” Found Exfiltrating Crypto Keys via Telegram Bot

Nov 25, 2024Ravie LakshmananSoftware Supply Chain / Malware The administrators of the Python Package Index (PyPI) repository have quarantined the…

Restore Credentials Tool
25
Nov
2024

Google’s New Restore Credentials Tool Simplifies App Login After Android Migration

Nov 25, 2024Ravie LakshmananMobile Security / Privacy Google has introduced a new feature called Restore Credentials to help users restore…

Cybersecurity Blind Spots in IaC and PaC Tools Expose Cloud Platforms to New Attacks
25
Nov
2024

Cybersecurity Blind Spots in IaC and PaC Tools Expose Cloud Platforms to New Attacks

Nov 25, 2024Ravie LakshmananCloud Security / Supply Chain Attack Cybersecurity researchers have disclosed two new attack techniques against infrastructure-as-code (IaC)…

Security Evasion Techniques
25
Nov
2024

Flying Under the Radar – Security Evasion Techniques

Dive into the evolution of phishing and malware evasion techniques and understand how attackers are using increasingly sophisticated methods to…

Researchers Uncover Malware Using BYOVD to Bypass Antivirus Protections
25
Nov
2024

Researchers Uncover Malware Using BYOVD to Bypass Antivirus Protections

Nov 25, 2024Ravie LakshmananMalware / Windows Security Cybersecurity researchers have uncovered a new malicious campaign that leverages a technique called…

AI-Driven Scams
23
Nov
2024

North Korean Hackers Steal $10M with AI-Driven Scams and Malware on LinkedIn

Nov 23, 2024Ravie LakshmananArtificial Intelligence / Cryptocurrency The North Korea-linked threat actor known as Sapphire Sleet is estimated to have…

Fake News Sites
23
Nov
2024

A Pro-China Influence Network of Fake News Sites

Nov 23, 2024Ravie LakshmananCloud Security / Threat Intelligence Government agencies and non-governmental organizations in the United States have become the…

Cobalt Strike Espionage
22
Nov
2024

China-Linked TAG-112 Targets Tibetan Media with Cobalt Strike Espionage Campaign

Nov 22, 2024Ravie LakshmananCyber Espionage / Malware A China-linked nation-state group called TAG-112 compromised Tibetan media and university websites in…

APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware
22
Nov
2024

APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware

Nov 22, 2024Ravie LakshmananCyber Attack / Malware The threat actor known as Mysterious Elephant has been observed using an advanced…