Category: TheHackerNews

EvilProxy Phishing Kit
09
Oct
2023

Cybercriminals Using EvilProxy Phishing Kit to Target Senior Executives in U.S. Firms

Oct 09, 2023NewsroomCredential Harvesting / Hacking Senior executives working in U.S.-based organizations are being targeted by a new phishing campaign…

AI and LLM Security
09
Oct
2023

How vCISOs Can Navigating the Complex World of AI and LLM Security

Oct 09, 2023The Hacker NewsArtificial Intelligence / CISO In today’s rapidly evolving technological landscape, the integration of Artificial Intelligence (AI)…

IoT Security
09
Oct
2023

High-Severity Flaws in ConnectedIO’s 3G/4G Routers Raise Concerns for IoT Security

Oct 09, 2023NewsroomVulnerability / IoT Security Multiple high-severity security vulnerabilities have been disclosed in ConnectedIO’s ER2000 edge routers and the…

Generative AI
09
Oct
2023

“I Had a Dream” and Generative AI Jailbreaks

Oct 09, 2023The Hacker NewsArtificial Intelligence / “Of course, here’s an example of simple code in the Python programming language…

Gaza-Linked Cyber Threat Actor Targets Israeli Energy and Defense Sectors
09
Oct
2023

Gaza-Linked Cyber Threat Actor Targets Israeli Energy and Defense Sectors

Oct 09, 2023NewsroomCyber War / Cyber Threat A Gaza-based threat actor has been linked to a series of cyber attacks…

Cryptocurrency
06
Oct
2023

North Korea’s Lazarus Group Launders $900 Million in Cryptocurrency

Oct 06, 2023NewsroomCyber Crime / Cryptocurrency As much as $7 billion in cryptocurrency has been illicitly laundered through cross-chain crime,…

Cobalt Strike
06
Oct
2023

Chinese Hackers Target Semiconductor Firms in East Asia with Cobalt Strike

Oct 06, 2023NewsroomCyber Attack / Malware Threat actors have been observed targeting semiconductor companies in East Asia with lures masquerading…

New OS Tool Tells You Who Has Access to What Data
06
Oct
2023

New OS Tool Tells You Who Has Access to What Data

Ensuring sensitive data remains confidential, protected from unauthorized access, and compliant with data privacy regulations is paramount. Data breaches result…

GitHub
06
Oct
2023

GitHub’s Secret Scanning Feature Now Covers AWS, Microsoft, Google, and Slack

Oct 06, 2023NewsroomProgramming / Software Security GitHub has announced an improvement to its secret scanning feature that extends validity checks…

BMC Firmware
06
Oct
2023

Supermicro’s BMC Firmware Found Vulnerable to Multiple Critical Vulnerabilities

Oct 06, 2023NewsroomServer Security / Vulnerability Multiple security vulnerabilities have been disclosed in the Intelligent Platform Management Interface (IPMI) firmware…

QakBot
05
Oct
2023

QakBot Threat Actors Still in Action, Using Ransom Knight and Remcos RAT in Latest Attacks

Oct 05, 2023NewsroomRansomware / Malware Despite the disruption to its infrastructure, the threat actors behind the QakBot malware have been…

Android banking trojan
05
Oct
2023

GoldDigger Android Trojan Targets Banking Apps in Asia Pacific Countries

Oct 05, 2023NewsroomMobile Security / crypto A new Android banking trojan named GoldDigger has been found targeting several financial applications…