Category: TheHackerNews

Supply Chain Attacks
14
Oct
2024

Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems

Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet,…

Multi-Layered Cloud
14
Oct
2024

5 Steps to Boost Detection and Response in a Multi-Layered Cloud

Oct 14, 2024The Hacker NewsCloud Security / Vulnerability The link between detection and response (DR) practices and cloud security has…

Ivanti CSA Flaws
14
Oct
2024

Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration

Oct 14, 2024Ravie LakshmananNetwork Security / Vulnerability A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti…

Veeam Vulnerability Ransowmare
14
Oct
2024

Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware

Oct 14, 2024Ravie LakshmananRansomware / Vulnerability Threat actors are actively attempting to exploit a now-patched security flaw in Veeam Backup…

OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf
13
Oct
2024

OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf

Oct 13, 2024Ravie Lakshmanan The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw…

Fake Cryptocurrency
12
Oct
2024

FBI Creates Fake Cryptocurrency to Expose Widespread Crypto Market Manipulation

Oct 12, 2024Ravie LakshmananCryptocurrency / Cybercrime The U.S. Department of Justice (DoJ) has announced arrests and charges against several individuals…

11
Oct
2024

GitHub, Telegram Bots, and QR Codes Abused in New Wave of Phishing Attacks

A new tax-themed malware campaign targeting insurance and finance sectors has been observed leveraging GitHub links in phishing email messages…

Hybrid Password Attacks
11
Oct
2024

How Hybrid Password Attacks Work and How to Defend Against Them

Threat actors constantly change tactics to bypass cybersecurity measures, developing innovative methods to steal user credentials. Hybrid password attacks merge…

F5 BIG-IP Cookies
11
Oct
2024

CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance

Oct 11, 2024Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning that it has…

Critical GitLab Vulnerability
11
Oct
2024

New Critical GitLab Vulnerability Could Allow Arbitrary CI/CD Pipeline Execution

Oct 11, 2024Ravie LakshmananDevOps / Vulnerability GitLab has released security updates for Community Edition (CE) and Enterprise Edition (EE) to…

Dark Web Market
11
Oct
2024

Bohemia and Cannabia Dark Web Markets Taken Down After Joint Police Operation

Oct 11, 2024Ravie LakshmananCybercrime / Dark Web The Dutch police have announced the takedown of Bohemia and Cannabia, which has…

AI Cybercrime and Disinformation
10
Oct
2024

OpenAI Blocks 20 Global Malicious Campaigns Using AI for Cybercrime and Disinformation

Oct 10, 2024Ravie LakshmananCybercrime / Disinformation OpenAI on Wednesday said it has disrupted more than 20 operations and deceptive networks…