Category: TheHackerNews

Microsoft Latest Security Update
15
Jan
2025

3 Actively Exploited Zero-Day Flaws Patched in Microsoft’s Latest Security Update

Microsoft kicked off 2025 with a new set of patches for a total of 161 security vulnerabilities across its software…

Google OAuth Vulnerability
14
Jan
2025

Google OAuth Vulnerability Exposes Millions via Failed Startup Domains

Jan 14, 2025Ravie LakshmananVulnerability / Data Privacy New research has pulled back the curtain on a “deficiency” in Google’s “Sign…

macOS SIP Vulnerability
14
Jan
2025

Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation

Jan 14, 2025Ravie LakshmananEndpoint Security / Vulnerability Microsoft has shed light on a now-patched security flaw impacting Apple macOS that,…

Espionage Campaign
14
Jan
2025

Russian-Linked Hackers Target Kazakhstan in Espionage Campaign with HATVIBE Malware

Russia-linked threat actors have been attributed to an ongoing cyber espionage campaign targeting Kazakhstan as part of the Kremlin’s efforts…

4 Reasons Your SaaS Attack Surface Can No Longer be Ignored
14
Jan
2025

4 Reasons Your SaaS Attack Surface Can No Longer be Ignored

What do identity risks, data security risks and third-party risks all have in common? They are all made much worse…

Zero-Day Vulnerability
14
Jan
2025

Zero-Day Vulnerability Suspected in Attacks on Fortinet Firewalls with Exposed Interfaces

Jan 14, 2025Ravie LakshmananVulnerability / Network Security Threat hunters are calling attention to a new campaign that has targeted Fortinet…

HuiOne Telegram Market
14
Jan
2025

Illicit HuiOne Telegram Market Surpasses Hydra, Hits $24 Billion in Crypto Transactions

Jan 14, 2025Ravie LakshmananCryptocurrency / Online Scam The Telegram-based online marketplace known as HuiOne Guarantee and its vendors have cumulatively…

CISA Adds Second BeyondTrust Flaw to KEV Catalog Amid Active Attacks
14
Jan
2025

CISA Adds Second BeyondTrust Flaw to KEV Catalog Amid Active Attacks

Jan 14, 2025Ravie LakshmananVulnerability / Cybersecurity The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a second security…

Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners
13
Jan
2025

Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners

Jan 13, 2025Ravie LakshmananVulnerability / Cloud Security A recently disclosed critical security flaw impacting the Aviatrix Controller cloud networking platform…

Expired Domains
13
Jan
2025

Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems

Jan 13, 2025Ravie LakshmananMalware / Domain Security No less than 4,000 unique web backdoors previously deployed by various threat actors…

WordPress Skimmers
13
Jan
2025

WordPress Skimmers Evade Detection by Injecting Themselves into Database Tables

Cybersecurity researchers are warning of a new stealthy credit card skimmer campaign that targets WordPress e-commerce checkout pages by inserting…

AI for Harmful Content Creation
11
Jan
2025

Microsoft Sues Hacking Group Exploiting Azure AI for Harmful Content Creation

Jan 11, 2025Ravie LakshmananAI Security / Cybersecurity Microsoft has revealed that it’s pursuing legal action against a “foreign-based threat–actor group”…