Category: TheHackerNews

Cybersecurity Certifications
27
Sep
2024

The Gateway to Career Advancement

Sep 27, 2024The Hacker NewsCybersecurity Certifications In today’s fast-evolving digital landscape, cybersecurity has become a cornerstone of organizational resilience. As…

Cybercrime and Money Laundering
27
Sep
2024

U.S. Sanctions Two Crypto Exchanges for Facilitating Cybercrime and Money Laundering

The U.S. government on Thursday sanctioned two cryptocurrency exchanges and unsealed an indictment against a Russian national for his alleged…

NVIDIA Container Toolkit Vulnerability
27
Sep
2024

Critical NVIDIA Container Toolkit Vulnerability Could Grant Full Host Access to Attackers

Sep 27, 2024Ravie LakshmananContainer Security / Cloud Computing A critical security flaw has been disclosed in the NVIDIA Container Toolkit…

Remotely Controlled Kia Cars
26
Sep
2024

Hackers Could Have Remotely Controlled Kia Cars Using Only License Plates

Sep 26, 2024Ravie LakshmananAutomotive Industry / Technology Cybersecurity researchers have disclosed a set of now patched vulnerabilities in Kia vehicles…

Watering Hole Attack
26
Sep
2024

Watering Hole Attack on Kurdish Sites Distributing Malicious APKs and Spyware

Sep 26, 2024Ravie LakshmananCyber Espionage / Mobile Security As many as 25 websites linked to the Kurdish minority have been…

Overloaded with SIEM Alerts? Discover Effective Strategies in This Expert-Led Webinar
26
Sep
2024

Overloaded with SIEM Alerts? Discover Effective Strategies in This Expert-Led Webinar

Sep 26, 2024The Hacker NewsThreat Detection / IT Security Imagine trying to find a needle in a haystack, but the…

KLogEXE and FPSpy Malware
26
Sep
2024

N. Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted Attacks

Sep 26, 2024Ravie LakshmananCyber Attack / Malware Threat actors with ties to North Korea have been observed leveraging two new…

Vulnerability Prioritization
26
Sep
2024

What’s the Best Approach to Vulnerability Prioritization?

Many businesses rely on the Common Vulnerability Scoring System (CVSS) to assess the severity of vulnerabilities for prioritization. While these…

India-Linked Hackers
26
Sep
2024

Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities

Sep 26, 2024Ravie LakshmananCloud Security / Cyber Espionage An advanced threat actor with an India nexus has been observed using…

Cyber Espionage Campaign
26
Sep
2024

Chinese Hackers Infiltrate U.S. Internet Providers in Cyber Espionage Campaign

Sep 26, 2024Ravie LakshmananCyber Espionage / Hacking Nation-state threat actors backed by Beijing broke into a “handful” of U.S. internet…

Android Memory Vulnerabilities
25
Sep
2024

Google’s Shift to Rust Programming Cuts Android Memory Vulnerabilities by 52%

Sep 25, 2024Ravie LakshmananSecure Coding / Mobile Security Google has revealed that its transition to memory-safe languages such as Rust…

Splinter Post-Exploitation Tool
25
Sep
2024

Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool

Sep 25, 2024Ravie LakshmananPenetration Testing / Cyber Threat Cybersecurity researchers have flagged the discovery of a new post-exploitation red team…