Category: TheHackerNews

Apache Avro SDK Flaw
07
Oct
2024

Critical Apache Avro SDK Flaw Allows Remote Code Execution in Java Applications

Oct 07, 2024Ravie LakshmananOpen Source / Software Security A critical security flaw has been disclosed in the Apache Avro Java…

Facebook Data for Targeted Ads
07
Oct
2024

E.U. Court Limits Meta’s Use of Personal Facebook Data for Targeted Ads

Oct 07, 2024Ravie LakshmananData Privacy / Advertising Europe’s top court has ruled that Meta Platforms must restrict the use of…

VoiceOver Password Vulnerability
05
Oct
2024

Apple Releases Critical iOS and iPadOS Updates to Fix VoiceOver Password Vulnerability

Oct 05, 2024Ravie LakshmananData Privacy / Mobile Security Apple has released iOS and iPadOS updates to address two security issues,…

Major Cyber Fraud Crackdown
04
Oct
2024

U.S. and Microsoft Seize 107 Russian Domains in Major Cyber Fraud Crackdown

Oct 04, 2024Ravie LakshmananPhishing Attack / Cybercrime Microsoft and the U.S. Department of Justice (DoJ) on Thursday announced the seizure…

WordPress LiteSpeed Cache
04
Oct
2024

WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks

Oct 04, 2024Ravie LakshmananWebsite Security / Vulnerability A new high-severity security flaw has been disclosed in the LiteSpeed Cache plugin…

DDoS Attack
04
Oct
2024

Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors

Cloudflare has disclosed that it mitigated a record-breaking distributed denial-of-service (DDoS) attack that peaked at 3.8 terabits per second (Tbps)…

Continuous Threat Exposure Management (CTEM)
04
Oct
2024

How to Get Going with CTEM When You Don’t Know Where to Start

Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations continuously assess and manage cyber risk. It breaks…

2G Exploits and Baseband Attacks
03
Oct
2024

Android 14 Adds New Security Features to Block 2G Exploits and Baseband Attacks

Oct 03, 2024Ravie LakshmananMobile Security / Technology Google has revealed the various security guardrails that have been incorporated into its…

Non-Human Identities
03
Oct
2024

The Secret Weakness Execs Are Overlooking: Non-Human Identities

For years, securing a company’s systems was synonymous with securing its “perimeter.” There was what was safe “inside” and the…

Cryptocurrency Mining and Proxyjacking
03
Oct
2024

New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking

Oct 03, 2024Ravie LakshmananLinux / Malware Linux servers are the target of an ongoing campaign that delivers a stealthy malware…

Stealthy Cyber Attacks
03
Oct
2024

North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks

Oct 03, 2024Ravie LakshmananCyber Espionage / Threat Intelligence Threat actors with ties to North Korea have been observed delivering a…

Phishing and Romance Fraud
03
Oct
2024

INTERPOL Arrests 8 in Major Phishing and Romance Fraud Crackdown in West Africa

Oct 03, 2024Ravie LakshmananCybercrime / Financial Fraud INTERPOL has announced the arrest of eight individuals in Côte d’Ivoire and Nigeria…