Category: TheHackerNews

Android Malware Apps
19
Aug
2023

Thousands of Android Malware Apps Using Stealthy APK Compression to Evade Detection

Aug 19, 2023THNMobile Security / Malware Threat actors are using Android Package (APK) files with unknown or unsupported compression methods…

Zimbra Email
18
Aug
2023

New Wave of Attack Campaign Targeting Zimbra Email Users for Credential Theft

Aug 18, 2023THNEmail Seucrity / Cyber Attack A new “mass-spreading” social engineering campaign is targeting users of the Zimbra Collaboration…

Lessons from the Storm 0558 Hack
18
Aug
2023

Lessons from the Storm 0558 Hack

While IT security managers in companies and public administrations rely on the concept of Zero Trust, APTS (Advanced Persistent Threats)…

Cybercriminal
18
Aug
2023

14 Suspected Cybercriminals Arrested Across Africa in Coordinated Crackdown

Aug 18, 2023THNCyber Crime / Hacking News A coordinated law enforcement operation across 25 African countries has led to the…

BlackCat Ransomware
18
Aug
2023

New BlackCat Ransomware Variant Adopts Advanced Impacket and RemCom Tools

Microsoft on Thursday disclosed that it found a new version of the BlackCat ransomware (aka ALPHV and Noberus) that embeds…

18
Aug
2023

Google Chrome’s New Feature Alerts Users About Auto-Removal of Malicious Extensions

Aug 18, 2023THNBrowser Security / Malware Google has announced plans to add a new feature in the upcoming version of…

Sneaky Privilege Escalation Method Bypasses Windows Security
17
Aug
2023

Sneaky Privilege Escalation Method Bypasses Windows Security

Aug 17, 2023THNEndpoint Security / Vulnerability A previously undetected attack method called NoFilter has been found to abuse the Windows…

17
Aug
2023

China-Linked Bronze Starlight Group Targeting Gambling Sector with Cobalt Strike Beacons

Aug 17, 2023THNCyber Attack / Malware An ongoing cyber attack campaign originating from China is targeting the Southeast Asian gambling…

Apple Airplane Mode
17
Aug
2023

New Apple iOS 16 Exploit Enables Stealthy Cellular Access Under Fake Airplane Mode

Aug 17, 2023THNMobile Security / Vulnerability Cybersecurity researchers have documented a novel post-exploit persistence technique on iOS 16 that could…

Cryptojacking and Proxyjacking
17
Aug
2023

New LABRAT Campaign Exploits GitLab Flaw for Cryptojacking and Proxyjacking Activities

Aug 17, 2023THNCryptojacking / Proxyjacking A new, financially motivated operation dubbed LABRAT has been observed weaponizing a now-patched critical flaw…

Network Monitoring
17
Aug
2023

Why You Need Continuous Network Monitoring?

Changes in the way we work have had significant implications for cybersecurity, not least in network monitoring. Workers no longer…

Russian Hackers
17
Aug
2023

Russian Hackers Use Zulip Chat App for Covert C&C in Diplomatic Phishing Attacks

Aug 17, 2023THNCyber Espionage / Malware An ongoing campaign targeting ministries of foreign affairs of NATO-aligned countries points to the…