Category: TheHackerNews

What Does it Take to be a Full-Fledged Virtual CISO?
03
May
2023

What Does it Take to be a Full-Fledged Virtual CISO?

May 03, 2023The Hacker NewsCISO / Cybersecurity Almost half of MSP clients fell victim to a cyberattack within the last…

Tracking Alert System
03
May
2023

Apple and Google Join Forces to Stop Unauthorized Tracking Alert System

May 03, 2023Ravie LakshmananPrivacy / Technology Apple and Google have teamed up to work on a draft industry-wide specification that’s…

Vulnerability in TBK DVR Devices
03
May
2023

Hackers Exploiting 5-year-old Unpatched Vulnerability in TBK DVR Devices

May 03, 2023Ravie LakshmananSurveillance / Vulnerability Threat actors are actively exploiting an unpatched five-year-old flaw impacting TBK digital video recording…

Remote Terminal Units
03
May
2023

CISA Issues Advisory on Critical RCE Affecting ME RTU Remote Terminal Units

May 03, 2023Ravie LakshmananICS/SCADA Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday released an Industrial Control Systems…

Internet Routing Protocol Software
02
May
2023

Researchers Uncover New BGP Flaws in Popular Internet Routing Protocol Software

May 02, 2023Ravie LakshmananNetwork Security / Vulnerability Cybersecurity researchers have uncovered weaknesses in a software implementation of the Border Gateway…

SaaS Security
02
May
2023

Why Telecoms Struggle with SaaS Security

The telecom industry has always been a tantalizing target for cybercriminals. The combination of interconnected networks, customer data, and sensitive…

BouldSpy Android Spyware
02
May
2023

Iranian Government’s Alleged Tool for Spying on Minority Groups

May 02, 2023Ravie LakshmananMobile Security / Spyware A new Android surveillanceware possibly used by the Iranian government has been used…

RokRAT Malware
02
May
2023

North Korea’s ScarCruft Deploys RokRAT Malware via LNK File Infection Chains

May 02, 2023Ravie LakshmananThreat Intelligence The North Korean threat actor known as ScarCruft began experimenting with oversized LNK files as…

Google Ads
02
May
2023

A Stealthy, Financial Trojan and Info Stealer Delivered through Google Ads

May 02, 2023Ravie LakshmananMalvertising / Cyber Threat In yet another instance of how threat actors are abusing Google Ads to…

Vulnerabilities
02
May
2023

Active Exploitation of TP-Link, Apache, and Oracle Vulnerabilities Detected

May 02, 2023Ravie LakshmananVulnerability / Cyber Threat The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three flaws to…

Decoy Dog Malware
01
May
2023

New Decoy Dog Malware Toolkit Uncovered: Targeting Enterprise Networks

May 01, 2023Ravie Lakshmanan An analysis of over 70 billion DNS records has led to the discovery of a new…

Real-Time Protection Against Lateral Movement
01
May
2023

Real-Time Protection Against Lateral Movement

May 01, 2023The Hacker NewsCyber Threat / Authentication Just a few short years ago, lateral movement was a tactic confined…