Category: TheHackerNews

CISA
03
Jul
2023

CISA Flags 8 Actively Exploited Flaws in Samsung and D-Link Devices

Jul 03, 2023Ravie LakshmananMobile Security / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has placed a set…

WordPress Spam Protection
03
Jul
2023

Improve Your Security WordPress Spam Protection With CleanTalk Anti-Spam

Jul 03, 2023The Hacker NewsWebsite Security Tool Every website owner or webmaster grapples with the issue of spam on their…

Meduza Stealer
03
Jul
2023

Evasive Meduza Stealer Targets 19 Password Managers and 76 Crypto Wallets

Jul 03, 2023Ravie LakshmananMalware / Hacking In yet another sign of a lucrative crimeware-as-a-service (CaaS) ecosystem, cybersecurity researchers have discovered…

BlackCat Ransomware
03
Jul
2023

BlackCat Operators Distributing Ransomware Disguised as WinSCP via Malvertising

Threat actors associated with the BlackCat ransomware have been observed employing malvertising tricks to distribute rogue installers of the WinSCP…

Unpatched WordPress Plugin Flaw
01
Jul
2023

Hackers Exploiting Unpatched WordPress Plugin Flaw to Create Secret Admin Accounts

Jul 01, 2023Ravie LakshmananWebsite Security / Cyber Threat As many as 200,000 WordPress websites are at risk of ongoing attacks…

macOS hacking
01
Jul
2023

New ‘Rustbucket’ Malware Variant Targeting macOS Users

Jul 01, 2023Ravie LakshmananEndpoint Security / Malware Researchers have pulled back the curtain on an updated version of an Apple…

Iranian Hackers Charming Kitten Utilize POWERSTAR Backdoor in Targeted Espionage Attacks
30
Jun
2023

Iranian Hackers Charming Kitten Utilize POWERSTAR Backdoor in Targeted Espionage Attacks

Jun 30, 2023The Hacker NewsCyber Espionage/ Malware Charming Kitten, the nation-state actor affiliated with Iran’s Islamic Revolutionary Guard Corps (IRGC),…

SaaS Security
30
Jun
2023

3 Reasons SaaS Security is the Imperative First Step to Ensuring Secure AI Usage

Jun 30, 2023The Hacker NewsSaaS Security / Artificial Intelligence, In today’s fast-paced digital landscape, the widespread adoption of AI (Artificial…

Proxyjacking Campaign
30
Jun
2023

Cybercriminals Hijacking Vulnerable SSH Servers in New Proxyjacking Campaign

Jun 30, 2023Ravie LakshmananServer Security / Cyber Threat An active financially motivated campaign is targeting vulnerable SSH servers to covertly…

WhatsApp
30
Jun
2023

WhatsApp Upgrades Proxy Feature Against Internet Shutdowns

Jun 30, 2023Ravie LakshmananPrivacy / Tech Meta’s WhatsApp has rolled out updates to its proxy feature, allowing more flexibility in…

Most Dangerous Software Weaknesses
30
Jun
2023

MITRE Unveils Top 25 Most Dangerous Software Weaknesses of 2023: Are You at Risk?

Jun 30, 2023Ravie LakshmananVulnerability / Software Security MITRE has released its annual list of the Top 25 “most dangerous software…

Iran's MuddyWater Evolves with a New Cyber Weapon
29
Jun
2023

Iran’s MuddyWater Evolves with a New Cyber Weapon

Jun 29, 2023Ravie Lakshmanan The Iranian state-sponsored group dubbed MuddyWater has been attributed to a previously unseen command-and-control (C2) framework…