Category: TheHackerNews

Android Malware
29
Jun
2023

Flutter-Based Android Malware Targets Credit Cards and 2FA Codes

Jun 29, 2023Ravie LakshmananMobile Security / Malware Cybersecurity researchers have shared the inner workings of an Android malware family called…

Android Spyware
29
Jun
2023

Android Spy App LetMeSpy Suffers Major Data Breach, Exposing Users’ Personal Data

Jun 29, 2023Ravie LakshmananMobile Security / Privacy Android-based phone monitoring app LetMeSpy has disclosed a security breach that allowed an…

North Korean Hacker
29
Jun
2023

North Korean Hacker Group Andariel Strikes with New EarlyRat Malware

Jun 29, 2023Ravie LakshmananVulnerability / Malware The North Korea-aligned threat actor known as Andariel leveraged a previously undocumented malware called…

Artificial intelligence
29
Jun
2023

The Right Way to Enhance CTI with AI (Hint: It’s the Data)

Cyber threat intelligence is an effective weapon in the ongoing battle to protect digital assets and infrastructure – especially when…

Social Login Plugin for WordPress
29
Jun
2023

Critical Security Flaw in Social Login Plugin for WordPress Exposes Users’ Accounts

Jun 29, 2023Ravie LakshmananWebsite Security / Vulnerability A critical security flaw has been disclosed in miniOrange’s Social Login and Register…

Info Stealer Malware
29
Jun
2023

Newly Uncovered ThirdEye Windows-Based Malware Steals Sensitive Data

Jun 29, 2023Ravie LakshmananCyber Threat / Hacking A previously undocumented Windows-based information stealer called ThirdEye has been discovered in the…

New Electromagnetic Attacks on Drones Could Let Attackers Take Control
28
Jun
2023

New Electromagnetic Attacks on Drones Could Let Attackers Take Control

Jun 28, 2023Ravie LakshmananFirmware Security / Tech Drones that don’t have any known security weaknesses could be the target of…

CryptosLabs Scam Ring
28
Jun
2023

CryptosLabs Scam Ring Targets French-Speaking Investors, Rakes in €480 Million

Jun 28, 2023Ravie LakshmananCyber Crime / Cryptocurrency Cybersecurity researchers have exposed the workings of a scam ring called CryptosLabs that’s…

8Base Ransomware
28
Jun
2023

8Base Ransomware Spikes in Activity, Threatens U.S. and Brazilian Businesses

Jun 28, 2023Ravie LakshmananRansomware / Cyber Threat A ransomware threat called 8Base that has been operating under the radar for…

operational technology
28
Jun
2023

5 Things CISOs Need to Know About Securing OT Environments

For too long the cybersecurity world focused exclusively on information technology (IT), leaving operational technology (OT) to fend for itself….

SQL Injection
28
Jun
2023

Critical SQL Injection Flaws Expose Gentoo Soko to Remote Code Execution

Jun 28, 2023Ravie LakshmananEndpoint Security / RCE Multiple SQL injection vulnerabilities have been disclosed in Gentoo Soko that could lead…

27
Jun
2023

New Mockingjay Process Injection Technique Could Let Malware Evade Detection

Jun 27, 2023Ravie LakshmananMalware / Cyber Threat A new process injection technique dubbed Mockingjay could be exploited by threat actors…