Category: TheHackerNews

Cyber Campaign
09
Aug
2023

17 Nations Hit in 3-Year Cyber Campaign

Aug 09, 2023THNCyber Espionage / Cyber Attacks Hackers associated with China’s Ministry of State Security (MSS) have been linked to…

Penetration Testing as a Service
09
Aug
2023

Continuous Security Validation with Penetration Testing as a Service (PTaaS)

Validate security continuously across your full stack with Pen Testing as a Service. In today’s modern security operations center (SOC),…

Rhysida Ransomware
09
Aug
2023

New Report Exposes Vice Society’s Collaboration with Rhysida Ransomware

Aug 09, 2023The Hacker NewsCyber Threat / Ransomware Tactical similarities have been unearthed between the double extortion ransomware group known…

U.K. Electoral Commission
09
Aug
2023

U.K. Electoral Commission Breach Exposes Voter Data of 40 Million Britons

Aug 09, 2023THNData Breach / Cyber Attack The U.K. Electoral Commission on Tuesday disclosed a “complex” cyber attack on its…

Kubernetes
09
Aug
2023

Malicious Campaigns Exploit Weak Kubernetes Clusters for Crypto Mining

Aug 09, 2023THNCloud Security / Kubernetes Exposed Kubernetes (K8s) clusters are being exploited by malicious actors to deploy cryptocurrency miners…

Google Android 14
09
Aug
2023

IT Admins Can Now Disable 2G Networks

Aug 09, 2023THNMobile Security / Network Attack Google has introduced a new security feature in Android 14 that allows IT…

Microsoft
09
Aug
2023

Microsoft Releases Patches for 74 New Vulnerabilities in August Update

Aug 09, 2023THNSoftware Security / Vulnerability Microsoft has patched a total of 74 flaws in its software as part of…

QakBot Malware
08
Aug
2023

QakBot Malware Operators Expand C2 Network with 15 New Servers

Aug 08, 2023THNMalware / Cyber Threat The operators associated with the QakBot (aka QBot) malware have set up 15 new…

Hackers Abusing Cloudflare Tunnels for Covert Communications
08
Aug
2023

Hackers Abusing Cloudflare Tunnels for Covert Communications

Aug 08, 2023THNCyber Threat / Network Security New research has revealed that threat actors are abusing Cloudflare Tunnels to establish…

Understanding Active Directory Attack Paths to Improve Security
08
Aug
2023

Understanding Active Directory Attack Paths to Improve Security

Introduced in 1999, Microsoft Active Directory is the default identity and access management service in Windows networks, responsible for assigning…

Yashma Ransomware
08
Aug
2023

New Yashma Ransomware Variant Targets Multiple English-Speaking Countries

Aug 08, 2023THNEndpoint Security / Malware An unknown threat actor is using a variant of the Yashma ransomware to target…

LOLBAS
08
Aug
2023

11 Living-Off-The-Land Binaries Used for Malicious Purposes

Aug 08, 2023THNMalware / Cyber Threat Cybersecurity researchers have discovered a set of 11 living-off-the-land binaries-and-scripts (LOLBAS) that could be…