Category: TheHackerNews

Social Engineering
23
Jun
2023

Cybercrime Group ‘Muddled Libra’ Targets BPO Sector with Advanced Social Engineering

Jun 23, 2023Ravie LakshmananSocial Engineering / Phishing A threat actor known as Muddled Libra is targeting the business process outsourcing…

Browser Fingerprinting
23
Jun
2023

Personalized UX, Fraud Detection, and Secure Logins

The case for browser fingerprinting: personalizing user experience, improving fraud detection, and optimizing login security Have you ever heard of…

JavaScript Dropper PindOS
23
Jun
2023

Powerful JavaScript Dropper PindOS Distributes Bumblebee and IcedID Malware

Jun 23, 2023Ravie LakshmananMalware / Cyber Threat A new strain of JavaScript dropper has been observed delivering next-stage payloads like…

23
Jun
2023

NSA Releases Guide to Combat Powerful BlackLotus Bootkit Targeting Windows Systems

Jun 23, 2023Ravie LakshmananThreat Intel / Endpoint Security The U.S. National Security Agency (NSA) on Thursday released guidance to help…

Cryptocurrency Mining
23
Jun
2023

New Cryptocurrency Mining Campaign Targets Linux Systems and IoT Devices

Jun 23, 2023Ravie LakshmananCryptocurrency / IoT Internet-facing Linux systems and Internet of Things (IoT) devices are being targeted as part…

Remote Access Trojans
22
Jun
2023

MULTI#STORM Campaign Targets India and U.S. with Remote Access Trojans

Jun 22, 2023Ravie LakshmananCyber Attack / Phishing A new phishing campaign codenamed MULTI#STORM has set its sights on India and…

USB Malware
22
Jun
2023

Camaro Dragon Hackers Strike with USB-Driven Self-Propagating Malware

Jun 22, 2023Ravie LakshmananCyber Threat / Malware The Chinese cyber espionage actor known as Camaro Dragon has been observed leveraging…

RepoJacking Attack
22
Jun
2023

Million of GitHub Repositories Likely Vulnerable to RepoJacking Attack

Jun 22, 2023Ravie LakshmananSupply Chain / Software Security Millions of software repositories on GitHub are likely vulnerable to an attack…

Potential risks and mitigation strategies
22
Jun
2023

Potential risks and mitigation strategies

Jun 22, 2023The Hacker News Losing sleep over Generative-AI apps? You’re not alone or wrong. According to the Astrix Security…

22
Jun
2023

Identifying Data Exfiltration with Machine Learning

Jun 22, 2023The Hacker NewsNetwork Security / Machine Learning Why Data Exfiltration Detection is Paramount? The world is witnessing an…

WordPress vulnerability
22
Jun
2023

Critical Flaw Found in WordPress Plugin for WooCommerce Used by 30,000 Websites

Jun 22, 2023Ravie LakshmananWebsite Security / WordPress A critical security flaw has been disclosed in the WordPress “Abandoned Cart Lite…

iOS, macOS, and Safari
22
Jun
2023

Apple Releases Patches for Actively Exploited Flaws in iOS, macOS, and Safari

Jun 22, 2023Ravie LakshmananVulnerability / Endpoint Security Apple on Wednesday released a slew of updates for iOS, iPadOS, macOS, watchOS,…