Category: TheHackerNews

ShadowPad and Ransomware
20
Feb
2025

Chinese-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware

Feb 20, 2025Ravie LakshmananRansomware / Vulnerability A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare…

What IT Teams Must Do Now
20
Feb
2025

What IT Teams Must Do Now

For decades, Microsoft Exchange has been the backbone of business communications, powering emailing, scheduling and collaboration for organizations worldwide. Whether…

Privilege Escalation Vulnerability
20
Feb
2025

Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability

Feb 20, 2025Ravie LakshmananSoftware Security / Vulnerability Microsoft has released security updates to address two Critical-rated flaws impacting Bing and…

Privilege Escalation Vulnerability
20
Feb
2025

Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability

Feb 20, 2025Ravie LakshmananVulnerability / IT Security Citrix has released security updates for a high-severity security flaw impacting NetScaler Console…

Hackers Exploit Signal's Linked Devices Feature to Hijack Accounts via Malicious QR Codes
19
Feb
2025

Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes

Feb 19, 2025Ravie LakshmananMobile Security / Cyber Espionage Multiple Russia-aligned threat actors have been observed targeting individuals of interest via…

Snake Keylogger Variant
19
Feb
2025

New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detection

Feb 19, 2025The Hacker NewsMalware / Threat Intelligence A new variant of the Snake Keylogger malware is being used to…

The Ultimate MSP Guide to Structuring and Selling vCISO Services
19
Feb
2025

The Ultimate MSP Guide to Structuring and Selling vCISO Services

The growing demand for cybersecurity and compliance services presents a great opportunity for Managed Service Providers (MSPs) and Managed Security…

Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry Attack
19
Feb
2025

Trojanized Game Installers Deploy Cryptocurrency Miner in Large-Scale StaryDobry Attack

Feb 19, 2025The Hacker NewsWindows Security / Malware Users who are on the lookout for popular games were lured into…

CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List
19
Feb
2025

CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List

Feb 19, 2025Ravie LakshmananThreat Intelligence / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security…

OpenSSH
18
Feb
2025

New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now

Feb 18, 2025Ravie LakshmananVulnerability / Network Security Two security vulnerabilities have been discovered in the OpenSSH secure networking utility suite…

Evade Detection in Targeted Cyber Attacks
18
Feb
2025

Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks

Feb 18, 2025Ravie LakshmananCyber Espionage / Malware The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing…

Malware Targets macOS Users
18
Feb
2025

New FrigidStealer Malware Targets macOS Users via Fake Browser Updates

Feb 18, 2025Ravie LakshmananThreat Intelligence / Malware Cybersecurity researchers are alerting to a new campaign that leverages web injects to…