Category: TheHackerNews

AI Security
30
Apr
2024

U.S. Government Releases New AI Security Guidelines for Critical Infrastructure

Apr 30, 2024NewsroomMachine Learning / National Security The U.S. government has unveiled new security guidelines aimed at bolstering critical infrastructure…

Default Passwords
30
Apr
2024

New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024

Apr 30, 2024NewsroomIoT Security / Botnet The U.K. National Cyber Security Centre (NCSC) is calling on manufacturers of smart devices…

Malicious Apps in Play Store
29
Apr
2024

Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023

Apr 29, 2024NewsroomMobile Security / Hacking Google on Monday revealed that almost 200,000 app submissions to its Play Store for…

R Programming Vulnerability
29
Apr
2024

New R Programming Vulnerability Exposes Projects to Supply Chain Attacks

Apr 29, 2024NewsroomProgramming / Supply Chain A security vulnerability has been discovered in the R programming language that could be…

Map Internet on Global Scale
29
Apr
2024

China-Linked ‘Muddling Meerkat’ Hijacks DNS to Map Internet on Global Scale

Apr 29, 2024NewsroomDNS Security / Cyber Espionage A previously undocumented cyber threat dubbed Muddling Meerkat has been observed undertaking sophisticated…

Understanding Exposure Management, Pentesting, Red Teaming and RBVM
29
Apr
2024

Understanding Exposure Management, Pentesting, Red Teaming and RBVM

It comes as no surprise that today’s cyber threats are orders of magnitude more complex than those of the past….

Sandbox Escape Vulnerabilities
29
Apr
2024

Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover

Apr 29, 2024NewsroomSandbox / Vulnerability Multiple critical security flaws have been disclosed in the Judge0 open-source online code execution system…

Credential Stuffing Attacks
28
Apr
2024

Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks

Apr 28, 2024NewsroomCredential Stuffing / Data Breach Identity and access management (IAM) services provider Okta has warned of a spike…

Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
27
Apr
2024

Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw

Apr 27, 2024NewsroomCyber Attack / Malware Cybersecurity researchers have discovered a targeted operation against Ukraine that has been found leveraging…

Bogus npm Packages
27
Apr
2024

Bogus npm Packages Used to Trick Software Developers into Installing Malware

Apr 27, 2024NewsroomMalware / Software Security An ongoing social engineering campaign is targeting software developers with bogus npm packages under…

SANnav SAN Management Software
26
Apr
2024

Severe Flaws Disclosed in Brocade SANnav SAN Management Software

Apr 26, 2024NewsroomSupply Chain Attack / Software Security Several security vulnerabilities disclosed in Brocade SANnav storage area network (SAN) management…

Palo Alto Networks
26
Apr
2024

Palo Alto Networks Outlines Remediation for Critical PAN-OS Flaw Under Attack

Apr 26, 2024NewsroomNetwork Security / Zero Day Palo Alto Networks has shared remediation guidance for a recently disclosed critical security…