Category: TheHackerNews

anian Company Cloudzy
02
Aug
2023

Iranian Company Cloudzy Accused of Aiding Cybercriminals and Nation-State Hackers

Aug 02, 2023THNRansoware / Cyber Crime Services offered by an obscure Iranian company known as Cloudzy are being leveraged by…

Ivanti EPMM Vulnerability
02
Aug
2023

Norwegian Entities Targeted in Ongoing Attacks Exploiting Ivanti EPMM Vulnerability

Aug 02, 2023THNVulnerability / Cyber Attack Advanced persistent threat (APT) actors exploited a recently disclosed critical flaw impacting Ivanti Endpoint…

NodeStealer
01
Aug
2023

New NodeStealer Targeting Facebook Business Accounts and Crypto Wallets

Aug 01, 2023THNCryptocurrency / Malware Cybersecurity researchers have unearthed a Python variant of a stealer malware NodeStealer that’s equipped to…

SpyNote Android Trojan
01
Aug
2023

European Bank Customers Targeted in SpyNote Android Trojan Campaign

Aug 01, 2023THNMobile Security / Malware Various European customers of different banks are being targeted by an Android banking trojan…

Space Pirate Hackers
01
Aug
2023

Researchers Expose Space Pirates’ Cyber Campaign Across Russia and Serbia

Aug 01, 2023THNCyber Attack / Malware The threat actor known as Space Pirates has been linked to attacks against at…

Data Security Posture Management
01
Aug
2023

What is Data Security Posture Management (DSPM)?

Aug 01, 2023The Hacker NewsData Security / DSPM Data Security Posture Management is an approach to securing cloud data by…

Air-Gapped Systems
01
Aug
2023

China’s APT31 Suspected in Attacks on Air-Gapped Systems in Eastern Europe

Aug 01, 2023THNCyber Attack / Data Safety A nation-state actor with links to China is suspected of being behind a…

Banking Trojan
01
Aug
2023

Cybercriminals Renting WikiLoader to Target Italian Organizations with Banking Trojan

Aug 01, 2023THNCyber Attack / Malware Organizations in Italy are the target of a new phishing campaign that leverages a…

31
Jul
2023

New P2PInfect Worm Targets Redis Servers with Undocumented Breach Methods

Jul 31, 2023THNCyber Threat / Botnet The P2PInfect peer-to-peer (P2) worm has been observed employing previously undocumented initial access methods…

vCISO Services
31
Jul
2023

How to Provide vCISO Services

Jul 31, 2023The Hacker NewsVirtual CISO Demand for Virtual CISO services is soaring. According to Gartner, the use of vCISO…

EyeShell Backdoor
31
Jul
2023

Patchwork Hackers Target Chinese Research Organizations Using EyeShell Backdoor

Jul 31, 2023THNCyber Espionage / Malware Threat actors associated with the hacking crew known as Patchwork have been spotted targeting…

Remcos RAT
31
Jul
2023

Fruity Trojan Uses Deceptive Software Installers to Spread Remcos RAT

Jul 31, 2023THNMalware / Cyber Threat Threat actors are creating fake websites hosting trojanized software installers to trick unsuspecting users…