Category: TheHackerNews

Winter Vivern APT
31
Mar
2023

Winter Vivern APT Targets European Government Entities with Zimbra Vulnerability

Mar 31, 2023Ravie LakshmananCyber Espionage / APT The advanced persistent threat (APT) actor known as Winter Vivern is now targeting…

Deep Dive Into 6 Key Steps to Accelerate Your Incident Response
31
Mar
2023

Deep Dive Into 6 Key Steps to Accelerate Your Incident Response

Mar 31, 2023The Hacker NewsWebinar / Incident response Organizations rely on Incident response to ensure they are immediately aware of…

Phishing Gang
31
Mar
2023

Cyber Police of Ukraine Busted Phishing Gang Responsible for $4.33 Million Scam

Mar 31, 2023Ravie LakshmananCyber Crime / Hacking News The Cyber Police of Ukraine, in collaboration with law enforcement officials from…

3CX Supply Chain Attack
31
Mar
2023

3CX Supply Chain Attack — Here’s What We Know So Far

Mar 31, 2023Ravie LakshmananCyber Threat / Supply Chain Attack Enterprise communications software maker 3CX on Thursday confirmed that multiple versions…

Super FabriXss Vulnerability
30
Mar
2023

Researchers Detail Severe “Super FabriXss” Vulnerability in Microsoft Azure SFX

Mar 30, 2023Ravie LakshmananCloud Security / Vulnerability Details have emerged about a now-patched vulnerability in Azure Service Fabric Explorer (SFX)…

Windows and Linux
30
Mar
2023

Chinese RedGolf Group Targeting Windows and Linux Systems with KEYPLUG Backdoor

Mar 30, 2023Ravie LakshmananEndpoint Security / Malware A Chinese state-sponsored threat activity group tracked as RedGolf has been attributed to…

New Wi-Fi Protocol Security Flaw Affecting Linux, Android and iOS Devices
30
Mar
2023

New Wi-Fi Protocol Security Flaw Affecting Linux, Android and iOS Devices

Mar 30, 2023Ravie LakshmananNetwork Security A group of academics from Northeastern University and KU Leuven has disclosed a fundamental design…

Cyberstorage
30
Mar
2023

Leveraging the Multi-Cloud to Combat Data Exfiltration

Mar 30, 2023The Hacker NewsData Security / Encryption Multi-cloud data storage, once merely a byproduct of the great cloud migration,…

AlienFox Malware
30
Mar
2023

AlienFox Malware Targets API Keys and Secrets from AWS, Google, and Microsoft Cloud Services

Mar 30, 2023Ravie LakshmananCloud Security / Cyber Threat A new “comprehensive toolset” called AlienFox is being distributed on Telegram as…

3CX Desktop App
30
Mar
2023

3CX Desktop App Supply Chain Attack Leaves Millions at Risk

Mar 30, 2023Ravie LakshmananSupply Chain / Software Security 3CX said it’s working on a software update for its desktop app…

Malware Reverse Engineering
29
Mar
2023

How to Build a Research Lab for Reverse Engineering — 4 Ways

Malware analysis is an essential part of security researcher’s work. But working with malicious samples can be dangerous — it…

Zero-Day Vulnerabilities
29
Mar
2023

Spyware Vendors Caught Exploiting Zero-Day Vulnerabilities on Android and iOS Devices

Mar 29, 2023Ravie LakshmananZero-Day / Mobile Security A number of zero-day vulnerabilities that were addressed last year were exploited by…