Category: TheHackerNews

31
May
2023

Critical Firmware Vulnerability in Gigabyte Systems Exposes ~7 Million Devices

May 31, 2023Ravie LakshmananFirmware Security / Vulnerability Cybersecurity researchers have found “backdoor-like behavior” within Gigabyte systems, which they say enables…

Threat Hunting
31
May
2023

Safeguard Critical Assets and Fight Cybercrime

May 31, 2023The Hacker NewsThreat Hunting / Cybersecurity Finding threat actors before they find you is key to beefing up…

31
May
2023

Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass

May 31, 2023Ravie LakshmananEndpoint Security / Vulnerability Microsoft has shared details of a now-patched flaw in Apple macOS that could…

Barracuda Email Security Gateway
31
May
2023

Hackers Exploit Barracuda Email Security Gateway 0-Day Flaw for 7 Months

May 31, 2023Ravie LakshmananNetwork Security / Zero Day Enterprise security firm Barracuda on Tuesday disclosed that a recently patched zero-day…

Vulnerability
30
May
2023

Implementing Risk-Based Vulnerability Discovery and Remediation

In this day and age, vulnerabilities in software and systems pose a considerable danger to businesses, which is why it…

CAPTCHA
30
May
2023

CAPTCHA-Breaking Services with Human Solvers Helping Cybercriminals Defeat Security

May 30, 2023Ravie Lakshmanan Cybersecurity researchers are warning about CAPTCHA-breaking services that are being offered for sale to bypass systems…

Critical Security Flaws
30
May
2023

Hackers Win $105,000 for Reporting Critical Security Flaws in Sonos One Speakers

May 30, 2023Ravie LakshmananZero Day / Vulnerability Multiple security flaws uncovered in Sonos One wireless speakers could be potentially exploited…

DogeRAT Trojan
30
May
2023

Sneaky DogeRAT Trojan Poses as Popular Apps, Targets Indian Android Users

May 30, 2023Ravie LakshmananMobile Security / Android A new open source remote access trojan (RAT) called DogeRAT targets Android users…

New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force
29
May
2023

New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force

May 29, 2023Ravie LakshmananAuthentication / Mobile Security Researchers have discovered an inexpensive attack technique that could be leveraged to brute-force…

Continuous Threat Exposure Management (CTEM)
29
May
2023

3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them

If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry is obsessed with. From CNAPP,…

AceCryptor
29
May
2023

AceCryptor: Cybercriminals’ Powerful Weapon, Detected in 240K+ Attacks

A crypter (alternatively spelled cryptor) malware dubbed AceCryptor has been used to pack numerous strains of malware since 2016. Slovak cybersecurity firm…

GobRAT Remote Access
29
May
2023

New GobRAT Remote Access Trojan Targeting Linux Routers in Japan

May 29, 2023Ravie LakshmananLinux / Network Security Linux routers in Japan are the target of a new Golang remote access…