Category: TheHackerNews

27
Jun
2023

How Attack Surface Management Prioritizes Vulnerability Remediation

As the business environment becomes increasingly connected, organizations’ attack surfaces continue to expand, making it challenging to map and secure…

Anatsa Banking Trojan
27
Jun
2023

Anatsa Banking Trojan Targeting Users in US, UK, Germany, Austria, and Switzerland

Jun 27, 2023Ravie LakshmananMobile Security / Malware A new Android malware campaign has been observed pushing the Anatsa banking trojan…

FortiNAC Vulnerability
27
Jun
2023

New Fortinet’s FortiNAC Vulnerability Exposes Networks to Code Execution Attacks

Jun 27, 2023Ravie LakshmananVulnerability / Exploit Fortinet has rolled out updates to address a critical security vulnerability impacting its FortiNAC…

LED Flickers
26
Jun
2023

Researchers Find Way to Recover Cryptographic Keys by Analyzing LED Flickers

Jun 26, 2023Ravie LakshmananCryptography / Cybersecurity In what’s an ingenious side-channel attack, a group of academics has found that it’s…

26
Jun
2023

Japanese Cryptocurrency Exchange Falls Victim to JokerSpy macOS Backdoor Attack

Jun 26, 2023Ravie LakshmananCryptocurrency / Endpoint Security An unknown cryptocurrency exchange located in Japan was the target of a new…

26
Jun
2023

How Generative AI Can Dupe SaaS Authentication Protocols — And Effective Ways To Prevent Other Key AI Risks in SaaS

Security and IT teams are routinely forced to adopt software before fully understanding the security risks. And AI tools are…

password security
26
Jun
2023

Microsoft Warns of Widescale Credential Stealing Attacks by Russian Hackers

Jun 26, 2023Ravie LakshmananCyber Threat / Password Security Microsoft has disclosed that it’s detected a spike in credential-stealing attacks conducted…

Chinese Hackers
26
Jun
2023

Chinese Hackers Using Never-Before-Seen Tactics for Critical Infrastructure Attacks

Jun 26, 2023Ravie LakshmananCyber Espionage / LotL The newly discovered Chinese nation-state actor known as Volt Typhoon has been observed…

Twitter Crypto Scam
24
Jun
2023

Twitter Hacker Sentenced to 5 Years in Prison for $120,000 Crypto Scam

Jun 24, 2023Ravie LakshmananCyber Crime / Cryptocurrency A U.K. citizen who took part in the massive July 2020 hack of…

Known Exploited Vulnerabilities Catalog
24
Jun
2023

U.S. Cybersecurity Agency Adds 6 Flaws to Known Exploited Vulnerabilities Catalog

Jun 24, 2023Ravie LakshmananThreat Intel / Zero Day The U.S. Cybersecurity and Infrastructure Security Agency has added a batch of…

Social Engineering
23
Jun
2023

Cybercrime Group ‘Muddled Libra’ Targets BPO Sector with Advanced Social Engineering

Jun 23, 2023Ravie LakshmananSocial Engineering / Phishing A threat actor known as Muddled Libra is targeting the business process outsourcing…

Browser Fingerprinting
23
Jun
2023

Personalized UX, Fraud Detection, and Secure Logins

The case for browser fingerprinting: personalizing user experience, improving fraud detection, and optimizing login security Have you ever heard of…