Category: TheHackerNews

Introducing AI-guided Remediation for IaC Security / KICS
19
Jun
2023

Introducing AI-guided Remediation for IaC Security / KICS

Jun 19, 2023The Hacker NewsDevSecOps / AppSec While the use of Infrastructure as Code (IaC) has gained significant popularity as…

Sophisticated Cyber Espionage
19
Jun
2023

State-Backed Hackers Employ Advanced Methods to Target Middle Eastern and African Governments

Jun 19, 2023Ravie LakshmananCyber Attack / Hacking Governmental entities in the Middle East and Africa have been at the receiving…

Massive DDoS Attack
19
Jun
2023

Microsoft Blames Massive DDoS Attack for Azure, Outlook, and OneDrive Disruptions

Jun 19, 2023Ravie LakshmananNetwork and Cloud Security Microsoft on Friday attributed a string of service outages aimed at Azure, Outlook,…

Cybersecurity
17
Jun
2023

Diicot Expands Tactics with Cayosin Botnet

Jun 17, 2023Ravie LakshmananCryptojacking / Network Security Cybersecurity researchers have discovered previously undocumented payloads associated with a Romanian threat actor…

Linux Backdoor
16
Jun
2023

ChamelDoH: New Linux Backdoor Utilizing DNS-over-HTTPS Tunneling for Covert CnC

Jun 16, 2023Ravie LakshmananEndpoint Security / Network Security The threat actor known as ChamelGang has been observed using a previously…

16
Jun
2023

Activities in the Cybercrime Underground Require a New Approach to Cybersecurity

As Threat Actors Continuously Adapt their TTPs in Today’s Threat Landscape, So Must You Earlier this year, threat researchers at…

LockBit Ransomware Affiliate
16
Jun
2023

20-Year-Old Russian LockBit Ransomware Affiliate Arrested in Arizona

Jun 16, 2023Ravie LakshmananRansomware / Cyber Crime The U.S. Department of Justice (DoJ) on Thursday unveiled charges against a Russian…

MOVEit Transfer App
16
Jun
2023

Third Flaw Uncovered in MOVEit Transfer App Amidst Cl0p Ransomware Mass Attack

Jun 16, 2023Ravie LakshmananCyber Attack / Ransomware Progress Software on Thursday disclosed a third vulnerability impacting its MOVEit Transfer application,…

Cloud Mining to Launder Cryptocurrency
15
Jun
2023

Ransomware Hackers and Scammers Utilizing Cloud Mining to Launder Cryptocurrency

Jun 15, 2023Ravie LakshmananCryptocurrency / Ransomware Ransomware actors and cryptocurrency scammers have joined nation-state actors in abusing cloud mining services…

Chinese UNC4841 Group Exploits Zero-Day Flaw in Barracuda Email Security Gateway
15
Jun
2023

Chinese UNC4841 Group Exploits Zero-Day Flaw in Barracuda Email Security Gateway

Jun 15, 2023Ravie Lakshmanan A suspected China-nexus threat actor dubbed UNC4841 has been linked to the exploitation of a recently…

Vidar Malware Using New Tactics to Evade Detection and Anonymize Activities
15
Jun
2023

Vidar Malware Using New Tactics to Evade Detection and Anonymize Activities

Jun 15, 2023Ravie LakshmananMalware / Cyber Threat The threat actors behind the Vidar malware have made changes to their backend…

S3 Buckets
15
Jun
2023

New Supply Chain Attack Exploits Abandoned S3 Buckets to Distribute Malicious Binaries

Jun 15, 2023Ravie LakshmananSoftware Supply Chain In what’s a new kind of software supply chain attack aimed at open source…