Category: TheHackerNews

Vulnerability
23
Feb
2023

The Secret Vulnerability Finance Execs are Missing

The (Other) Risk in Finance A few years ago, a Washington-based real estate developer received a document link from First…

Hacking
23
Feb
2023

New Hacking Cluster ‘Clasiopa’ Targeting Materials Research Organizations in Asia

Feb 23, 2023Ravie LakshmananMalware / Threat Intel Materials research organizations in Asia have been targeted by a previously unknown threat…

PyPI Malware
23
Feb
2023

Python Developers Warned of Trojanized PyPI Packages Mimicking Popular Libraries

Feb 23, 2023Ravie LakshmananSoftware Security / Supply Chain Attack Cybersecurity researchers are warning of “imposter packages” mimicking popular libraries available…

Hydrochasma
22
Feb
2023

New Threat Actor Targets Shipping Companies and Medical Labs in Asia

Feb 22, 2023Ravie LakshmananCyber Espionage / Cyber Attack Shipping companies and medical laboratories in Asia have been the subject of…

iPhone, iPad, and Mac Vulnerabilities
22
Feb
2023

Apple Warns of 3 New Vulnerabilities Affecting iPhone, iPad, and Mac Devices

Feb 22, 2023Ravie LakshmananEndpoint Security / Software Update Apple has revised the security advisories it released last month to include…

Third-Party Risk Management Program
22
Feb
2023

3 Steps to Automate Your Third-Party Risk Management Program

Feb 22, 2023The Hacker NewsCyber Risk Management If you Google “third-party data breaches” you will find many recent reports of…

NPM Repository
22
Feb
2023

Attackers Flood NPM Repository with Over 15,000 Spam Packages Containing Phishing Links

Feb 22, 2023Ravie LakshmananOpen Source / Supply Chain Attack In what’s a continuing assault on the open source ecosystem, over…

DDoS Attack
22
Feb
2023

Gcore Thwarts Massive 650 Gbps DDoS Attack on Free Plan Client

Feb 22, 2023The Hacker NewsServer Security / DDoS Attack At the beginning of January, Gcore faced an incident involving several…

Havoc Framework for Post-Exploitation
22
Feb
2023

Threat Actors Adopt Havoc Framework for Post-Exploitation in Targeted Attacks

Feb 22, 2023Ravie LakshmananExploitation Framework / Cyber Threat An open source command-and-control (C2) framework known as Havoc is being adopted…

CISA KEV Catalog
22
Feb
2023

U.S. Cybersecurity Agency CISA Adds Three New Vulnerabilities in KEV Catalog

Feb 22, 2023Ravie LakshmananCyber Risk / Patch Management The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three…

VMware Patches Critical Vulnerability in Carbon Black App Control Product
22
Feb
2023

VMware Patches Critical Vulnerability in Carbon Black App Control Product

Feb 22, 2023Ravie LakshmananVulnerability / Enterprise Security VMware on Tuesday released patches to address a critical security vulnerability affecting its…

MyloBot Botnet
21
Feb
2023

Infecting Over 50,000 Devices Daily

Feb 21, 2023Ravie LakshmananEndpoint Security / Botnet A sophisticated botnet known as MyloBot has compromised thousands of systems, with most…