Category: TheHackerNews

05
Apr
2023

Google TAG Warns of North Korean-linked ARCHIPELAGO Cyberattacks

Apr 05, 2023Ravie LakshmananCyber Attack / Cyber Threat A North Korean government-backed threat actor has been linked to attacks targeting…

Self-Extracting Archives
05
Apr
2023

Hackers Using Self-Extracting Archives Exploit for Stealthy Backdoor Attacks

Apr 05, 2023Ravie LakshmananEndpoint Security / Malware An unknown threat actor used a malicious self-extracting archive (SFX) file in an…

Ransomware Prevention
05
Apr
2023

Protect Your Company: Ransomware Prevention Made Easy

Every year hundreds of millions of malware attacks occur worldwide, and every year businesses deal with the impact of viruses,…

Advanced Evasion Techniques
05
Apr
2023

Typhon Reborn Stealer Malware Resurfaces with Advanced Evasion Techniques

Apr 05, 2023Ravie LakshmananCyber Threat / Dark Web The threat actor behind the information-stealing malware known as Typhon Reborn has…

Rilide Malware
04
Apr
2023

New Rilide Malware Targeting Chromium-Based Browsers to Steal Cryptocurrency

Apr 04, 2023Ravie LakshmananBrowser Security / Cryptocurrency Chromium-based web browsers are the target of a new malware called Rilide that…

Rorschach Ransomware
04
Apr
2023

Experts Warn of Advanced Evasion Strategies

Apr 04, 2023Ravie LakshmananEncryption / Data Safety Cybersecurity researchers have taken the wraps off a previously undocumented ransomware strain called…

Cybersecurity
04
Apr
2023

Sorting Through Haystacks to Find CTI Needles

Clouded vision CTI systems are confronted with some major issues ranging from the size of the collection networks to their…

SaaS in the Real World
04
Apr
2023

SaaS in the Real World

Collaboration sits at the essence of SaaS applications. The word, or some form of it, appears in the top two…

Malware
04
Apr
2023

Arid Viper Hacking Group Using Upgraded Malware in Middle East Cyber Attacks

Apr 04, 2023Ravie LakshmananCyber Threat / Malware The threat actor known as Arid Viper has been observed using refreshed variants…

MS OneNote
04
Apr
2023

Microsoft Tightens OneNote Security by Auto-Blocking 120 Risky File Extensions

Microsoft has announced plans to automatically block embedded files with “dangerous extensions” in OneNote following reports that the note-taking service…

3CX Supply Chain Attack
04
Apr
2023

Cryptocurrency Companies Targeted in Sophisticated 3CX Supply Chain Attack

Apr 04, 2023Ravie LakshmananCryptocurrency / Cyber Attack The adversary behind the supply chain attack targeting 3CX deployed a second-stage implant…

Privileged Access Management (PAM)
03
Apr
2023

Why Do PAM Deployments Take (almost) Forever To Complete

Privileged Access Management (PAM) solutions are regarded as the common practice to prevent identity threats to administrative accounts. In theory,…