Category: TheHackerNews

Vulnerability Prioritization
26
Sep
2024

What’s the Best Approach to Vulnerability Prioritization?

Many businesses rely on the Common Vulnerability Scoring System (CVSS) to assess the severity of vulnerabilities for prioritization. While these…

India-Linked Hackers
26
Sep
2024

Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities

Sep 26, 2024Ravie LakshmananCloud Security / Cyber Espionage An advanced threat actor with an India nexus has been observed using…

Cyber Espionage Campaign
26
Sep
2024

Chinese Hackers Infiltrate U.S. Internet Providers in Cyber Espionage Campaign

Sep 26, 2024Ravie LakshmananCyber Espionage / Hacking Nation-state threat actors backed by Beijing broke into a “handful” of U.S. internet…

Android Memory Vulnerabilities
25
Sep
2024

Google’s Shift to Rust Programming Cuts Android Memory Vulnerabilities by 52%

Sep 25, 2024Ravie LakshmananSecure Coding / Mobile Security Google has revealed that its transition to memory-safe languages such as Rust…

Splinter Post-Exploitation Tool
25
Sep
2024

Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool

Sep 25, 2024Ravie LakshmananPenetration Testing / Cyber Threat Cybersecurity researchers have flagged the discovery of a new post-exploitation red team…

Tracking in Firefox
25
Sep
2024

Mozilla Faces Privacy Complaint for Enabling Tracking in Firefox Without User Consent

Sep 25, 2024Ravie LakshmananData Protection / Online Tracking Vienna-based privacy non-profit noyb (short for None Of Your Business) has filed…

Expert Tips on How to Spot a Phishing Link
25
Sep
2024

Expert Tips on How to Spot a Phishing Link

Phishing attacks are becoming more advanced and harder to detect, but there are still telltale signs that can help you…

A Solution to SOAR's Unfulfilled Promises
25
Sep
2024

A Solution to SOAR’s Unfulfilled Promises

Security Orchestration, Automation, and Response (SOAR) was introduced with the promise of revolutionizing Security Operations Centers (SOCs) through automation, reducing…

Spyware via Memory Function
25
Sep
2024

ChatGPT macOS Flaw Could’ve Enabled Long-Term Spyware via Memory Function

Sep 25, 2024Ravie LakshmananArtificial Intelligence / Vulnerability A now-patched security vulnerability in OpenAI’s ChatGPT app for macOS could have made…

Transportation Companies Hit by Cyberattacks
25
Sep
2024

Transportation Companies Hit by Cyberattacks Using Lumma Stealer and NetSupport Malware

Sep 25, 2024Ravie LakshmananEmail Security / Threat Intelligence Transportation and logistics companies in North America are the target of a…

Ivanti vTM Vulnerability
25
Sep
2024

CISA Flags Critical Ivanti vTM Vulnerability Amid Active Exploitation Concerns

Sep 25, 2024Ravie LakshmananVulnerability / Cyber Attack The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical…

Camera and Browser Apps on Play Store
24
Sep
2024

Necro Android Malware Found in Popular Camera and Browser Apps on Play Store

Sep 24, 2024Ravie LakshmananMobile Security / Malware Altered versions of legitimate Android apps associated with Spotify, WhatsApp, and Minecraft have…