Category: TheHackerNews

New Wi-Fi Protocol Security Flaw Affecting Linux, Android and iOS Devices
30
Mar
2023

New Wi-Fi Protocol Security Flaw Affecting Linux, Android and iOS Devices

Mar 30, 2023Ravie LakshmananNetwork Security A group of academics from Northeastern University and KU Leuven has disclosed a fundamental design…

Cyberstorage
30
Mar
2023

Leveraging the Multi-Cloud to Combat Data Exfiltration

Mar 30, 2023The Hacker NewsData Security / Encryption Multi-cloud data storage, once merely a byproduct of the great cloud migration,…

AlienFox Malware
30
Mar
2023

AlienFox Malware Targets API Keys and Secrets from AWS, Google, and Microsoft Cloud Services

Mar 30, 2023Ravie LakshmananCloud Security / Cyber Threat A new “comprehensive toolset” called AlienFox is being distributed on Telegram as…

3CX Desktop App
30
Mar
2023

3CX Desktop App Supply Chain Attack Leaves Millions at Risk

Mar 30, 2023Ravie LakshmananSupply Chain / Software Security 3CX said it’s working on a software update for its desktop app…

Malware Reverse Engineering
29
Mar
2023

How to Build a Research Lab for Reverse Engineering — 4 Ways

Malware analysis is an essential part of security researcher’s work. But working with malicious samples can be dangerous — it…

Zero-Day Vulnerabilities
29
Mar
2023

Spyware Vendors Caught Exploiting Zero-Day Vulnerabilities on Android and iOS Devices

Mar 29, 2023Ravie LakshmananZero-Day / Mobile Security A number of zero-day vulnerabilities that were addressed last year were exploited by…

Automotive Security
29
Mar
2023

Smart Mobility has a Blindspot When it Comes to API Security

The emergence of smart mobility services and applications has led to a sharp increase in the use of APIs in…

Linux Malware
29
Mar
2023

Researchers Uncover New Linux Malware Linked to Chinese APT Groups

Mar 29, 2023Ravie LakshmananLinux / Cyber Threat An unknown Chinese state-sponsored hacking group has been linked to a novel piece…

Trojanized TOR Browser
29
Mar
2023

Trojanized TOR Browser Installers Spreading Crypto-Stealing Clipper Malware

Mar 29, 2023Ravie LakshmananCryptocurrency / Malware Trojanized installers for the TOR anonymity browser are being used to target users in…

Cybercrime
29
Mar
2023

North Korean APT43 Group Uses Cybercrime to Fund Espionage Operations

Mar 29, 2023Ravie LakshmananCyber Threat / Espionage A new North Korean nation-state cyber operator has been attributed to a series…

Security Copilot Tool
28
Mar
2023

Microsoft Introduces GPT-4 AI-Powered Security Copilot Tool to Empower Defenders

Mar 28, 2023Ravie LakshmananArtificial Intelligence / Cyber Threat Microsoft on Tuesday unveiled Security Copilot in preview, marking its continued push…

Pen Testing Solutions
28
Mar
2023

Pen Testing Solutions That Challenge the Status Quo

Mar 28, 2023The Hacker NewsPen Testing / Artificial Intelligence Malicious actors are constantly adapting their tactics, techniques, and procedures (TTPs)…