Category: TheHackerNews

Cinterion Cellular Modems
13
May
2024

Severe Vulnerabilities in Cinterion Cellular Modems Pose Risks to Various Industries

May 13, 2024NewsroomVulnerability / IoT Security Cybersecurity researchers have disclosed multiple security flaws in Cinterion cellular modems that could be…

SHQ Response Platform
13
May
2024

SHQ Response Platform and Risk Centre to Enable Management and Analysts Alike

May 13, 2024The Hacker NewsThreat Detection / SoC / SIEM In the last decade, there has been a growing disconnect…

Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo
13
May
2024

Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo

May 13, 2024NewsroomSoftware Security / Malware Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot…

FIN7 Hacker Group
11
May
2024

FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT

The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a…

North Korean Hackers
10
May
2024

North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms

May 10, 2024NewsroomMalware / Cyber Espionage The North Korean threat actor tracked as Kimsuky has been observed deploying a previously…

AI-Powered Threat Hunting for Cybersecurity Pros (Webinar)
10
May
2024

AI-Powered Threat Hunting for Cybersecurity Pros (Webinar)

May 10, 2024The Hacker NewsArtificial Intelligence / Threat Hunting Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge…

Malicious Android Apps
10
May
2024

Malicious Android Apps Pose as Google, Instagram, WhatsApp, to Steal Credentials

Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been observed to steal users’ credentials…

What's the Right EDR for You?
10
May
2024

What’s the Right EDR for You?

A guide to finding the right endpoint detection and response (EDR) solution for your business’ unique needs. Cybersecurity has become…

Chrome Zero-Day
10
May
2024

Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability

May 10, 2024NewsroomBrowser Security / Vulnerability Google on Thursday released security updates to address a zero-day flaw in Chrome that…

Researchers Uncover 'LLMjacking' Scheme Targeting Cloud-Hosted AI Models
10
May
2024

Researchers Uncover ‘LLMjacking’ Scheme Targeting Cloud-Hosted AI Models

May 10, 2024NewsroomVulnerability / Cloud Security Cybersecurity researchers have discovered a novel attack that employs stolen cloud credentials to target…

TunnelVision Attack
09
May
2024

New TunnelVision Attack Allows Hijacking of VPN Traffic via DHCP Manipulation

May 09, 2024NewsroomEncryption / Data Privacy Researchers have detailed a Virtual Private Network (VPN) bypass technique dubbed TunnelVision that allows…

Large-Scale Malware Campaign
09
May
2024

Kremlin-Backed APT28 Targets Polish Institutions in Large-Scale Malware Campaign

May 09, 2024NewsroomMobile Security / Cyber Attack Polish government institutions have been targeted as part of a large-scale malware campaign…