Category: TheHackerNews

Free Logging
24
Feb
2024

Microsoft Expands Free Logging Capabilities for all U.S. Federal Agencies

Feb 24, 2024NewsroomActive Directory / Data Protection Microsoft has expanded free logging capabilities to all U.S. federal agencies using Microsoft…

Nova Sentinel Malware
23
Feb
2024

Dormant PyPI Package Compromised to Spread Nova Sentinel Malware

Feb 23, 2024NewsroomSupply Chain Attack / Malware A dormant package available on the Python Package Index (PyPI) repository was updated…

SOC Automation
23
Feb
2024

How to Use Tines’s SOC Automation Capability Matrix

Created by John Tuckner and the team at workflow and automation platform Tines, the SOC Automation Capability Matrix (SOC ACM)…

Generative AI
23
Feb
2024

Microsoft Releases PyRIT – A Red Teaming Tool for Generative AI

Feb 23, 2024NewsroomRed Teaming / Artificial Intelligence Microsoft has released an open access automation framework called PyRIT (short for Python…

Zero-Click Shortcuts Vulnerability
23
Feb
2024

Researchers Detail Apple’s Recent Zero-Click Shortcuts Vulnerability

Feb 23, 2024NewsroomData Privacy / iOS Security Details have emerged about a now-patched high-severity security flaw in Apple’s Shortcuts app…

FTC Slams Avast with $16.5 Million Fine for Selling Users' Browsing Data
23
Feb
2024

FTC Slams Avast with $16.5 Million Fine for Selling Users’ Browsing Data

Feb 23, 2024NewsroomPrivacy / Regulatory Compliance The U.S. Federal Trade Commission (FTC) has hit antivirus vendor Avast with a $16.5…

Quantum-Proof Encryption for iMessage
22
Feb
2024

Apple Unveils PQ3 Protocol – Post-Quantum Encryption for iMessage

Feb 22, 2024NewsroomQuantum Computing / Encryption Apple has announced a new post-quantum cryptographic protocol called PQ3 that it said will…

Konni RAT Malware
22
Feb
2024

Russian Government Software Backdoored to Deploy Konni RAT Malware

Feb 22, 2024NewsroomMalware / Cyber Espionage An installer for a tool likely used by the Russian Consular Department of the…

Open-Source SSH-Snake Tool
22
Feb
2024

Cybercriminals Weaponizing Open-Source SSH-Snake Tool for Network Attacks

Feb 22, 2024NewsroomNetwork Security / Penetration Testing A recently open-sourced network mapping tool called SSH-Snake has been repurposed by threat…

LockBit
22
Feb
2024

U.S. Offers $15 Million Bounty to Hunt Down LockBit Ransomware Leaders

The U.S. State Department has announced monetary rewards of up to $15 million for information that could lead to the…

VMware EAP
21
Feb
2024

VMware Alert: Uninstall EAP Now

Feb 21, 2024NewsroomActive Directory / Vulnerability VMware is urging users to uninstall the deprecated Enhanced Authentication Plugin (EAP) following the…

New Wi-Fi Vulnerabilities
21
Feb
2024

New Wi-Fi Vulnerabilities Expose Android and Linux Devices to Hackers

Feb 21, 2024NewsroomNetwork Security / Vulnerability Cybersecurity researchers have identified two authentication bypass flaws in open-source Wi-Fi software found in…