Category: TheHackerNews

SaaS Identity Governance
21
Feb
2024

6 Ways to Simplify SaaS Identity Governance

With SaaS applications now making up the vast majority of technology used by employees in most organizations, tasks related to…

PlugX Variant DOPLUGS
21
Feb
2024

Mustang Panda Targets Asia with Advanced PlugX Variant DOPLUGS

Feb 21, 2024NewsroomMalware / Cyber Espionage The China-linked threat actor known as Mustang Panda has targeted various Asian countries using…

Cybersecurity for Healthcare
21
Feb
2024

Cybersecurity for Healthcare—Diagnosing the Threat Landscape and Prescribing Solutions for Recovery

On Thanksgiving Day 2023, while many Americans were celebrating, hospitals across the U.S. were doing quite the opposite. Systems were…

Signal Username
21
Feb
2024

Signal Introduces Usernames, Allowing Users to Keep Their Phone Numbers Private

Feb 21, 2024NewsroomSecure Communication / Anonymity End-to-end encrypted (E2EE) messaging app Signal said it’s piloting a new feature that allows…

VietCredCare Stealer
21
Feb
2024

New ‘VietCredCare’ Stealer Targeting Facebook Advertisers in Vietnam

Feb 21, 2024NewsroomMalware / Cyber Threat Facebook advertisers in Vietnam are the target of a previously unknown information stealer dubbed…

Disinformation and Credential-Harvesting Attacks
21
Feb
2024

Russian Hackers Target Ukraine with Disinformation and Credential-Harvesting Attacks

Feb 21, 2024NewsroomPhishing Attack / Information Warfare Cybersecurity researchers have unearthed a new influence operation targeting Ukraine that leverages spam…

ConnectWise ScreenConnect Software
21
Feb
2024

Critical Flaws Found in ConnectWise ScreenConnect Software

Feb 20, 2024NewsroomVulnerability / Network Security ConnectWise has released software updates to address two security flaws in its ScreenConnect remote…

North Korean Hackers
21
Feb
2024

New Report Reveals North Korean Hackers Targeting Defense Firms Worldwide

Feb 20, 2024NewsroomHacking / Cyber Espionage North Korean state-sponsored threat actors have been attributed to a cyber espionage campaign targeting…

Cybersecurity Framework
21
Feb
2024

SaaS Compliance through the NIST Cybersecurity Framework

The US National Institute of Standards and Technology (NIST) cybersecurity framework is one of the world’s most important guidelines for…

Malicious PyPI Packages
20
Feb
2024

New Malicious PyPI Packages Caught Using Covert Side-Loading Tactics

Feb 20, 2024NewsroomMalware / Supply Chain Security Cybersecurity researchers have discovered two malicious packages on the Python Package Index (PyPI)…

Redis Servers for Cryptocurrency Mining
20
Feb
2024

New Migo Malware Targeting Redis Servers for Cryptocurrency Mining

Feb 20, 2024NewsroomServer Security / Cryptojacking A novel malware campaign has been observed targeting Redis servers for initial access with…

LockBit Ransomware Operation Shut Down
20
Feb
2024

LockBit Ransomware Operation Shut Down; Criminals Arrested; Decryption Keys Released

Feb 20, 2024NewsroomRansomware / Data Protection The U.K. National Crime Agency (NCA) on Tuesday confirmed that it obtained LockBit’s source…