Category: TheHackerNews

Experts Sound Alarm Over Growing Attacks Exploiting Zoho ManageEngine Products
23
Feb
2023

Experts Sound Alarm Over Growing Attacks Exploiting Zoho ManageEngine Products

Feb 23, 2023Ravie Lakshmanan Multiple threat actors have been observed opportunistically weaponizing a now-patched critical security vulnerability impacting several Zoho…

Lazarus Group
23
Feb
2023

Lazarus Group Likely Using New WinorDLL64 Backdoor to Exfiltrate Sensitive Data

Feb 23, 2023Ravie LakshmananCyber Threat / Data Security A new backdoor associated with a malware downloader named Wslink has been…

Vulnerability
23
Feb
2023

The Secret Vulnerability Finance Execs are Missing

The (Other) Risk in Finance A few years ago, a Washington-based real estate developer received a document link from First…

Hacking
23
Feb
2023

New Hacking Cluster ‘Clasiopa’ Targeting Materials Research Organizations in Asia

Feb 23, 2023Ravie LakshmananMalware / Threat Intel Materials research organizations in Asia have been targeted by a previously unknown threat…

PyPI Malware
23
Feb
2023

Python Developers Warned of Trojanized PyPI Packages Mimicking Popular Libraries

Feb 23, 2023Ravie LakshmananSoftware Security / Supply Chain Attack Cybersecurity researchers are warning of “imposter packages” mimicking popular libraries available…

Hydrochasma
22
Feb
2023

New Threat Actor Targets Shipping Companies and Medical Labs in Asia

Feb 22, 2023Ravie LakshmananCyber Espionage / Cyber Attack Shipping companies and medical laboratories in Asia have been the subject of…

iPhone, iPad, and Mac Vulnerabilities
22
Feb
2023

Apple Warns of 3 New Vulnerabilities Affecting iPhone, iPad, and Mac Devices

Feb 22, 2023Ravie LakshmananEndpoint Security / Software Update Apple has revised the security advisories it released last month to include…

Third-Party Risk Management Program
22
Feb
2023

3 Steps to Automate Your Third-Party Risk Management Program

Feb 22, 2023The Hacker NewsCyber Risk Management If you Google “third-party data breaches” you will find many recent reports of…

NPM Repository
22
Feb
2023

Attackers Flood NPM Repository with Over 15,000 Spam Packages Containing Phishing Links

Feb 22, 2023Ravie LakshmananOpen Source / Supply Chain Attack In what’s a continuing assault on the open source ecosystem, over…

DDoS Attack
22
Feb
2023

Gcore Thwarts Massive 650 Gbps DDoS Attack on Free Plan Client

Feb 22, 2023The Hacker NewsServer Security / DDoS Attack At the beginning of January, Gcore faced an incident involving several…

Havoc Framework for Post-Exploitation
22
Feb
2023

Threat Actors Adopt Havoc Framework for Post-Exploitation in Targeted Attacks

Feb 22, 2023Ravie LakshmananExploitation Framework / Cyber Threat An open source command-and-control (C2) framework known as Havoc is being adopted…

CISA KEV Catalog
22
Feb
2023

U.S. Cybersecurity Agency CISA Adds Three New Vulnerabilities in KEV Catalog

Feb 22, 2023Ravie LakshmananCyber Risk / Patch Management The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three…