Category: TheHackerNews

New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force
29
May
2023

New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force

May 29, 2023Ravie LakshmananAuthentication / Mobile Security Researchers have discovered an inexpensive attack technique that could be leveraged to brute-force…

Continuous Threat Exposure Management (CTEM)
29
May
2023

3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them

If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry is obsessed with. From CNAPP,…

AceCryptor
29
May
2023

AceCryptor: Cybercriminals’ Powerful Weapon, Detected in 240K+ Attacks

A crypter (alternatively spelled cryptor) malware dubbed AceCryptor has been used to pack numerous strains of malware since 2016. Slovak cybersecurity firm…

GobRAT Remote Access
29
May
2023

New GobRAT Remote Access Trojan Targeting Linux Routers in Japan

May 29, 2023Ravie LakshmananLinux / Network Security Linux routers in Japan are the target of a new Golang remote access…

.ZIP Domains
29
May
2023

Don’t Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims

A new phishing technique called “file archiver in the browser” can be leveraged to “emulate” a file archiver software in…

Two-Factor Authentication
29
May
2023

PyPI Implements Mandatory Two-Factor Authentication for Project Owners

May 29, 2023Ravie LakshmananSupply Chain / Programming The Python Package Index (PyPI) announced last week that every account that maintains…

Vulnerability
27
May
2023

Critical OAuth Vulnerability in Expo Framework Allows Account Hijacking

May 27, 2023Ravie LakshmananAPI Security / Vulnerability A critical security vulnerability has been disclosed in the Open Authorization (OAuth) implementation…

New Stealthy Bandit Stealer Targeting Web Browsers and Cryptocurrency Wallets
27
May
2023

New Stealthy Bandit Stealer Targeting Web Browsers and Cryptocurrency Wallets

A new stealthy information stealer malware called Bandit Stealer has caught the attention of cybersecurity researchers for its ability to…

Google Cloud
26
May
2023

Severe Flaw in Google Cloud’s Cloud SQL Service Exposed Confidential Data

May 26, 2023Ravie LakshmananData Safety / Cloud Security A new security flaw has been disclosed in the Google Cloud Platform’s…

26
May
2023

Researchers Uncover New Data Theft Capabilities

Security researchers have shared a deep dive into the commercial Android spyware called Predator, which is marketed by the Israeli…

5 Must-Know Facts about 5G Network Security and Its Cloud Benefits
26
May
2023

5 Must-Know Facts about 5G Network Security and Its Cloud Benefits

5G is a game changer for mobile connectivity, including mobile connectivity to the cloud. The technology provides high speed and…

Power Grid Malware
26
May
2023

New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids

May 26, 2023Ravie LakshmananICS/SCADA Security A new strain of malicious software that’s engineered to penetrate and disrupt critical systems in…