Category: TheHackerNews

Social Engineering
12
Feb
2024

4 Ways Hackers use Social Engineering to Bypass MFA

Feb 12, 2024The Hacker NewsCyber Threat / Password Security When it comes to access security, one recommendation stands out above…

Nightmare to IR Speed and Efficiency
12
Feb
2024

Why Are Compromised Identities the Nightmare to IR Speed and Efficiency?

Incident response (IR) is a race against time. You engage your internal or external team because there’s enough evidence that…

Sudo for Windows 11
12
Feb
2024

Microsoft Introduces Linux-Like ‘sudo’ Command to Windows 11

Feb 12, 2024NewsroomOperating System / Technology Microsoft said it’s introducing Sudo for Windows 11 as part of an early preview…

Hive Ransomware
12
Feb
2024

U.S. Offers $10 Million Bounty for Info Leading to Arrest of Hive Ransomware Leaders

The U.S. Department of State has announced monetary rewards of up to $10 million for information about individuals holding key…

Warzone RAT Infrastructure
11
Feb
2024

U.S. DoJ Dismantles Warzone RAT Infrastructure, Arrests Key Operators

Feb 11, 2024NewsroomMalware / Cybercrime The U.S. Justice Department (DoJ) on Friday announced the seizure of online infrastructure that was…

Apple macOS Devices
10
Feb
2024

New Stealthy “RustDoor” Backdoor Targeting Apple macOS Devices

Feb 10, 2024NewsroommacOS Malware / Cyber Threat Apple macOS users are the target of a new Rust-based backdoor that has…

Raspberry Robin Malware
09
Feb
2024

Raspberry Robin Malware Upgrades with Discord Spread and New Exploits

Feb 09, 2024NewsroomMalware / Dark Web The operators of Raspberry Robin are now using two new one-day exploits to achieve…

MoqHao Android Malware
09
Feb
2024

MoqHao Android Malware Evolves with Auto-Execution Capability

Feb 09, 2024NewsroomMobile Security / Cyber Threat Threat hunters have identified a new variant of Android malware called MoqHao that…

Coyote Banking Trojan
09
Feb
2024

New Coyote Trojan Targets 61 Brazilian Banks with Nim-Powered Attack

Feb 09, 2024NewsroomEndpoint Security / Cryptocurrency Sixty-one banking institutions, all of them originating from Brazil, are the target of a…

Myrror Security
09
Feb
2024

Myrror Security Code-Aware and Attack-Aware SCA

Introduction The modern software supply chain represents an ever-evolving threat landscape, with each package added to the manifest introducing new…

Stealthy Zardoor Backdoor
09
Feb
2024

Stealthy Zardoor Backdoor Targets Saudi Islamic Charity Organizations

Feb 09, 2024NewsroomCyber Espionage / Threat Intelligence An unnamed Islamic non-profit organization in Saudi Arabia has been targeted as part…

Challenges of Cybersecurity
09
Feb
2024

Navigating the Challenges of Cybersecurity

Feb 09, 2024The Hacker NewsCloud Security / Open Source XDR / SIEM Cloud computing has innovated how organizations operate and…