Category: TheHackerNews

Android Security
02
May
2024

Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw

May 02, 2024NewsroomVulnerability / Android Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated…

Ukrainian REvil Hacker
02
May
2024

Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million

May 02, 2024NewsroomRansomware / Cyber Crime A Ukrainian national has been sentenced to more than 13 years in prison and…

Botnet
02
May
2024

New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw

A never-before-seen botnet called Goldoon has been observed targeting D-Link routers with a nearly decade-old critical security flaw with the…

Dropbox Digital Signature
02
May
2024

Dropbox Discloses Breach of Digital Signature Service Affecting All Users

May 02, 2024NewsroomCyber Attack / Data Breach Cloud storage services provider Dropbox on Wednesday disclosed that Dropbox Sign (formerly HelloSign)…

When is One Vulnerability Scanner Not Enough?
02
May
2024

When is One Vulnerability Scanner Not Enough?

Like antivirus software, vulnerability scans rely on a database of known weaknesses. That’s why websites like VirusTotal exist, to give…

GitLab Password Reset Vulnerability
02
May
2024

CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability

May 02, 2024NewsroomVulnerability / Data Breach The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting…

Cuttlefish Malware
02
May
2024

New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials

May 02, 2024NewsroomCyber Espionage / Network Security A new malware called Cuttlefish is targeting small office and home office (SOHO)…

Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds
01
May
2024

Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds

May 01, 2024NewsroomFinancial Crime / Forensic Analysis A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain…

Android Malware
01
May
2024

Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers

May 01, 2024NewsroomMalware / Android Cybersecurity researchers have discovered a previously undocumented malware targeting Android devices that uses compromised WordPress…

ZLoader Malware
01
May
2024

ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan

May 01, 2024NewsroomMalware / Cyber Threat The authors behind the resurfaced ZLoader malware have added a feature that was originally…

Cybersecurity Success
01
May
2024

How to Empower Your Employees for Cybersecurity Success

May 01, 2024The Hacker NewsSecurity Awareness Training There’s a natural human desire to avoid threatening scenarios. The irony, of course,…

U.S. Secrets
01
May
2024

Ex-NSA Employee Sentenced to 22 Years for Trying to Sell U.S. Secrets to Russia

May 01, 2024NewsroomNational Security / Insider Threat A former employee of the U.S. National Security Agency (NSA) has been sentenced…