Category: TheHackerNews

APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP
18
Dec
2024

APT29 Hackers Target High-Value Victims Using Rogue RDP Servers and PyRDP

Dec 18, 2024Ravie LakshmananCyber Espionage / Malware The Russia-linked APT29 threat actor has been observed repurposing a legitimate red teaming…

End-to-End OS Platform
18
Dec
2024

Introducing our End-to-End OS Platform

Having been at ActiveState for nearly eight years, I’ve seen many iterations of our product. However, one thing has stayed…

Romance Baiting
18
Dec
2024

INTERPOL Pushes for “Romance Baiting” to Replace “Pig Butchering” in Scam Discourse

Dec 18, 2024Ravie LakshmananCyber Fraud / Social engineering INTERPOL is calling for a linguistic shift that aims to put to…

Critical Apache Struts Flaw
18
Dec
2024

Critical Apache Struts Flaw Found, Exploitation Attempts Detected

Dec 18, 2024Ravie LakshmananCyber Attack / Vulnerability Threat actors are attempting to exploit a recently disclosed security flaw impacting Apache…

Facebook Data Breach
18
Dec
2024

Meta Fined €251 Million for 2018 Data Breach Impacting 29 Million Accounts

Dec 18, 2024Ravie LakshmananData Breach / Privacy Meta Platforms, the parent company of Facebook, Instagram, WhatsApp, and Threads, has been…

Microsoft Teams and AnyDesk
17
Dec
2024

Attackers Exploit Microsoft Teams and AnyDesk to Deploy DarkGate Malware

Dec 17, 2024Ravie LakshmananMalware / Credential Theft A new social engineering campaign has leveraged Microsoft Teams as a way to…

Obfuscated Backdoor
17
Dec
2024

Hackers Use Microsoft MSC Files to Deploy Obfuscated Backdoor in Pakistan Attacks

Dec 17, 2024Ravie LakshmananCyber Attack / Malware A new phishing campaign has been observed employing tax-themed lures to deliver a…

Even Great Companies Get Breached
17
Dec
2024

Even Great Companies Get Breached — Find Out Why and How to Stop It

Dec 17, 2024The Hacker NewsWebinar / Risk Management Even the best companies with the most advanced tools can still get…

Cyber Threat Hunting
17
Dec
2024

5 Practical Techniques for Effective Cyber Threat Hunting

Addressing cyber threats before they have a chance to strike or inflict serious damage is by far the best security…

WmRAT and MiyaRAT Malware
17
Dec
2024

Bitter APT Targets Turkish Defense Sector with WmRAT and MiyaRAT Malware

Dec 17, 2024Ravie LakshmananCyber Espionage / Malware A suspected South Asian cyber espionage threat group known as Bitter targeted a…

CoinLurker Malware
17
Dec
2024

Hackers Exploit Webview2 to Deploy CoinLurker Malware and Evade Security Detection

Bogus software update lures are being used by threat actors to deliver a new stealer malware called CoinLurker. “Written in…

CISA and FBI Raise Alerts
17
Dec
2024

CISA and FBI Raise Alerts on Exploited Flaws and Expanding HiatusRAT Campaign

Dec 17, 2024Ravie LakshmananNetwork Security / IoT Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two…