Category: TheHackerNews

PlugX Malware
27
Jan
2023

Researchers Discover New PlugX Malware Variant Spreading via Removable USB Devices

Jan 27, 2023Ravie LakshmananEndpoint Security / Malware Cybersecurity researchers have uncovered a PlugX sample that employs sneaky methods to infect…

Hacktivist Group
26
Jan
2023

Researchers Uncover Connection b/w Moses Staff and Emerging Abraham’s Ax Hacktivists Group

Jan 26, 2023Ravie Lakshmanan New research has linked the operations of a politically motivated hacktivist group known as Moses Staff…

Windows CryptoAPI Spoofing Vulnerability
26
Jan
2023

Researchers Release PoC Exploit for Windows CryptoAPI Bug Discovered by NSA

Jan 26, 2023Ravie LakshmananEncryption / Windows Security Proof-of-concept (Poc) code has been released for a now-patched high-severity security flaw in…

Hive Ransomware
26
Jan
2023

Hive Ransomware Infrastructure Seized in Joint International Law Enforcement Effort

Jan 26, 2023Ravie LakshmananEncryption / Ransomware The infrastructure associated with the Hive ransomware-as-a-service (RaaS) operation has been seized as part…

Google Takes Down 50,000 Instances of Pro-Chinese DRAGONBRIDGE Influence Operation
26
Jan
2023

Google Takes Down 50,000 Instances of Pro-Chinese DRAGONBRIDGE Influence Operation

Jan 26, 2023Ravie LakshmananThreat Analysis Google on Thursday disclosed it took steps to dismantle over 50,000 instances of activity orchestrated…

Pen Testing
26
Jan
2023

Is Once-Yearly Pen Testing Enough for Your Organization?

Any organization that handles sensitive data must be diligent in its security efforts, which include regular pen testing. Even a…

Python Malware Websockets
26
Jan
2023

New Python-based RAT Uses WebSocket for C2 and Data Exfiltration

Jan 26, 2023Ravie LakshmananThreat Detection / Endpoint Security Cybersecurity researchers have unearthed a new Python-based attack campaign that leverages a…

Hackers using RMM Software
26
Jan
2023

U.S. Federal Agencies Fall Victim to Cyber Attack Utilizing Legitimate RMM Software

Jan 26, 2023Ravie LakshmananCyber Threat / Phishing At least two federal agencies in the U.S. fell victim to a “widespread…

WordPress Hacking
25
Jan
2023

Over 4,500 WordPress Sites Hacked to Redirect Visitors to Sketchy Ad Pages

Jan 25, 2023Ravie LakshmananWebsite Security / WordPress A massive campaign has infected over 4,500 WordPress websites as part of a…

Browser Security Checklist
25
Jan
2023

The Definitive Browser Security Checklist

Security stakeholders have come to realize that the prominent role the browser has in the modern corporate environment requires a…

Credential Harvesting
25
Jan
2023

North Korean Hackers Turn to Credential Harvesting in Latest Wave of Cyberattacks

Jan 25, 2023Ravie LakshmananCryptocurrency / Malware A North Korean nation-state group notorious for crypto heists has been attributed to a…

vRealize Log Insight Software
25
Jan
2023

VMware Releases Patches for Critical vRealize Log Insight Software Vulnerabilities

Jan 25, 2023Ravie LakshmananSoftware Security / VMware VMware on Tuesday released software to remediate four security vulnerabilities affecting vRealize Log…