Category: TheHackerNews

SaaS Challenges of 2023
24
Feb
2023

How to Tackle the Top SaaS Challenges of 2023

Feb 24, 2023The Hacker NewsCybersecurity Webinar / SaaS Security Are you prepared to tackle the top SaaS challenges of 2023?…

Data Safety Labels
24
Feb
2023

Even Top-Ranked Android Apps in Google Play Store Provide Misleading Data Safety Labels

Feb 24, 2023Ravie LakshmananPrivacy / Data Safety An investigation into data safety labels for Android apps available on the Google…

Mining Cryptocurrency
23
Feb
2023

New S1deload Malware Hijacking Users’ Social Media Accounts and Mining Cryptocurrency

Feb 23, 2023Ravie LakshmananCryptocurrency / Malware An active malware campaign has set its sights on Facebook and YouTube users by…

Cryptocurrency Mining Malware
23
Feb
2023

Hackers Using Trojanized macOS Apps to Deploy Evasive Cryptocurrency Mining Malware

Feb 23, 2023Ravie LakshmananEndpoint Security / Cryptocurrency Trojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining…

Experts Sound Alarm Over Growing Attacks Exploiting Zoho ManageEngine Products
23
Feb
2023

Experts Sound Alarm Over Growing Attacks Exploiting Zoho ManageEngine Products

Feb 23, 2023Ravie Lakshmanan Multiple threat actors have been observed opportunistically weaponizing a now-patched critical security vulnerability impacting several Zoho…

Lazarus Group
23
Feb
2023

Lazarus Group Likely Using New WinorDLL64 Backdoor to Exfiltrate Sensitive Data

Feb 23, 2023Ravie LakshmananCyber Threat / Data Security A new backdoor associated with a malware downloader named Wslink has been…

Vulnerability
23
Feb
2023

The Secret Vulnerability Finance Execs are Missing

The (Other) Risk in Finance A few years ago, a Washington-based real estate developer received a document link from First…

Hacking
23
Feb
2023

New Hacking Cluster ‘Clasiopa’ Targeting Materials Research Organizations in Asia

Feb 23, 2023Ravie LakshmananMalware / Threat Intel Materials research organizations in Asia have been targeted by a previously unknown threat…

PyPI Malware
23
Feb
2023

Python Developers Warned of Trojanized PyPI Packages Mimicking Popular Libraries

Feb 23, 2023Ravie LakshmananSoftware Security / Supply Chain Attack Cybersecurity researchers are warning of “imposter packages” mimicking popular libraries available…

Hydrochasma
22
Feb
2023

New Threat Actor Targets Shipping Companies and Medical Labs in Asia

Feb 22, 2023Ravie LakshmananCyber Espionage / Cyber Attack Shipping companies and medical laboratories in Asia have been the subject of…

iPhone, iPad, and Mac Vulnerabilities
22
Feb
2023

Apple Warns of 3 New Vulnerabilities Affecting iPhone, iPad, and Mac Devices

Feb 22, 2023Ravie LakshmananEndpoint Security / Software Update Apple has revised the security advisories it released last month to include…

Third-Party Risk Management Program
22
Feb
2023

3 Steps to Automate Your Third-Party Risk Management Program

Feb 22, 2023The Hacker NewsCyber Risk Management If you Google “third-party data breaches” you will find many recent reports of…