Category: TheHackerNews

BackdoorDiplomacy Cyber Attacks
18
Jan
2023

Iranian Government Entities Under Attack by New Wave of BackdoorDiplomacy Attacks

Jan 18, 2023Ravie LakshmananCyber Espionage / Cyber Risk The threat actor known as BackdoorDiplomacy has been linked to a new…

virtual CISO
18
Jan
2023

How MSSPs and vCISOs can extend their services into compliance readiness without increasing cost

Jan 18, 2023The Hacker NewsVirtual CISO / Automated vCISO Compliance services are emerging as one of the hottest areas of…

Industrial Control Systems
18
Jan
2023

CISA Warns of Flaws in Siemens, GE Digital, and Contec Industrial Control Systems

Jan 18, 2023Ravie LakshmananICS/SCADA Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published four Industrial Control Systems (ICS)…

Zoho ManageEngine PoC Exploit
17
Jan
2023

Zoho ManageEngine PoC Exploit to be Released Soon

Jan 17, 2023Ravie LakshmananCyber Threat / Vulnerability Users of Zoho ManageEngine are being urged to patch their instances against a…

Microsoft Azure Services
17
Jan
2023

Microsoft Azure Services Flaws Could’ve Exposed Cloud Resources to Unauthorized Access

Jan 17, 2023Ravie LakshmananCloud Security / Bug Report Four different Microsoft Azure services have been found vulnerable to server-side request…

GitHub Codespaces
17
Jan
2023

Hackers Can Abuse Legitimate GitHub Codespaces Feature to Deliver Malware

Jan 17, 2023Ravie LakshmananThreat Response / Malware New research has found that it is possible for threat actors to abuse…

SOC Platforms
17
Jan
2023

4 Places to Supercharge Your SOC with Automation

It’s no secret that the job of SOC teams continues to become increasingly difficult. Increased volume and sophistication of attacks…

PyPI Package
17
Jan
2023

Researchers Uncover 3 PyPI Packages Spreading Malware to Developer Systems

Jan 17, 2023Ravie LakshmananSoftware Security / Supply Chain A threat actor by the name Lolip0p has uploaded three rogue packages…

Identity Management
16
Jan
2023

A Secure User Authentication Method – Planning is More Important than Ever

Jan 16, 2023The Hacker NewsIdentity Management / MFA When considering authentication providers, many organizations consider the ease of configuration, ubiquity…

Fake Cracked Software
16
Jan
2023

Raccoon and Vidar Stealers Spreading via Massive Network of Fake Cracked Software

Jan 16, 2023Ravie LakshmananData Security / Cyber Threat A “large and resilient infrastructure” comprising over 250 domains is being used…

Industrial Control Systems
16
Jan
2023

CISA Warns for Flaws Affecting Industrial Control Systems from Major Manufacturers

Jan 16, 2023Ravie LakshmananIndustrial Control Systems The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released several Industrial Control Systems…

CIA's Hive Malware
16
Jan
2023

New Backdoor Created Using Leaked CIA’s Hive Malware Discovered in the Wild

Jan 16, 2023Ravie LakshmananThreat Landscape / Malware Unidentified threat actors have deployed a new backdoor that borrows its features from…