Category: TheHackerNews

OpenAI Bug Bounty Program
13
Apr
2023

OpenAI’s Bug Bounty Program Offers Up to $20,000 Prizes

Apr 13, 2023Ravie LakshmananSoftware Security / Bug Hunting OpenAI, the company behind the massively popular ChatGPT AI chatbot, has launched…

Service Accounts Challenge
12
Apr
2023

Can’t See or Secure Them Until It’s Too Late

Here’s a hard question to answer: ‘How many service accounts do you have in your environment?’. A harder one is:…

Israel-based Spyware Firm QuaDream Targets High-Risk iPhones with Zero-Click Exploit
12
Apr
2023

Israel-based Spyware Firm QuaDream Targets High-Risk iPhones with Zero-Click Exploit

Threat actors using hacking tools from an Israeli surveillanceware vendor named QuaDream targeted at least five members of civil society…

Microsoft Patch Tuesday
12
Apr
2023

Microsoft Issues Patches for 97 Flaws, Including Active Ransomware Exploit

Apr 12, 2023Ravie LakshmananPatch Tuesday / Software Updates It’s the second Tuesday of the month, and Microsoft has released another…

3CX Supply Chain Attack
12
Apr
2023

Lazarus Sub-Group Labyrinth Chollima Uncovered as Mastermind in 3CX Supply Chain Attack

Apr 12, 2023Ravie LakshmananSoftware Security / Cyber Attack Enterprise communications service provider 3CX confirmed that the supply chain attack targeting…

Microsoft Azure
11
Apr
2023

Newly Discovered “By-Design” Flaw in Microsoft Azure Could Expose Storage Accounts to Hackers

Apr 11, 2023Ravie LakshmananCloud Security / Data Security A “by-design flaw” uncovered in Microsoft Azure could be exploited by attackers…

Google Play Store Security
11
Apr
2023

Cybercriminals Turn to Android Loaders on Dark Web to Evade Google Play Security

Apr 11, 2023Ravie LakshmananMobile Security / Malware Malicious loader programs capable of trojanizing Android applications are being traded on the…

Cyber Risk Assessment
11
Apr
2023

[eBook] A Step-by-Step Guide to Cyber Risk Assessment

Apr 11, 2023The Hacker NewsCybersecurity / Guide In today’s perilous cyber risk landscape, CISOs and CIOs must defend their organizations…

Cryptocurrency Stealer Malware
11
Apr
2023

Cryptocurrency Stealer Malware Distributed via 13 NuGet Packages

Apr 11, 2023Ravie LakshmananSoftware Security / Cryptocurrency Cybersecurity researchers have detailed the inner workings of the cryptocurrency stealer malware that…

Hackers Flood NPM
10
Apr
2023

Hackers Flood NPM with Bogus Packages Causing a DoS Attack

Apr 10, 2023Ravie LakshmananSoftware Security / JavaScript Threat actors are flooding the npm open source package repository with bogus packages…

Metasploit Pro
10
Apr
2023

Estonian National Charged in U.S. for Acquiring Electronics and Metasploit Pro for Russian Military

Apr 10, 2023Ravie LakshmananHacking Tool / Cyber Threat An Estonian national has been charged in the U.S. for purchasing U.S.-made…

Cybersecurity Trends
10
Apr
2023

From Zero Trust to Cyber Insurance

As technology advances, cyberattacks are becoming more sophisticated. With the increasing use of technology in our daily lives, cybercrime is…