Category: TheHackerNews

WordPress
10
Apr
2023

Over 1 Million WordPress Sites Infected by Balada Injector Malware Campaign

Apr 10, 2023Ravie LakshmananWeb Security / Malware Over one million WordPress websites are estimated to have been infected by an…

Wazuh open source security platform
10
Apr
2023

The open source security platform

Today, businesses face a variety of security challenges like cyber attacks, compliance requirements, and endpoint security administration. The threat landscape…

CISA
10
Apr
2023

CISA Warns of 5 Actively Exploited Security Flaws: Urgent Action Required

Apr 10, 2023Ravie LakshmananSoftware Security / Cyber Threat The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added five…

Ransomware Attack
08
Apr
2023

Taiwanese PC Company MSI Falls Victim to Ransomware Attack

Apr 08, 2023Ravie LakshmananMalware / Cyber Attack Taiwanese PC company MSI (short for Micro-Star International) officially confirmed it was the…

Iran-Based Hackers
08
Apr
2023

Iran-Based Hackers Caught Carrying Out Destructive Attacks Under Ransomware Guise

Apr 08, 2023Ravie LakshmananCyber War / Cyber Threat The Iranian nation-state group known as MuddyWater has been observed carrying out…

vm2 Sandbox Library
08
Apr
2023

Researchers Discover Critical Remote Code Execution Flaw in vm2 Sandbox Library

Apr 08, 2023Ravie LakshmananVulnerability / Software The maintainers of the vm2 JavaScript sandbox module have shipped a patch to address…

Apple Zero-Day
08
Apr
2023

Apple Releases Updates to Address Zero-Day Flaws in iOS, iPadOS, macOS, and Safari

Apr 08, 2023Ravie LakshmananZero-Day / Endpoint Security Apple on Friday released security updates for iOS, iPadOS, macOS, and Safari web…

Phishing Kit Market on Telegram
07
Apr
2023

Researchers Uncover Thriving Phishing Kit Market on Telegram Channels

Apr 07, 2023Ravie LakshmananCyber Threat / Online Security In yet another sign that Telegram is increasingly becoming a thriving hub…

Source Code Leak
07
Apr
2023

Are Source Code Leaks the New Threat Software vendors Should Care About?

Less than a month ago, Twitter indirectly acknowledged that some of its source code had been leaked on the code-sharing…

Cobalt Strike
07
Apr
2023

Microsoft Takes Legal Action to Disrupt Cybercriminals’ Illegal Use of Cobalt Strike Tool

Apr 07, 2023Ravie Lakshmanan Microsoft said it teamed up with Fortra and Health Information Sharing and Analysis Center (Health-ISAC) to…

Industrial Control Systems (ICS) advisories
07
Apr
2023

CISA Warns of Critical ICS Flaws in Hitachi, mySCADA, ICL, and Nexx Products

Apr 07, 2023Ravie LakshmananIndustrial Control System The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published eight Industrial Control Systems…

Supply Chain Attacks
06
Apr
2023

How CISA Helps Secure a Nation’s Crown Jewels

Critical infrastructure attacks are a preferred target for cyber criminals. Here’s why and what’s being done to protect them. What…