Category: TheHackerNews

NS-STEALER Uses Discord Bots to Exfiltrate Your Secrets from Popular Browsers
22
Jan
2024

NS-STEALER Uses Discord Bots to Exfiltrate Your Secrets from Popular Browsers

Jan 22, 2024NewsroomBrowser Security / Cyber Threat Cybersecurity researchers have discovered a new Java-based “sophisticated” information stealer that uses a…

Location
22
Jan
2024

FTC Bans InMarket for Selling Precise User Location Without Consent

Jan 22, 2024NewsroomPrivacy / Technology The U.S. Federal Trade Commission (FTC) is continuing to clamp down on data brokers by…

Apache ActiveMQ Flaw Exploited in New Godzilla Web Shell Attacks
22
Jan
2024

Apache ActiveMQ Flaw Exploited in New Godzilla Web Shell Attacks

Jan 22, 2024NewsroomVulnerability / Malware Cybersecurity researchers are warning of a “notable increase” in threat actor activity actively exploiting a…

Chinese Hackers
20
Jan
2024

Chinese Hackers Silently Weaponized VMware Zero-Day Flaw for 2 Years

Jan 20, 2024NewsroomZero Day / Cyber Espionage An advanced China-nexus cyber espionage group previously linked to the exploitation of security…

CISA Issues Emergency Directive
20
Jan
2024

CISA Issues Emergency Directive to Federal Agencies on Ivanti Zero-Day Exploits

Jan 20, 2024NewsroomNetwork Security / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday issued an emergency…

Russia-Linked APT Attack
20
Jan
2024

Microsoft’s Top Execs’ Emails Breached in Sophisticated Russia-Linked APT Attack

Jan 20, 2024NewsroomCyber Espionage / Emails Security Microsoft on Friday revealed that it was the target of a nation-state attack…

Invoice Phishing Alert
20
Jan
2024

TA866 Deploys WasabiSeed & Screenshotter Malware

The threat actor tracked as TA866 has resurfaced after a nine-month hiatus with a new large-volume phishing campaign to deliver…

Popular Software
19
Jan
2024

Experts Warn of macOS Backdoor Hidden in Pirated Versions of Popular Software

Jan 19, 2024NewsroomMalware / Endpoint Security Pirated applications targeting Apple macOS users have been observed containing a backdoor capable of…

Data Backup and Recovery
19
Jan
2024

Backup and Recovery Strategies for Exchange Server Administrators

In the current digital landscape, data has emerged as a crucial asset for organizations, akin to currency. It’s the lifeblood…

Npm malware
19
Jan
2024

Npm Trojan Bypasses UAC, Installs AnyDesk with “Oscompatible” Package

Jan 19, 2024NewsroomSoftware Security / Spyware A malicious package uploaded to the npm registry has been found deploying a sophisticated…

Ivanti EPMM Vulnerability
19
Jan
2024

U.S. Cybersecurity Agency Warns of Actively Exploited Ivanti EPMM Vulnerability

Jan 19, 2024NewsroomCyber Theat / Zero-Day The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical…

Docker Malware
18
Jan
2024

New Docker Malware Steals CPU for Crypto & Drives Fake Website Traffic

Jan 18, 2024NewsroomServer Security / Cryptocurrency Vulnerable Docker services are being targeted by a novel campaign in which the threat…