Category: TheHackerNews

Privacy-Compliant Customer Data Platform (CDP)
28
Feb
2024

Building Your Privacy-Compliant Customer Data Platform (CDP) with First-Party Data

Feb 28, 2024The Hacker NewsWebinar / Privacy In today’s digital era, data privacy isn’t just a concern; it’s a consumer…

Privileged Access Management
28
Feb
2024

How to Bridge Privileged Access Management and Identity Management

Feb 28, 2024The Hacker NewsZero Trust / Cyber Threat Traditional perimeter-based security has become costly and ineffective. As a result,…

TimbreStealer Malware
28
Feb
2024

TimbreStealer Malware Spreading via Tax-themed Phishing Scam Targets IT Users

Feb 28, 2024NewsroomPhishing Attack / Malware Mexican users have been targeted with tax-themed phishing lures at least since November 2023…

MooBot Threat
28
Feb
2024

Cybersecurity Agencies Warn Ubiquiti EdgeRouter Users of APT28’s MooBot Threat

Feb 28, 2024NewsroomFirmware Security / Vulnerability In a new joint advisory, cybersecurity and intelligence agencies from the U.S. and other…

Hugging Face Vulnerability
27
Feb
2024

New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks

Feb 27, 2024NewsroomSupply Chain Attack / Data Security Cybersecurity researchers have found that it’s possible to compromise the Hugging Face…

WordPress LiteSpeed Plugin
27
Feb
2024

WordPress LiteSpeed Plugin Vulnerability Puts 5 Million Sites at Risk

Feb 27, 2024NewsroomVulnerability / Website Security A security vulnerability has been disclosed in the LiteSpeed Cache plugin for WordPress that…

RAT Trojan
27
Feb
2024

Open-Source Xeno RAT Trojan Emerges as a Potent Threat on GitHub

Feb 27, 2024The Hacker NewsMalware / Network Security An “intricately designed” remote access trojan (RAT) called Xeno RAT has been…

Cloud Attack Tactics
27
Feb
2024

Five Eyes Agencies Expose APT29’s Evolving Cloud Attack Tactics

Feb 27, 2024NewsroomCloud Security / Threat Intelligence Cybersecurity and intelligence agencies from the Five Eyes nations have released a joint…

SOC Investigations
27
Feb
2024

How to Speed Up Your SOC Investigations

Processing alerts quickly and efficiently is the cornerstone of a Security Operations Center (SOC) professional’s role. Threat intelligence platforms can…

WordPress
27
Feb
2024

WordPress Plugin Alert – Critical SQLi Vulnerability Threatens 200K+ Websites

Feb 27, 2024NewsroomWebsite Security / Cryptojacking A critical security flaw has been disclosed in a popular WordPress plugin called Ultimate…

Malicious npm Packages
26
Feb
2024

North Korean Hackers Targeting Developers with Malicious npm Packages

Feb 26, 2024The Hacker NewsSoftware Security / Cryptocurrency A set of fake npm packages discovered on the Node.js repository has…

New IDAT Loader Attacks Using Steganography to Deploy Remcos RAT
26
Feb
2024

New IDAT Loader Attacks Using Steganography to Deploy Remcos RAT

Feb 26, 2024The Hacker NewsSteganography / Malware Ukrainian entities based in Finland have been targeted as part of a malicious…