Category: TheHackerNews

Experts Uncover Passive Method to Extract Private RSA Keys from SSH Connections
27
Nov
2023

Experts Uncover Passive Method to Extract Private RSA Keys from SSH Connections

Nov 27, 2023NewsroomServer Security / Encryption A new study has demonstrated that it’s possible for passive network attackers to obtain…

Secure AI System
27
Nov
2023

U.S., U.K., and Global Partners Release Secure AI System Development Guidelines

Nov 27, 2023NewsroomArtificial Intelligence / Privacy The U.K. and U.S., along with international partners from 16 other countries, have released…

Web Shell Detected in APT Attack
25
Nov
2023

New ‘HrServ.dll’ Web Shell Detected in APT Attack Targeting Afghan Government

Nov 25, 2023NewsroomCyber Attack / Threat Intelligence An unspecified government entity in Afghanistan was targeted by a previously undocumented web…

ownCloud breach
25
Nov
2023

3 Critical Vulnerabilities Expose ownCloud Users to Data Breaches

Nov 25, 2023NewsroomData Security / Vulnerability The maintainers of the open-source file-sharing software ownCloud have warned of three critical security…

Phishing Telegram Bot
24
Nov
2023

Cybercriminals Using Telekopye Telegram Bot to Craft Phishing Scams on a Grand Scale

Nov 24, 2023NewsroomThreat Analysis / Dark Web More details have emerged about a malicious Telegram bot called Telekopye that’s used…

API Security
24
Nov
2023

Tell Me Your Secrets Without Telling Me Your Secrets

Nov 24, 2023The Hacker NewsDeveloper Tools / API Security The title of this article probably sounds like the caption to…

Hamas-Linked Cyberattacks
24
Nov
2023

Hamas-Linked Cyberattacks Using Rust-Powered SysJoker Backdoor Against Israel

Nov 24, 2023NewsroomCyber Attack / Malware Cybersecurity researchers have shed light on a Rust version of a cross-platform backdoor called…

Kubernetes Secrets
24
Nov
2023

Kubernetes Secrets of Fortune 500 Companies Exposed in Public Repositories

Nov 24, 2023NewsroomCloud security / Data Protection Cybersecurity researchers are warning of publicly exposed Kubernetes configuration secrets that could put…

Espionage Attacks
23
Nov
2023

Konni Group Using Russian-Language Malicious Word Docs in Latest Attacks

Nov 23, 2023NewsroomMalware / Cyber Espionage A new phishing attack has been observed leveraging a Russian-language Microsoft Word document to…

WailingCrab Malware
23
Nov
2023

New WailingCrab Malware Loader Spreading via Shipping-Themed Emails

Nov 23, 2023NewsroomMalware / Threat Analysis Delivery- and shipping-themed email messages are being used to deliver a sophisticated malware loader…

DDoS Attacks
23
Nov
2023

Mirai-based Botnet Exploiting Zero-Day Bugs in Routers and NVRs for Massive DDoS Attacks

Nov 23, 2023NewsroomVulnerability / Cyber Threat An active malware campaign is leveraging two zero-day vulnerabilities with remote code execution (RCE)…

6 Steps to Accelerate Cybersecurity Incident Response
23
Nov
2023

6 Steps to Accelerate Cybersecurity Incident Response

Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad…