Category: TheHackerNews

Attack Surface
10
Jan
2024

Getting off the Attack Surface Hamster Wheel: Identity Can Help

IT professionals have developed a sophisticated understanding of the enterprise attack surface – what it is, how to quantify it…

Sensitive Location Data
10
Jan
2024

FTC Bans Outlogic (X-Mode) From Selling Sensitive Location Data

Jan 10, 2024NewsroomPrivacy / Regulatory Compliance The U.S. Federal Trade Commission (FTC) on Tuesday prohibited data broker Outlogic, which was…

Windows Update
10
Jan
2024

Microsoft’s January 2024 Windows Update Patches 48 New Vulnerabilities

Jan 10, 2024NewsroomVulnerability / Windows Security Microsoft has addressed a total of 48 security flaws spanning its software as part…

CISA Flags 6 Vulnerabilities
10
Jan
2024

CISA Flags 6 Vulnerabilities – Apple, Apache, Adobe , D-Link, Joomla Under Attack

Jan 10, 2024NewsroomPatch Management / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added six security flaws…

PikaBot Loader Malware
09
Jan
2024

Water Curupira Hackers Actively Distributing PikaBot Loader Malware

Jan 09, 2024NewsroomMalware / Cyber Threat A threat actor called Water Curupira has been observed actively distributing the PikaBot loader…

Turkish Hackers
09
Jan
2024

Turkish Hackers Exploiting Poorly Secured MS SQL Servers Across the Globe

Jan 09, 2024NewsroomData Security / Cyber Attack Poorly secured Microsoft SQL (MS SQL) servers are being targeted in the U.S.,…

SaaS Attack Surface
09
Jan
2024

Why Public Links Expose Your SaaS Attack Surface

Jan 09, 2024The Hacker NewsSaaS Security / Data Security Collaboration is a powerful selling point for SaaS applications. Microsoft, Github,…

QNAP and Kyocera Device Manager
09
Jan
2024

New Vulnerabilities Discovered in QNAP and Kyocera Device Manager

Jan 09, 2024NewsroomNetwork Security / Data Protection A security flaw has been disclosed in Kyocera’s Device Manager product that could…

Lumma Stealer
09
Jan
2024

Beware! YouTube Videos Promoting Cracked Software Distribute Lumma Stealer

Jan 09, 2024NewsroomMalware / Cyber Threat Threat actors are resorting to YouTube videos featuring content related to cracked software in…

Silver RAT to Cybercriminals
08
Jan
2024

Syrian Hackers Distributing Stealthy C#-Based Silver RAT to Cybercriminals

Jan 08, 2024NewsroomMalware / Cybercrime Threat actors operating under the name Anonymous Arabic have released a remote access trojan (RAT)…

AI Security and Privacy
08
Jan
2024

NIST Warns of Security and Privacy Risks from Rapid AI System Deployment

Jan 08, 2024NewsroomArtificial Intelligence / Cyber Security The U.S. National Institute of Standards and Technology (NIST) is calling attention to…

Webinar – Leverage Zero Trust Security to Minimize Your Attack Surface
08
Jan
2024

Webinar – Leverage Zero Trust Security to Minimize Your Attack Surface

Jan 08, 2024NewsroomCyber Security / Zero Trust Digital expansion inevitably increases the external attack surface, making you susceptible to cyberthreats….