Category: TheHackerNews

Bluetooth Flaw
07
Dec
2023

New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices

Dec 07, 2023The Hacker NewsMobile Security / Vulnerability A critical Bluetooth security flaw could be exploited by threat actors to…

Threat Intelligence
07
Dec
2023

Building a Robust Threat Intelligence with Wazuh

Dec 07, 2023The Hacker NewsThreat Intelligence / Network Security Threat intelligence refers to gathering, processing, and analyzing cyber threats, along…

End-to-End Encryption
07
Dec
2023

Meta Launches Default End-to-End Encryption for Chats and Calls on Messenger

Dec 07, 2023The Hacker NewsEncryption / Data Privacy Meta has officially begun to roll out support for end-to-end encryption (E2EE)…

Linux Trojan
07
Dec
2023

New Stealthy ‘Krasue’ Linux Trojan Targeting Telecom Firms in Thailand

Dec 07, 2023The Hacker NewsMalware / Security Breach A previously unknown Linux remote access trojan called Krasue has been observed…

Cloud Accounts
06
Dec
2023

Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts

Dec 06, 2023NewsroomAccess Management / Cloud Security Threat actors can take advantage of Amazon Web Services Security Token Service (AWS…

Sierra Wireless Routers
06
Dec
2023

Flaws in Sierra Wireless Routers Expose Critical Sectors to Cyber Attacks

Dec 06, 2023NewsroomCyber Threat / Vulnerability A collection of 21 security flaws have been discovered in Sierra Wireless AirLink cellular…

Unveiling the Threat of Malicious Browser Extensions
06
Dec
2023

Unveiling the Threat of Malicious Browser Extensions

Dec 06, 2023The Hacker NewsBrowser Security / Privacy Compromising the browser is a high-return target for adversaries. Browser extensions, which…

Adobe ColdFusion Vulnerability
06
Dec
2023

Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency Servers

Dec 06, 2023NewsroomVulnerability / Web Server Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation of…

Security Operations with Automation
06
Dec
2023

Scaling Security Operations with Automation

In an increasingly complex and fast-paced digital landscape, organizations strive to protect themselves from various security threats. However, limited resources…

Atlassian
06
Dec
2023

Atlassian Releases Critical Software Fixes to Prevent Remote Code Execution

Dec 06, 2023NewsroomSoftware Security / Vulnerability Atlassian has released software fixes to address four critical flaws in its software that,…

Qualcomm
06
Dec
2023

Qualcomm Releases Details on Chip Vulnerabilities Exploited in Targeted Attacks

Dec 06, 2023NewsroomVulnerability / Mobile Security Chipmaker Qualcomm has released more information about three high-severity security flaws that it said…

Lockdown Mode Attack
05
Dec
2023

Experts Warn of Sneaky Fake Lockdown Mode Attack

Dec 05, 2023NewsroomMobile Security / Spyware A new “post-exploitation tampering technique” can be abused by malicious actors to visually deceive…