Category: TheHackerNews

Credential Harvesting
25
Jan
2023

North Korean Hackers Turn to Credential Harvesting in Latest Wave of Cyberattacks

Jan 25, 2023Ravie LakshmananCryptocurrency / Malware A North Korean nation-state group notorious for crypto heists has been attributed to a…

vRealize Log Insight Software
25
Jan
2023

VMware Releases Patches for Critical vRealize Log Insight Software Vulnerabilities

Jan 25, 2023Ravie LakshmananSoftware Security / VMware VMware on Tuesday released software to remediate four security vulnerabilities affecting vRealize Log…

GoTo Suffers Data Breach
25
Jan
2023

LastPass Parent Company GoTo Suffers Data Breach, Customers’ Backups Compromised

Jan 25, 2023Ravie LakshmananData Breach / Remote Work Tool LastPass-owner GoTo (formerly LogMeIn) on Tuesday disclosed that unidentified threat actors…

Emotet Malware
24
Jan
2023

Emotet Malware Makes a Comeback with New Evasion Techniques

Jan 24, 2023Ravie LakshmananCyber Threat / Cyber Crime The Emotet malware operation has continued to refine its tactics in an…

Golang Malware in DragonSpark Attacks
24
Jan
2023

Chinese Hackers Utilize Golang Malware in DragonSpark Attacks to Evade Detection

Jan 24, 2023Ravie LakshmananCyber Espionage / Golang Organizations in East Asia are being targeted by a likely Chinese-speaking actor dubbed…

Some Vulnerabilities Date Back to the Last Millennium
24
Jan
2023

Some Vulnerabilities Date Back to the Last Millennium

Vulnerability analysis results in Orange Cyberdefenses’ Security Navigator show that some vulnerabilities first discovered in 1999 are still found in…

Horizon Bridge Crypto Theft
24
Jan
2023

FBI Says North Korean Hackers Behind $100 Million Horizon Bridge Crypto Theft

Jan 24, 2023Ravie LakshmananCryptocurrency / Cyber Crime The U.S. Federal Bureau of Investigation (FBI) on Monday confirmed that North Korean…

Apple Actively Exploited Vulnerability
24
Jan
2023

Apple Issues Updates for Older Devices to Fix Actively Exploited Vulnerability

Jan 24, 2023Ravie LakshmananMobile Security / 0-Day Attack Apple has backported fixes for a recently disclosed critical security flaw affecting…

End-to-End Encrypted Messenger App
24
Jan
2023

Facebook Introduces New Features for End-to-End Encrypted Messenger App

Jan 24, 2023Ravie LakshmananEncryption / Privacy Meta Platforms on Monday announced that it has started to expand global testing of…

SaaS Security Posture Management
23
Jan
2023

SaaS Security Posture Management (SSPM) as a Layer in Your Identity Fabric

Jan 23, 2023The Hacker NewsSaaS Security / SSPM Solution The move to SaaS and other cloud tools has put an…

Samsung Galaxy Store App
23
Jan
2023

Samsung Galaxy Store App Found Vulnerable to Sneaky App Installs and Fraud

Jan 23, 2023Ravie LakshmananMobile Hacking / App Security Two security flaws have been disclosed in Samsung’s Galaxy Store app for…

Silver C2 Framework
23
Jan
2023

Threat Actors Turn to Sliver as Open Source Alternative to Popular C2 Frameworks

Jan 23, 2023Ravie LakshmananThreat Detection / Infosec The legitimate command-and-control (C2) framework known as Sliver is gaining more traction from…