Category: TheHackerNews

Backdoor Attacks
08
Dec
2023

N. Korean Kimsuky Targeting South Korean Research Institutes with Backdoor Attacks

Dec 08, 2023NewsroomCyber Espionage / Cryptocurrency The North Korean threat actor known as Kimsuky has been observed targeting research institutes…

Ransomware-as-a-Service
08
Dec
2023

The Growing Threat You Can’t Ignore

Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various iterations of…

Trojan-Proxy Malware
08
Dec
2023

New Trojan-Proxy Malware Spreading via Pirated Software

Dec 08, 2023NewsroomEndpoint Security / Malware Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple…

WordPress
08
Dec
2023

WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability

Dec 08, 2023NewsroomVulnerability / Website Security WordPress has released version 6.4.2 with a patch for a critical security flaw that…

Bitzlato Cryptocurrency Exchange
08
Dec
2023

Founder of Bitzlato Cryptocurrency Exchange Pleads Guilty in Money-Laundering Scheme

Dec 08, 2023The Hacker NewsCryptocurrency / Cyber Crime The Russian founder of the now-defunct Bitzlato cryptocurrency exchange has pleaded guilty,…

Credential-Stealing Tactics
07
Dec
2023

Microsoft Warns of COLDRIVER’s Evolving Evading and Credential-Stealing Tactics

Dec 07, 2023The Hacker NewsThreat Intelligence / Cyber Espionage The threat actor known as COLDRIVER has continued to engage in…

Push Notifications from Apple and Google
07
Dec
2023

Governments May Spy on You by Requesting Push Notifications from Apple and Google

Dec 07, 2023The Hacker NewsPrivacy / Data Security Unspecified governments have demanded mobile push notification records from Apple and Google…

Hacking the Human Mind
07
Dec
2023

Exploiting Vulnerabilities in the ‘First Line of Cyber Defense’

Humans are complex beings with consciousness, emotions, and the capacity to act based on thoughts. In the ever-evolving realm of…

Bluetooth Flaw
07
Dec
2023

New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices

Dec 07, 2023The Hacker NewsMobile Security / Vulnerability A critical Bluetooth security flaw could be exploited by threat actors to…

Threat Intelligence
07
Dec
2023

Building a Robust Threat Intelligence with Wazuh

Dec 07, 2023The Hacker NewsThreat Intelligence / Network Security Threat intelligence refers to gathering, processing, and analyzing cyber threats, along…

End-to-End Encryption
07
Dec
2023

Meta Launches Default End-to-End Encryption for Chats and Calls on Messenger

Dec 07, 2023The Hacker NewsEncryption / Data Privacy Meta has officially begun to roll out support for end-to-end encryption (E2EE)…

Linux Trojan
07
Dec
2023

New Stealthy ‘Krasue’ Linux Trojan Targeting Telecom Firms in Thailand

Dec 07, 2023The Hacker NewsMalware / Security Breach A previously unknown Linux remote access trojan called Krasue has been observed…