Category: TheHackerNews

DDoS Attacks
01
Dec
2023

Discover How Gcore Thwarted Powerful 1.1Tbps and 1.6Tbps DDoS Attacks

Dec 01, 2023The Hacker NewsNetwork Security / Cyber Attack The most recent Gcore Radar report and its aftermath have highlighted…

North Korean Kimsuky Hackers
01
Dec
2023

U.S. Treasury Sanctions North Korean Kimsuky Hackers and 8 Foreign Agents

Dec 01, 2023NewsroomCyber Espionage / Cryptocurrency The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) on Thursday…

Zyxel
01
Dec
2023

Zyxel Releases Patches to Fix 15 Flaws in NAS, Firewall, and AP Devices

Dec 01, 2023NewsroomFirewall / Network Security Zyxel has released patches to address 15 security issues impacting network-attached storage (NAS), firewall,…

Apple Zero Day
01
Dec
2023

Apple Rolls Out iOS, macOS, and Safari Patches for 2 Actively Exploited Flaws

Dec 01, 2023NewsroomSpyware / Threat Analysis Apple has released software updates for iOS, iPadOS, macOS, and Safari web browser to…

Defense Against Spam and Malicious Emails
30
Nov
2023

Google Unveils RETVec – Gmail’s New Defense Against Spam and Malicious Emails

Nov 30, 2023NewsroomMachine Learning / Email Security Google has revealed a new multilingual text vectorizer called RETVec (short for Resilient…

Risk Management for SaaS
30
Nov
2023

This Free Solution Provides Essential Third-Party Risk Management for SaaS

Wing Security recently announced that basic third-party risk assessment is now available as a free product. But it raises the…

Cryptocurrency Hacks
30
Nov
2023

North Korea’s Lazarus Group Rakes in $3 Billion from Cryptocurrency Hacks

Nov 30, 2023NewsroomCryptocurrency / Cyberattacks Threat actors from the Democratic People’s Republic of Korea (DPRK) are increasingly targeting the cryptocurrency…

CACTUS Ransomware
30
Nov
2023

CACTUS Ransomware Exploits Qlik Sense Vulnerabilities in Targeted Attacks

Nov 30, 2023NewsroomRansomware / Vulnerability A CACTUS ransomware campaign has been observed exploiting recently disclosed security flaws in a cloud…

7 Uses for Generative AI to Enhance Security Operations
30
Nov
2023

7 Uses for Generative AI to Enhance Security Operations

Welcome to a world where Generative AI revolutionizes the field of cybersecurity. Generative AI refers to the use of artificial…

Sinbad Cryptocurrency Mixer
30
Nov
2023

U.S. Treasury Sanctions Sinbad Cryptocurrency Mixer Used by North Korean Hackers

Nov 30, 2023NewsroomHacking / Cryptocurrency The U.S. Treasury Department on Wednesday imposed sanctions against Sinbad, a virtual currency mixer that…

Iranian Hackers Exploit PLCs in Attack on Water Authority in U.S.
29
Nov
2023

Iranian Hackers Exploit PLCs in Attack on Water Authority in U.S.

Nov 29, 2023NewsroomCyber Attack / Hacking The U.S. Cybersecurity and Infrastructure Security Agency (CISA) revealed that it’s responding to a…

Proactive Web Security
29
Nov
2023

Discover Why Proactive Web Security Outsmarts Traditional Antivirus Solutions

In a rapidly evolving digital landscape, it’s crucial to reevaluate how we secure web environments. Traditional antivirus-approach solutions have their…