Category: TheHackerNews

Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign
18
Feb
2025

Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign

Feb 18, 2025Ravie LakshmananMalware / Network Security The China-linked threat actor known as Winnti has been attributed to a new…

Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication
18
Feb
2025

Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication

Feb 18, 2025Ravie LakshmananVulnerability / Network Security Juniper Networks has released security updates to address a critical security flaw impacting…

Debunking the AI Hype: Inside Real Hacker Tactics
18
Feb
2025

Debunking the AI Hype: Inside Real Hacker Tactics

Feb 18, 2025The Hacker NewsArtificial Intelligence / Cyber Defense Is AI really reshaping the cyber threat landscape, or is the…

Windows Active Directory Credentials
18
Feb
2025

New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials

Feb 18, 2025Ravie LakshmananVulnerability / Enterprise Security Security vulnerabilities have been disclosed in Xerox VersaLink C7025 Multifunction printers (MFPs) that…

Deploy Payment Skimmers
18
Feb
2025

Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers

Feb 18, 2025Ravie LakshmananMalware / Website Hacking Cybersecurity researchers have flagged a credit card stealing malware campaign that has been…

XCSSET macOS Malware
17
Feb
2025

Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics

Feb 17, 2025Ravie LakshmananEndpoint Security / Malware Microsoft said it has discovered a new variant of a known Apple macOS…

DeepSeek AI
17
Feb
2025

South Korea Suspends DeepSeek AI Downloads Over Privacy Violations

Feb 17, 2025Ravie LakshmananArtificial Intelligence / Data Protection South Korea has formally suspended new downloads of Chinese artificial intelligence (AI)…

CISO's Expert Guide To CTEM And Why It Matters
17
Feb
2025

CISO’s Expert Guide To CTEM And Why It Matters

Feb 17, 2025The Hacker NewsEnterprise Security / Attack Simulation Cyber threats evolve—has your defense strategy kept up? A new free…

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations
17
Feb
2025

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations

Feb 17, 2025Ravie LakshmananThreat Intelligence / Cyber Attack Cybersecurity researchers have shed light on a new Golang-based backdoor that uses…

Android's New Feature Blocks Fraudsters from Sideloading Apps During Calls
15
Feb
2025

Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls

Feb 15, 2025Ravie LakshmananMobile Security / Technology Google is working on a new security feature for Android that blocks device…

New "whoAMI" Attack Exploits AWS AMI Name Confusion for Remote Code Execution
14
Feb
2025

New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

Feb 14, 2025Ravie LakshmananVulnerability / DevOps Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that…

JavaScript Implant
14
Feb
2025

Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks

Feb 14, 2025Ravie LakshmananBrowser Security / Cryptocurrency The North Korean threat actor known as the Lazarus Group has been linked…