Category: TheHackerNews

Hacktivists Exploits WinRAR Vulnerability
03
Sep
2024

Hacktivists Exploits WinRAR Vulnerability in Attacks Against Russia and Belarus

Sep 03, 2024Ravie LakshmananRansomware / Malware A hacktivist group known as Head Mare has been linked to cyber attacks that…

Rocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android Users
03
Sep
2024

Rocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android Users

Mobile users in Brazil are the target of a new malware campaign that delivers a new Android banking trojan named…

Why Your CISO Should Worry About Slack
03
Sep
2024

Why Your CISO Should Worry About Slack

In the digital realm, secrets (API keys, private keys, username and password combos, etc.) are the keys to the kingdom….

New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access
03
Sep
2024

New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access

Eight vulnerabilities have been uncovered in Microsoft applications for macOS that an adversary could exploit to gain elevated privileges or…

Bitcoin Extortion Attempt
03
Sep
2024

Ex-Engineer Charged in Missouri for Failed $750,000 Bitcoin Extortion Attempt

Sep 03, 2024Ravie LakshmananInsider Threat / Network Security A 57-year-old man from the U.S. state of Missouri has been arrested…

RansomHub Ransomware Group
02
Sep
2024

RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors

Threat actors linked to the RansomHub ransomware group encrypted and exfiltrated data from at least 210 victims since its inception…

AI-Powered Vulnerability Management
02
Sep
2024

Learn to Boost Cybersecurity with AI-Powered Vulnerability Management

Sep 02, 2024The Hacker NewsVulnerability Management / Webinar The world of cybersecurity is in a constant state of flux. New…

Next-Generation Attacks, Same Targets - How to Protect Your Users' Identities
02
Sep
2024

Next-Generation Attacks, Same Targets – How to Protect Your Users’ Identities

Sep 02, 2024The Hacker NewsCybercrime / CISO Insights The FBI and CISA Issue Joint Advisory on New Threats and How…

Malicious npm Packages Mimicking 'noblox.js' Compromise Roblox Developers' Systems
02
Sep
2024

Malicious npm Packages Mimicking ‘noblox.js’ Compromise Roblox Developers’ Systems

Sep 02, 2024Ravie LakshmananSoftware Security / Malware Roblox developers are the target of a persistent campaign that seeks to compromise…

North Korean Hackers
31
Aug
2024

North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit

Aug 31, 2024Ravie LakshmananRootkit / Threat Intelligence A recently patched security flaw in Google Chrome and other Chromium web browsers…

Atlassian Confluence Vulnerability
30
Aug
2024

Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns

Aug 30, 2024Ravie LakshmananCryptojacking / Vulnerability Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence…

New Malware Masquerades as Palo Alto VPN Targeting Middle East Users
30
Aug
2024

New Malware Masquerades as Palo Alto VPN Targeting Middle East Users

Aug 30, 2024Ravie LakshmananMalware / Network Security Cybersecurity researchers have disclosed a new campaign that potentially targets users in the…