Category: TheHackerNews

Latest Multi-Stage Attack Scenarios with Real-World Examples
27
Nov
2024

Latest Multi-Stage Attack Scenarios with Real-World Examples

Multi-stage cyber attacks, characterized by their complex execution chains, are designed to avoid detection and trick victims into a false…

UEFI Linux Bootkit
27
Nov
2024

Researchers Discover “Bootkitty” – First UEFI Bootkit Targeting Linux Kernels

Nov 27, 2024Ravie LakshmananLinux / Malware Cybersecurity researchers have shed light on what has been described as the first Unified…

SpyGlace Backdoor
27
Nov
2024

APT-C-60 Exploits WPS Office Vulnerability to Deploy SpyGlace Backdoor

Nov 27, 2024Ravie LakshmananMalware / Cyber Espionage The threat actor known as APT-C-60 has been linked to a cyber attack…

Cybercrime
27
Nov
2024

1,006 Arrests, 134,089 Malicious Networks Dismantled

Nov 27, 2024Ravie LakshmananCybercrime / Financial Fraud An INTERPOL-led operation has led to the arrest of 1,006 suspects across 19…

Matrix Botnet
27
Nov
2024

Matrix Botnet Exploits IoT Devices in Widespread DDoS Botnet Campaign

Nov 27, 2024Ravie LakshmananIoT Security / Network Security A threat actor named Matrix has been linked to a widespread distributed…

Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks
26
Nov
2024

Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks

Nov 26, 2024Ravie LakshmananVulnerability / Website Security Two critical security flaws impacting the Spam protection, Anti-Spam, and FireWall plugin WordPress…

GHOSTSPIDER Malware
26
Nov
2024

Chinese Hackers Use GHOSTSPIDER Malware to Hack Telecoms Across 12+ Countries

The China-linked threat actor known as Earth Estries has been observed using a previously undocumented backdoor called GHOSTSPIDER as part…

A Free Vulnerability Intelligence Platform For Staying Ahead of the Latest Threats
26
Nov
2024

A Free Vulnerability Intelligence Platform For Staying Ahead of the Latest Threats

Nov 26, 2024The Hacker NewsPentest / Vulnerability Assessment When CVEs go viral, separating critical vulnerabilities from the noise is essential…

Zero-Day Firefox and Windows Flaws
26
Nov
2024

RomCom Exploits Zero-Day Firefox and Windows Flaws in Sophisticated Cyberattacks

Nov 26, 2024Ravie LakshmananVulnerability / Cybercrime The Russia-aligned threat actor known as RomCom has been linked to the zero-day exploitation…

Active Attacks
26
Nov
2024

CISA Urges Agencies to Patch Critical “Array Networks” Flaw Amid Active Attacks

Nov 26, 2024Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a now-patched…

Crypto Keys via Telegram Bot
25
Nov
2024

PyPI Python Library “aiocpa” Found Exfiltrating Crypto Keys via Telegram Bot

Nov 25, 2024Ravie LakshmananSoftware Supply Chain / Malware The administrators of the Python Package Index (PyPI) repository have quarantined the…

Restore Credentials Tool
25
Nov
2024

Google’s New Restore Credentials Tool Simplifies App Login After Android Migration

Nov 25, 2024Ravie LakshmananMobile Security / Privacy Google has introduced a new feature called Restore Credentials to help users restore…