Category: TheHackerNews

17
Aug
2023

China-Linked Bronze Starlight Group Targeting Gambling Sector with Cobalt Strike Beacons

Aug 17, 2023THNCyber Attack / Malware An ongoing cyber attack campaign originating from China is targeting the Southeast Asian gambling…

Apple Airplane Mode
17
Aug
2023

New Apple iOS 16 Exploit Enables Stealthy Cellular Access Under Fake Airplane Mode

Aug 17, 2023THNMobile Security / Vulnerability Cybersecurity researchers have documented a novel post-exploit persistence technique on iOS 16 that could…

Cryptojacking and Proxyjacking
17
Aug
2023

New LABRAT Campaign Exploits GitLab Flaw for Cryptojacking and Proxyjacking Activities

Aug 17, 2023THNCryptojacking / Proxyjacking A new, financially motivated operation dubbed LABRAT has been observed weaponizing a now-patched critical flaw…

Network Monitoring
17
Aug
2023

Why You Need Continuous Network Monitoring?

Changes in the way we work have had significant implications for cybersecurity, not least in network monitoring. Workers no longer…

Russian Hackers
17
Aug
2023

Russian Hackers Use Zulip Chat App for Covert C&C in Diplomatic Phishing Attacks

Aug 17, 2023THNCyber Espionage / Malware An ongoing campaign targeting ministries of foreign affairs of NATO-aligned countries points to the…

Citrix ShareFile Flaw
17
Aug
2023

CISA Adds Citrix ShareFile Flaw to KEV Catalog Due to In-the-Wild Attacks

Aug 17, 2023THNVulnerability / Enterprise Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw…

Quantum-Resilient FIDO2 Security Key
16
Aug
2023

Google Introduces First Quantum Resilient FIDO2 Security Key

Aug 16, 2023THNPassword Security / Encryption Google on Tuesday announced the first quantum resilient FIDO2 security key implementation as part…

Browser Security
16
Aug
2023

How Google Workspace-based Organizations can leverage Chrome to improve Security

Aug 16, 2023The Hacker NewsBrowser Security/ Online Security More and more organizations are choosing Google Workspace as their default employee…

Supply Chain Attacks
16
Aug
2023

Experts Uncover Weaknesses in PowerShell Gallery Enabling Supply Chain Attacks

Aug 16, 2023THNWindows Security / Supply Chain Active flaws in the PowerShell Gallery could be weaponized by threat actors to…

Specops Password Policy
16
Aug
2023

What’s the State of Credential theft in 2023?

Aug 16, 2023The Hacker News At a little overt halfway through 2023, credential theft is still a major thorn in…

Ivanti Avalanche
16
Aug
2023

Critical Security Flaws Affect Ivanti Avalanche, Threatening 30,000 Organizations

Aug 16, 2023THNSoftware Security / Cyber Threat Multiple critical security flaws have been reported in Ivanti Avalanche, an enterprise mobile…

Citrix NetScaler Vulnerability
16
Aug
2023

Nearly 2,000 Citrix NetScaler Instances Hacked via Critical Vulnerability

Aug 16, 2023THNVulnerability / Enterprise Security Nearly 2,000 Citrix NetScaler instances have been compromised with a backdoor by weaponizing a…