Category: TheHackerNews

Wazuh: Open Source XDR and SIEM
07
Aug
2023

Open Source XDR and SIEM

Aug 07, 2023The Hacker NewsSIEM and XDR Platform In today’s interconnected world, evolving security solutions to meet growing demand is…

07
Aug
2023

Crypto Scammers are Masquerading as NFT Developers

Aug 07, 2023THNCyber Crime / Cryptocurrency The U.S. Federal Bureau of Investigation (FBI) is warning about cyber crooks masquerading as…

Reptile Rootkit
05
Aug
2023

Advanced Linux Malware Targeting South Korean Systems

Aug 05, 2023THNLinux / Malware Threat actors are using an open-source rootkit called Reptile to target Linux systems in South…

Empowering Organizations with Enhanced Security
05
Aug
2023

Empowering Organizations with Enhanced Security

Aug 05, 2023The Hacker NewsManaged Detection and Response Managed Detection and Response (MDR) has emerged as a crucial solution for…

Power Platform
05
Aug
2023

Microsoft Addresses Critical Power Platform Flaw After Delays and Criticism

Aug 05, 2023THNVulnerability / Cyber Threat Microsoft on Friday disclosed that it has addressed a critical security flaw impacting Power…

05
Aug
2023

Researchers Uncover New High-Severity Vulnerability in PaperCut Software

Aug 05, 2023THNVulnerability / Software Security Cybersecurity researchers have discovered a new high-severity security flaw in PaperCut print management software…

Bitfinex Hack
04
Aug
2023

NYC Couple Pleads Guilty to Money Laundering in $3.6 Billion Bitfinex Hack

Aug 04, 2023THNCryptocurrency / Cyber Crime A married couple from New York City has pleaded guilty to money laundering charges…

PAM Challenges
04
Aug
2023

Making PAM Great Again: Solving the Top 5 Identity Team PAM Challenges

Aug 04, 2023The Hacker News Privileged Access Management (PAM) solutions are widely acknowledged as the gold standard for securing critical…

Malicious npm
04
Aug
2023

Malicious npm Packages Found Exfiltrating Sensitive Data from Developers

Cybersecurity researchers have discovered a new bunch of malicious packages on the npm package registry that are designed to exfiltrate…

Most Exploited Vulnerabilities
04
Aug
2023

Major Cybersecurity Agencies Collaborate to Unveil 2022’s Most Exploited Vulnerabilities

Aug 04, 2023THNSoftware Security / Cyber Theat A four-year-old critical security flaw impacting Fortinet FortiOS SSL has emerged as one…

Google Play Store Scanners
03
Aug
2023

Malicious Apps Use Sneaky Versioning Technique to Bypass Google Play Store Scanners

Aug 03, 2023THNMobile Security / Malware Threat actors are leveraging a technique called versioning to evade Google Play Store’s malware…

Citrix NetScaler ADC and Gateway Servers
03
Aug
2023

Hundreds of Citrix NetScaler ADC and Gateway Servers Hacked in Major Cyber Attack

Aug 03, 2023THNVulnerability / Cyber Threat Hundreds of Citrix NetScaler ADC and Gateway servers have been breached by malicious actors…