Category: TheHackerNews

Top 5 Web App Vulnerabilities and How to Find Them
28
Dec
2022

Top 5 Web App Vulnerabilities and How to Find Them

Web applications, often in the form of Software as a Service (SaaS), are now the cornerstone for businesses all over…

Money-Lending Apps
27
Dec
2022

Android Malware Campaign Leverages Money-Lending Apps to Blackmail Victims

A previously undocumented Android malware campaign has been observed leveraging money-lending apps to blackmail victims into paying up with personal…

SPNEGO Extended Negotiation Security Vulnerability
27
Dec
2022

Microsoft Reclassifies SPNEGO Extended Negotiation Security Vulnerability as ‘Critical’

Dec 15, 2022Ravie LakshmananWindows Security / Network Security Microsoft has revised the severity of a security vulnerability it originally patched…

Cyber attack targeting Japanese Political Entities
27
Dec
2022

Researchers Uncover MirrorFace Cyber Attacks Targeting Japanese Political Entities

Dec 15, 2022Ravie LakshmananAdvanced Persistent Threat A Chinese-speaking advanced persistent threat (APT) actor codenamed MirrorFace has been attributed to a…

Veeam Backup and Replication
27
Dec
2022

Veeam Backup and Replication Vulnerabilities Being Exploited in Attacks

Dec 16, 2022Ravie LakshmananBackup & Recovery / Zero-Day The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities…

Cross-Platform DDoS Botnet
27
Dec
2022

Microsoft Warns About Cross-Platform DDoS Botnet

Dec 16, 2022Ravie LakshmananServer Security / Botnet Microsoft on Thursday flagged a cross-platform botnet that’s primarily designed to launch distributed…

SHA-1 Cryptographic Algorithm
27
Dec
2022

NIST Retires 27-Year-Old Widely Used Cryptographic Algorithm

Dec 16, 2022Ravie LakshmananEncryption / Data Security The U.S. National Institute of Standards and Technology (NIST), an agency within the…

GitHub Secret Scanning
27
Dec
2022

GitHub Announces Free Secret Scanning for All Public Repositories

Dec 16, 2022Ravie LakshmananSecure Coding / Code Hosting GitHub on Thursday said it is making available its secret scanning service…

Bypass Windows MotW Protection
27
Dec
2022

BlueNoroff APT Hackers Using New Ways to Bypass Windows MotW Protection

Dec 27, 2022Ravie LakshmananCyber Attack / Windows Security BlueNoroff, a subcluster of the notorious Lazarus Group, has been observed adopting…

server-security
27
Dec
2022

Cyber Security Is Not a Losing Game – If You Start Right Now

Reality has a way of asserting itself, irrespective of any personal or commercial choices we make, good or bad. For…

Twitter
27
Dec
2022

Ex-Twitter employee Gets 3.5 Years Jail for Spying on Behalf of Saudi Arabia

Dec 16, 2022Ravie LakshmananCyber Espionage / Privacy A former Twitter employee who was found guilty of spying on behalf of…

Windows 10 Installer
27
Dec
2022

Trojanized Windows 10 Installer Used in Cyberattacks Against Ukrainian Government Entities

Government entities in Ukraine have been breached as part of a new campaign that leveraged trojanized versions of Windows 10…