Category: TheHackerNews

Zero-Day Attack
22
Oct
2024

CISA Adds ScienceLogic SL1 Vulnerability to Exploited Catalog After Active Zero-Day Attack

Oct 22, 2024Ravie LakshmananVulnerability / Cyber Threat The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical…

Hackers Target Gambling Sector
21
Oct
2024

Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain

The prolific Chinese nation-state actor known as APT41 (aka Brass Typhoon, Earth Baku, Wicked Panda, or Winnti) has been attributed…

Pentest Checklist
21
Oct
2024

Guide:  The Ultimate Pentest Checklist for Full-Stack Security

Oct 21, 2024The Hacker NewsPenetration Testing / API Security Pentest Checklists Are More Important Than Ever Given the expanding attack…

Major E2EE Cloud Storage Providers
21
Oct
2024

Researchers Discover Severe Security Flaws in Major E2EE Cloud Storage Providers

Oct 21, 2024Ravie LakshmananEncryption / Data Protection Cybersecurity researchers have discovered severe cryptographic issues in various end-to-end encrypted (E2EE) cloud…

Roundcube Webmail XSS Vulnerability
20
Oct
2024

Hackers Exploit Roundcube Webmail XSS Vulnerability to Steal Login Credentials

Oct 20, 2024Ravie LakshmananVulnerability / Email Security Unknown threat actors have been observed attempting to exploit a now-patched security flaw…

Acronym Overdose
19
Oct
2024

Acronym Overdose – Navigating the Complex Data Security Landscape

In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM, and many others….

Ransomware Attacks
19
Oct
2024

Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks

Oct 19, 2024Ravie LakshmananNetwork Security / Data Breach A nascent threat actor known as Crypt Ghouls has been linked to…

North Korean IT Workers
18
Oct
2024

North Korean IT Workers in Western Firms Now Demanding Ransom for Stolen Data

Oct 18, 2024Ravie LakshmananInsider Threat / Cyber Espionage North Korean information technology (IT) workers who obtain employment under false identities…

U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign
18
Oct
2024

U.S. and Allies Warn of Iranian Cyberattacks on Critical Infrastructure in Year-Long Campaign

Oct 18, 2024Ravie LakshmananCyber Intelligence / Critical Infrastructure Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned…

Data Security Posture
18
Oct
2024

Webinar on Building a Strong Data Security Posture

Oct 18, 2024The Hacker NewsWebinar / Data Protection Picture your company’s data as a vast, complex jigsaw puzzle—scattered across clouds,…

Fake Google Meet
18
Oct
2024

Fake Google Meet Pages Deliver Infostealers in Ongoing ClickFix Campaign

Oct 18, 2024Ravie LakshmananThreat Intelligence / Phishing Attack Threat actors are leveraging fake Google Meet web pages as part of…

macOS Vulnerability
18
Oct
2024

Microsoft Reveals macOS Vulnerability that Bypasses Privacy Controls in Safari Browser

Oct 18, 2024Ravie LakshmananThreat Intelligence / Browser Security Microsoft has disclosed details about a now-patched security flaw in Apple’s Transparency,…