Category: TheHackerNews

Money Laundering
07
May
2024

Russian Operator of BTC-e Crypto Exchange Pleads Guilty to Money Laundering

May 07, 2024NewsroomCryptocurrency / Cybercrime A Russian operator of a now-dismantled BTC-e cryptocurrency exchange has pleaded guilty to money laundering…

Critical Tinyproxy Flaw Opens Over 50,000 Hosts to Remote Code Execution
06
May
2024

Critical Tinyproxy Flaw Opens Over 50,000 Hosts to Remote Code Execution

May 06, 2024NewsroomVulnerability / Server Security More than 50% of the 90,310 hosts have been found exposing a Tinyproxy service…

China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
06
May
2024

China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices

May 06, 2024NewsroomNetwork Security / Malware The recently uncovered cyber espionage campaign targeting perimeter network devices from several vendors, including…

Cyberattacks on SMBs
06
May
2024

It Costs How Much?!? The Financial Pitfalls of Cyberattacks on SMBs

Cybercriminals are vipers. They’re like snakes in the grass, hiding behind their keyboards, waiting to strike. And if you’re a…

Xiaomi Android Devices
06
May
2024

Xiaomi Android Devices Hit by Multiple Flaws Across Apps and System Components

May 06, 2024NewsroomAndroid / Data Security Multiple security vulnerabilities have been disclosed in various applications and system components within Xiaomi…

New 'Cuckoo' Persistent macOS Spyware Targeting Intel and Arm Macs
06
May
2024

New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs

May 06, 2024NewsroomSpyware / Malware Cybersecurity researchers have discovered a new information stealer targeting Apple macOS systems that’s designed to…

Microsoft Outlook Flaw
04
May
2024

Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities

Czechia and Germany on Friday revealed that they were the target of a long-term cyber espionage campaign conducted by the…

Microsoft Graph API
03
May
2024

Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications

May 03, 2024NewsroomCloud Security / Threat Intelligence Threat actors have been increasingly weaponizing Microsoft Graph API for malicious purposes with…

Latest DDoS Tactics
03
May
2024

Expert-Led Webinar – Uncovering Latest DDoS Tactics and Learn How to Fight Back

May 03, 2024The Hacker NewsLive Webinar / Server Security In today’s rapidly evolving digital landscape, the threat of Distributed Denial…

Shadow SaaS
03
May
2024

New Guide Explains How to Eliminate the Risk of Shadow SaaS and Protect Corporate Data

May 03, 2024The Hacker NewsSaaS Security / Browser Security SaaS applications are dominating the corporate landscape. Their increased use enables…

Spoofing Emails
03
May
2024

NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources

May 03, 2024NewsroomEmail Security / Malware The U.S. government on Thursday published a new cybersecurity advisory warning of North Korean…

Google Passkeys
03
May
2024

Google Announces Passkeys Adopted by Over 400 Million Accounts

May 03, 2024NewsroomPasswordless / Encryption Google on Thursday announced that passkeys are being used by over 400 million Google accounts,…