Category: TheHackerNews

Chinese Cyber Espionage
23
May
2024

Chinese Espionage Group Targets Africa & Caribbean Govts

May 23, 2024NewsroomCyber Espionage / Network Security The China-linked threat actor known as Sharp Panda has expanded their targeting to…

SaaS Backup
23
May
2024

Are Your SaaS Backups as Secure as Your Production Data?

Conversations about data security tend to diverge into three main threads: How can we protect the data we store on…

Chinese APT Group
23
May
2024

Chinese APT Group’s Stealthy Tactics Exposed

May 23, 2024NewsroomCyber Espionage / Network Security Governmental entities in the Middle East, Africa, and Asia are the target of…

Remote Code Execution
23
May
2024

Ivanti Patches Critical Remote Code Execution Flaws in Endpoint Manager

May 23, 2024NewsroomEndpoint Security / Vulnerability Ivanti on Tuesday rolled out fixes to address multiple critical security flaws in Endpoint…

Wazuh FIM Capability
23
May
2024

Achieve security compliance with Wazuh File Integrity Monitoring

File Integrity Monitoring (FIM) is an IT security control that monitors and detects file changes in computer systems. It helps…

VBScript
23
May
2024

Microsoft Phases Out VBScript for JavaScript and PowerShell

May 23, 2024NewsroomEndpoint Security / Data Privacy Microsoft on Wednesday outlined its plans to deprecate Visual Basic Script (VBScript) in…

Chinese
22
May
2024

Researchers Warn of Chinese-Aligned Hackers Targeting South China Sea Countries

Cybersecurity researchers have disclosed details of a previously undocumented threat group called Unfading Sea Haze that’s believed to have been…

ICS Devices
22
May
2024

Rockwell Advises Disconnecting Internet-Facing ICS Devices Amid Cyber Threats

May 22, 2024NewsroomICS Security / Vulnerability Rockwell Automation is urging its customers to disconnect all industrial control systems (ICSs) not…

SaaS Security Posture Management
22
May
2024

The Ultimate SaaS Security Posture Management Checklist, 2025 Edition

Since the first edition of The Ultimate SaaS Security Posture Management (SSPM) Checklist was released three years ago, the corporate…

Cryptojacking Campaign
22
May
2024

GHOSTENGINE Exploits Vulnerable Drivers to Disable EDRs in Cryptojacking Attack

Cybersecurity researchers have discovered a new cryptojacking campaign that employs vulnerable drivers to disable known security solutions (EDRs) and thwart…

MS Exchange Server Flaws
22
May
2024

MS Exchange Server Flaws Exploited to Deploy Keylogger in Targeted Attacks

May 22, 2024NewsroomVulnerability / Data Breach An unknown threat actor is exploiting known security flaws in Microsoft Exchange Server to…

End-to-End Encryption
22
May
2024

Zoom Adopts NIST-Approved Post-Quantum End-to-End Encryption for Meetings

May 22, 2024NewsroomEncryption / Quantum Computing Popular enterprise services provider Zoom has announced the rollout of post-quantum end-to-end encryption (E2EE)…