Category: TheHackerNews

Why Your CISO Should Worry About Slack
03
Sep
2024

Why Your CISO Should Worry About Slack

In the digital realm, secrets (API keys, private keys, username and password combos, etc.) are the keys to the kingdom….

New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access
03
Sep
2024

New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access

Eight vulnerabilities have been uncovered in Microsoft applications for macOS that an adversary could exploit to gain elevated privileges or…

Bitcoin Extortion Attempt
03
Sep
2024

Ex-Engineer Charged in Missouri for Failed $750,000 Bitcoin Extortion Attempt

Sep 03, 2024Ravie LakshmananInsider Threat / Network Security A 57-year-old man from the U.S. state of Missouri has been arrested…

RansomHub Ransomware Group
02
Sep
2024

RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors

Threat actors linked to the RansomHub ransomware group encrypted and exfiltrated data from at least 210 victims since its inception…

AI-Powered Vulnerability Management
02
Sep
2024

Learn to Boost Cybersecurity with AI-Powered Vulnerability Management

Sep 02, 2024The Hacker NewsVulnerability Management / Webinar The world of cybersecurity is in a constant state of flux. New…

Next-Generation Attacks, Same Targets - How to Protect Your Users' Identities
02
Sep
2024

Next-Generation Attacks, Same Targets – How to Protect Your Users’ Identities

Sep 02, 2024The Hacker NewsCybercrime / CISO Insights The FBI and CISA Issue Joint Advisory on New Threats and How…

Malicious npm Packages Mimicking 'noblox.js' Compromise Roblox Developers' Systems
02
Sep
2024

Malicious npm Packages Mimicking ‘noblox.js’ Compromise Roblox Developers’ Systems

Sep 02, 2024Ravie LakshmananSoftware Security / Malware Roblox developers are the target of a persistent campaign that seeks to compromise…

North Korean Hackers
31
Aug
2024

North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit

Aug 31, 2024Ravie LakshmananRootkit / Threat Intelligence A recently patched security flaw in Google Chrome and other Chromium web browsers…

Atlassian Confluence Vulnerability
30
Aug
2024

Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns

Aug 30, 2024Ravie LakshmananCryptojacking / Vulnerability Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence…

New Malware Masquerades as Palo Alto VPN Targeting Middle East Users
30
Aug
2024

New Malware Masquerades as Palo Alto VPN Targeting Middle East Users

Aug 30, 2024Ravie LakshmananMalware / Network Security Cybersecurity researchers have disclosed a new campaign that potentially targets users in the…

Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign
30
Aug
2024

Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign

Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism. The activity, detected…

AD CS Vulnerabilities
30
Aug
2024

Breaking Down AD CS Vulnerabilities: Insights for InfoSec Professionals

The most dangerous vulnerability you’ve never heard of. In the world of cybersecurity, vulnerabilities are discovered so often, and at…