Category: TheHackerNews

Wiper Malware
20
May
2024

Iranian MOIS-Linked Hackers Behind Destructive Attacks on Albania and Israel

May 20, 2024NewsroomCyber Attack / Threat Intelligence An Iranian threat actor affiliated with the Ministry of Intelligence and Security (MOIS)…

GitGuardian SCA And Git Hooks
20
May
2024

Defending Your Commits From Known CVEs With GitGuardian SCA And Git Hooks

May 20, 2024The Hacker NewsSoftware Security / Vulnerability All developers want to create secure and dependable software. They should feel…

Foxit PDF Reader
20
May
2024

Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal

Multiple threat actors are weaponizing a design flaw in Foxit PDF Reader to deliver a variety of malware such as…

Cocktail Malware
20
May
2024

Cyber Criminals Exploit GitHub and FileZilla to Deliver Cocktail Malware

May 20, 2024NewsroomMalvertising / Cryptocurrency A “multi-faceted campaign” has been observed abusing legitimate services like GitHub and FileZilla to deliver…

Latrodectus Malware
20
May
2024

Latrodectus Malware Loader Emerges as IcedID’s Successor in Phishing Campaigns

May 20, 2024NewsroomCyber Attack / Malware Cybersecurity researchers have observed a spike in email phishing campaigns starting early March 2024…

Pig Butchering Crypto Scam
19
May
2024

Chinese Nationals Arrested for Laundering $73 Million in Pig Butchering Crypto Scam

The U.S. Department of Justice (DoJ) has charged two arrested Chinese nationals for allegedly orchestrating a pig butchering scam that…

Grandoreiro Banking Trojan
19
May
2024

Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500 Banks Worldwide

May 19, 2024NewsroomBanking Troja / Email Security The threat actors behind the Windows-based Grandoreiro banking trojan have returned in a…

Cryptojacking
17
May
2024

Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking

May 17, 2024NewsroomCryptojacking / Malware The cryptojacking group known as Kinsing has demonstrated its ability to continuously evolve and adapt,…

Deuterbear RAT
17
May
2024

China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT

Cybersecurity researchers have shed more light on a remote access trojan (RAT) known as Deuterbear used by the China-linked BlackTech…

80% of Exposures from Misconfigurations, Less Than 1% from CVEs
17
May
2024

80% of Exposures from Misconfigurations, Less Than 1% from CVEs

A new report from XM Cyber has found – among other insights – a dramatic gap between where most organizations…

Linux Backdoor
17
May
2024

Kimsuky APT Deploying Linux Backdoor Gomir in South Korean Cyber Attacks

May 17, 2024NewsroomLinux / Malware The Kimsuky (aka Springtail) advanced persistent threat (APT) group, which is linked to North Korea’s…

D-Link Router Vulnerabilities
17
May
2024

CISA Warns of Actively Exploited D-Link Router Vulnerabilities

May 17, 2024NewsroomVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws…