Category: TheHackerNews

Shadow SaaS
03
May
2024

New Guide Explains How to Eliminate the Risk of Shadow SaaS and Protect Corporate Data

May 03, 2024The Hacker NewsSaaS Security / Browser Security SaaS applications are dominating the corporate landscape. Their increased use enables…

Spoofing Emails
03
May
2024

NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources

May 03, 2024NewsroomEmail Security / Malware The U.S. government on Thursday published a new cybersecurity advisory warning of North Korean…

Google Passkeys
03
May
2024

Google Announces Passkeys Adopted by Over 400 Million Accounts

May 03, 2024NewsroomPasswordless / Encryption Google on Thursday announced that passkeys are being used by over 400 million Google accounts,…

HPE Aruba Devices
03
May
2024

Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks

May 03, 2024NewsroomVulnerability / Software Security HPE Aruba Networking (formerly Aruba Networks) has released security updates to address critical flaws…

Android Security
02
May
2024

Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw

May 02, 2024NewsroomVulnerability / Android Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated…

Ukrainian REvil Hacker
02
May
2024

Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million

May 02, 2024NewsroomRansomware / Cyber Crime A Ukrainian national has been sentenced to more than 13 years in prison and…

Botnet
02
May
2024

New “Goldoon” Botnet Targets D-Link Routers With Decade-Old Flaw

A never-before-seen botnet called Goldoon has been observed targeting D-Link routers with a nearly decade-old critical security flaw with the…

Dropbox Digital Signature
02
May
2024

Dropbox Discloses Breach of Digital Signature Service Affecting All Users

May 02, 2024NewsroomCyber Attack / Data Breach Cloud storage services provider Dropbox on Wednesday disclosed that Dropbox Sign (formerly HelloSign)…

When is One Vulnerability Scanner Not Enough?
02
May
2024

When is One Vulnerability Scanner Not Enough?

Like antivirus software, vulnerability scans rely on a database of known weaknesses. That’s why websites like VirusTotal exist, to give…

GitLab Password Reset Vulnerability
02
May
2024

CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability

May 02, 2024NewsroomVulnerability / Data Breach The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting…

Cuttlefish Malware
02
May
2024

New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials

May 02, 2024NewsroomCyber Espionage / Network Security A new malware called Cuttlefish is targeting small office and home office (SOHO)…

Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds
01
May
2024

Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds

May 01, 2024NewsroomFinancial Crime / Forensic Analysis A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain…