Category: TheHackerNews

Android Malware
01
May
2024

Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers

May 01, 2024NewsroomMalware / Android Cybersecurity researchers have discovered a previously undocumented malware targeting Android devices that uses compromised WordPress…

ZLoader Malware
01
May
2024

ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan

May 01, 2024NewsroomMalware / Cyber Threat The authors behind the resurfaced ZLoader malware have added a feature that was originally…

Cybersecurity Success
01
May
2024

How to Empower Your Employees for Cybersecurity Success

May 01, 2024The Hacker NewsSecurity Awareness Training There’s a natural human desire to avoid threatening scenarios. The irony, of course,…

U.S. Secrets
01
May
2024

Ex-NSA Employee Sentenced to 22 Years for Trying to Sell U.S. Secrets to Russia

May 01, 2024NewsroomNational Security / Insider Threat A former employee of the U.S. National Security Agency (NSA) has been sentenced…

Docker Hub
30
Apr
2024

Millions of Malicious ‘Imageless’ Containers Planted on Docker Hub Over 5 Years

Apr 30, 2024NewsroomDocker Hub / Supply Chain Attack Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub by planting millions…

AI Security
30
Apr
2024

U.S. Government Releases New AI Security Guidelines for Critical Infrastructure

Apr 30, 2024NewsroomMachine Learning / National Security The U.S. government has unveiled new security guidelines aimed at bolstering critical infrastructure…

Default Passwords
30
Apr
2024

New U.K. Law Bans Default Passwords on Smart Devices Starting April 2024

Apr 30, 2024NewsroomIoT Security / Botnet The U.K. National Cyber Security Centre (NCSC) is calling on manufacturers of smart devices…

Malicious Apps in Play Store
29
Apr
2024

Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023

Apr 29, 2024NewsroomMobile Security / Hacking Google on Monday revealed that almost 200,000 app submissions to its Play Store for…

R Programming Vulnerability
29
Apr
2024

New R Programming Vulnerability Exposes Projects to Supply Chain Attacks

Apr 29, 2024NewsroomProgramming / Supply Chain A security vulnerability has been discovered in the R programming language that could be…

Map Internet on Global Scale
29
Apr
2024

China-Linked ‘Muddling Meerkat’ Hijacks DNS to Map Internet on Global Scale

Apr 29, 2024NewsroomDNS Security / Cyber Espionage A previously undocumented cyber threat dubbed Muddling Meerkat has been observed undertaking sophisticated…

Understanding Exposure Management, Pentesting, Red Teaming and RBVM
29
Apr
2024

Understanding Exposure Management, Pentesting, Red Teaming and RBVM

It comes as no surprise that today’s cyber threats are orders of magnitude more complex than those of the past….

Sandbox Escape Vulnerabilities
29
Apr
2024

Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover

Apr 29, 2024NewsroomSandbox / Vulnerability Multiple critical security flaws have been disclosed in the Judge0 open-source online code execution system…