Category: TheHackerNews

Credential Stuffing Attacks
28
Apr
2024

Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks

Apr 28, 2024NewsroomCredential Stuffing / Data Breach Identity and access management (IAM) services provider Okta has warned of a spike…

Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
27
Apr
2024

Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw

Apr 27, 2024NewsroomCyber Attack / Malware Cybersecurity researchers have discovered a targeted operation against Ukraine that has been found leveraging…

Bogus npm Packages
27
Apr
2024

Bogus npm Packages Used to Trick Software Developers into Installing Malware

Apr 27, 2024NewsroomMalware / Software Security An ongoing social engineering campaign is targeting software developers with bogus npm packages under…

SANnav SAN Management Software
26
Apr
2024

Severe Flaws Disclosed in Brocade SANnav SAN Management Software

Apr 26, 2024NewsroomSupply Chain Attack / Software Security Several security vulnerabilities disclosed in Brocade SANnav storage area network (SAN) management…

Palo Alto Networks
26
Apr
2024

Palo Alto Networks Outlines Remediation for Critical PAN-OS Flaw Under Attack

Apr 26, 2024NewsroomNetwork Security / Zero Day Palo Alto Networks has shared remediation guidance for a recently disclosed critical security…

Android Malware
26
Apr
2024

New ‘Brokewell’ Android Malware Spread Through Fake Browser Updates

Apr 26, 2024NewsroomMobile Security / Cybercrime Fake browser updates are being used to push a previously undocumented Android malware called…

Endpoint Security Tips
26
Apr
2024

10 Critical Endpoint Security Tips You Should Know

In today’s digital world, where connectivity is rules all, endpoints serve as the gateway to a business’s digital kingdom. And…

WP-Automatic Plugin Bug
26
Apr
2024

Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites

Apr 26, 2024NewsroomThreat Intelligence / Cyber Attack Threat actors are attempting to actively exploit a critical security flaw in the…

Fake Job Lures
25
Apr
2024

North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures

Apr 25, 2024NewsroomMalware / Cyber Threat The North Korea-linked threat actor known as Lazarus Group employed its time-tested fabricated job…

Network Attack
25
Apr
2024

Network Threats: A Step-by-Step Attack Demonstration

Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how attackers remain undetected…

Crypto Mixer Samourai
25
Apr
2024

DOJ Arrests Founders of Crypto Mixer Samourai for $2 Billion in Illegal Transactions

Apr 25, 2024NewsroomCryptocurrency / Cybercrime The U.S. Department of Justice (DoJ) on Wednesday announced the arrest of two co-founders of…

Cisco Zero-Day Vulnerabilities
25
Apr
2024

State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage

Apr 25, 2024NewsroomVulnerability / Zero-Day A new malware campaign leveraged two zero-day flaws in Cisco networking gear to deliver custom…