Category: TheHackerNews

Windows Print Spooler Flaw
23
Apr
2024

Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware

Apr 23, 2024NewsroomNational Security Agency / Threat Intelligence The Russia-linked nation-state threat actor tracked as APT28 weaponized a security flaw…

Russian Hacker Group ToddyCat
22
Apr
2024

Russian Hacker Group ToddyCat Uses Advanced Tools for Industrial-Scale Data Theft

Apr 22, 2024NewsroomNetwork Security / Endpoint Security The threat actor known as ToddyCat has been observed using a wide range…

MITRE
22
Apr
2024

MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws

Apr 22, 2024The Hacker NewsNetwork Security / Cybersecurity The MITRE Corporation revealed that it was the target of a nation-state…

Continuous Validation
22
Apr
2024

Pentera’s 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of Continuous Validation

Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have been compromised by…

Rootkit-Like Powers
22
Apr
2024

Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers

Apr 22, 2024NewsroomRootkit / Software Security New research has found that the DOS-to-NT path conversion process could be exploited by…

AI-Fueled Cyber Espionage
22
Apr
2024

North Korean Hackers Turn to AI-Fueled Cyber Espionage

Apr 22, 2024NewsroomCryptocurrency / Artificial Intelligence Microsoft has revealed that North Korea-linked state-sponsored cyber actors has begun to use artificial…

RedLine Stealer Variant
21
Apr
2024

New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth

A new information stealer has been found leveraging Lua bytecode for added stealth and sophistication, findings from McAfee Labs reveal….

CrushFTP Zero-Day Flaw
20
Apr
2024

CrushFTP Zero-Day Flaw Exploited in Targeted Attacks

Apr 20, 2024NewsroomVulnerability / Endpoint Security Users of the CrushFTP enterprise file transfer software are being urged to update to…

PAN-OS Flaw Under Attack
20
Apr
2024

Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack

Apr 20, 2024NewsroomVulnerability / Network Security Palo Alto Networks has shared more details of a critical security flaw impacting PAN-OS…

Deuterbear malware
19
Apr
2024

BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool

Apr 19, 2024NewsroomNetwork Security / Firmware Security Technology, research, and government sectors in the Asia-Pacific region have been targeted by…

Akira Ransomware
19
Apr
2024

Akira Ransomware Gang Extorts $42 Million; Now Targets Linux Servers

Threat actors behind the Akira ransomware group have extorted approximately $42 million in illicit proceeds after breaching the networks of…

How Attackers Can Own a Business Without Touching the Endpoint
19
Apr
2024

How Attackers Can Own a Business Without Touching the Endpoint

Attackers are increasingly making use of “networkless” attack techniques targeting cloud apps and identities. Here’s how attackers can (and are)…