Category: TheHackerNews

Magento Bug
06
Apr
2024

Hackers Exploit Magento Bug to Steal Payment Data from E-commerce Websites

Apr 06, 2024NewsroomSkimmer / Threat Intelligence Threat actors have been found exploiting a critical flaw in Magento to inject a…

AI-as-a-Service Providers
05
Apr
2024

AI-as-a-Service Providers Vulnerable to PrivEsc and Cross-Tenant Attacks

Apr 05, 2024NewsroomArtificial Intelligence / Supply Chain Attack New research has found that artificial intelligence (AI)-as-a-service providers such as Hugging…

CISO Perspectives on Complying with Cybersecurity Regulations
05
Apr
2024

CISO Perspectives on Complying with Cybersecurity Regulations

Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance…

Byakugan Malware
05
Apr
2024

Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware

Apr 05, 2024NewsroomMalware / Endpoint Security Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional…

Ivanti Security Flaws
05
Apr
2024

Researchers Identify Multiple China Hacker Groups Exploiting Ivanti Security Flaws

Apr 05, 2024NewsroomAdvanced Persistent Threat Multiple China-nexus threat actors have been linked to the zero-day exploitation of three security flaws…

JSOutProx Malware
05
Apr
2024

New Wave of JSOutProx Malware Targeting Financial Firms in APAC and MENA

Apr 05, 2024NewsroomCyber Espionage / Cybersecurity Financial organizations in the Asia-Pacific (APAC) and Middle East and North Africa (MENA) are…

Phishing Campaign
04
Apr
2024

New Phishing Campaign Targets Oil & Gas with Evolved Data-Stealing Malware

Apr 04, 2024NewsroomPhishing Attack / Malware An updated version of an information-stealing malware called Rhadamanthys is being used in phishing…

Financial Data
04
Apr
2024

Vietnam-Based Hackers Steal Financial Data Across Asia with Malware

A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and Southeast Asian countries with malware designed…

HTTP/2 Vulnerability
04
Apr
2024

New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks

Apr 04, 2024NewsroomVulnerability / Internet Protocol New research has found that the CONTINUATION frame in the HTTP/2 protocol can be…

Operational Technology
04
Apr
2024

Considerations for Operational Technology Cybersecurity

Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise’s physical devices, processes,…

Ivanti
04
Apr
2024

Ivanti Rushes Patches for 4 New Flaw in Connect Secure and Policy Secure

Apr 04, 2024NewsroomNetwork Security / Vulnerability Ivanti has released security updates to address four security flaws impacting Connect Secure and…

Cookie-Stealing Attacks
03
Apr
2024

Google Chrome Beta Tests New DBSC Protection Against Cookie-Stealing Attacks

Apr 03, 2024NewsroomBrowser Security / Session Hijacking Google on Tuesday said it’s piloting a new feature in Chrome called Device…