Category: TheHackerNews

Malicious Apps
01
Apr
2024

Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals

Apr 01, 2024NewsroomBotnet / Mobile Security Several malicious Android apps that turn mobile devices running the operating system into residential…

Android Banking Trojan
01
Apr
2024

Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities

The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection…

macOS Malware
30
Mar
2024

Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware

Mar 30, 2024NewsroomMalware / Cryptocurrency Malicious ads and bogus websites are acting as a conduit to deliver two different stealer…

Linux Backdoor
30
Mar
2024

Secret Backdoor Found in XZ Utils Library, Impacts Major Linux Distros

Mar 30, 2024NewsroomLinux / Supply Chain Attack RedHat on Friday released an “urgent security alert” warning that two versions of…

Linux Hacking
29
Mar
2024

New Linux Bug Could Lead to User Password Leaks and Clipboard Hijacking

Mar 29, 2024NewsroomVulnerability / Linux Details have emerged about a vulnerability impacting the “wall” command of the util-linux package that…

Dormakaba Locks Used in Millions of Hotel Rooms Could Be Cracked in Seconds
29
Mar
2024

Dormakaba Locks Used in Millions of Hotel Rooms Could Be Cracked in Seconds

Mar 29, 2024NewsroomReverse Engineering / RFID Security Security vulnerabilities discovered in Dormakaba’s Saflok electronic RFID locks used in hotels could…

TheMoon Botnet
29
Mar
2024

TheMoon Botnet Resurfaces, Exploiting EoL Devices to Power Criminal Proxy

Mar 29, 2024NewsroomNetwork Security / IoT Security A botnet previously considered to be rendered inert has been observed enslaving end-of-life…

Automated Penetration Testing
29
Mar
2024

The Golden Age of Automated Penetration Testing is Here

Mar 29, 2024The Hacker NewsPen Testing / Regulatory Compliance Network penetration testing plays a vital role in detecting vulnerabilities that…

Malicious Package
29
Mar
2024

PyPI Halts Sign-Ups Amid Surge of Malicious Package Uploads Targeting Developers

Mar 29, 2024NewsroomSupply Chain Attack / Threat Intelligence The maintainers of the Python Package Index (PyPI) repository briefly suspended new…

Linux Version of DinodasRAT
28
Mar
2024

Linux Version of DinodasRAT Spotted in Cyber Attacks Across Several Countries

Mar 28, 2024NewsroomLinux / Network Security A Linux version of a multi-platform backdoor called DinodasRAT has been detected in the…

Chinese Hacking Group
28
Mar
2024

Finland Blames Chinese Hacking Group APT31 for Parliament Cyber Attack

Mar 28, 2024NewsroomCyber Espionage / Malware The Police of Finland (aka Poliisi) has formally accused a Chinese nation-state actor tracked…

Darcula Phishing Network
28
Mar
2024

Darcula Phishing Network Leveraging RCS and iMessage to Evade Detection

A sophisticated phishing-as-a-service (PhaaS) platform called Darcula has set its sights on organizations in over 100 countries by leveraging a…