Embracing the best of both DAST and ASM
11
Feb
2025

Embracing the best of both DAST and ASM

There’s often a lack of understanding when it comes to Dynamic Application Security Testing (DAST) as a methodology versus DAST…

Akira Ransomware Leads The Number of Ransomware Attacks For January 2025
11
Feb
2025

Akira Ransomware Leads The Number of Ransomware Attacks For January 2025

January 2025 marked a significant month in the ransomware landscape, with Akira emerging as the leading threat. According to recent…

Researchers Found North Korean Hackers Advanced Tactics, techniques, and procedures
11
Feb
2025

Researchers Found North Korean Hackers Advanced Tactics, techniques, and procedures

Recent research has highlighted the increasingly sophisticated tactics, techniques, and procedures (TTPs) employed by North Korean state-sponsored hackers. These cyber…

Protecting Your Software Supply Chain
11
Feb
2025

Assessing the Risks Before Deployment

Feb 11, 2025The Hacker NewsSoftware Security / Threat Intelligence Imagine you’re considering a new car for your family. Before making…

USB Army Knife - A Powerful Red Team Tool for Penetration Testers
11
Feb
2025

USB Army Knife – A Powerful Red Team Tool for Penetration Testers

The USB Army Knife is a versatile red-teaming tool for penetration testers that emulates a USB Ethernet adapter for traffic…

Evil Crow RF Tool Transforms Smartphones into Powerful RF Hacking Devices
11
Feb
2025

Evil Crow RF Tool Transforms Smartphones into Powerful RF Hacking Devices

Innovative tools are continually appearing to enhance the capabilities of professionals and enthusiasts alike. One new entrant into the world…

SouthKorea Spy Agency Says DeepSeek Excessively Collects Personal Data
11
Feb
2025

SouthKorea Spy Agency Says DeepSeek Excessively Collects Personal Data

SEOUL, South Korea’s National Intelligence Service (NIS) has raised concerns over the Chinese AI app DeepSeek, accusing it of “excessively”…

FinStealer Malware Targets Leading Indian Bank's Mobile Users, Stealing Login Credentials
11
Feb
2025

FinStealer Malware Targets Leading Indian Bank’s Mobile Users, Stealing Login Credentials

A new cybersecurity threat has emerged, targeting customers of a prominent Indian bank through fraudulent mobile applications. Dubbed “FinStealer,” this…

Police dismantled 8Base ransomware gang
11
Feb
2025

Police dismantled 8Base ransomware gang

Operation Phobos Aetor: Police dismantled 8Base ransomware gang Pierluigi Paganini February 11, 2025 Authorities dismantled the 8Base ransomware gang, shutting…

FinStealer Malware Attacking Leading Indian Bank's Mobile Users To Steal Login Credentials
11
Feb
2025

FinStealer Malware Attacking Leading Indian Bank’s Mobile Users To Steal Login Credentials

A sophisticated malware campaign dubbed “FinStealer” is actively targeting customers of a leading Indian bank through fraudulent mobile applications. The…

Massive Facebook Phishing Attack Targets Hundreds of Companies for Credential Theft
11
Feb
2025

Massive Facebook Phishing Attack Targets Hundreds of Companies for Credential Theft

A newly discovered phishing campaign targeting Facebook users has been identified by researchers at Check Point Software Technologies. The attack,…

Jane Devry
11
Feb
2025

Strengthening Cloud Resilience and Compliance with DORA: A Critical Focus for Financial Institutions

Cloud technology is redefining the financial services industry, serving as the backbone of modern operations by enabling flexibility, scalability, and…