Hackerone logo
24
May
2024

AI Development and System Design [With Real AI Developers]

During our recent webinar, Beyond the Algorithm: AI Developers’ Ask-Me-Anything, four seasoned AI engineers discussed details and questions about applied AI…

Ransomhub Attacking Industrial Control Systems To Encrypt And Exfiltrate Data
24
May
2024

Ransomhub Attacking Industrial Control Systems To Encrypt Data

Ransomhub, a new ransomware group, has targeted the SCADA system of a Spanish bioenergy plant, Matadero de Gijón, which highlights…

Hackers Weaponizing Microsoft Access Documents To Execute Malicious Program
24
May
2024

Hackers Weaponizing Microsoft Access Documents To Execute Malicious Program

In multiple aggressive phishing attempts, the financially motivated organization UAC-0006 heavily targeted Ukraine, utilizing ZIP and RAR attachments to distribute…

A Transformative Landscape in Legal Technology: From the Past to AI-Powered Future
24
May
2024

A Transformative Landscape in Legal Technology: From the Past to AI-Powered Future

By Rob Scott, Chief Innovator – Monjur The modern digital era, ripe with unparalleled technological evolutions, is remolding our perceptions…

2024 Verizon Data Breach Investigation Report (DBIR) Findings
24
May
2024

2024 Verizon Data Breach Investigation Report (DBIR) Findings

24 May 2024 Verizon Data Breach Investigation Report (DBIR) Findings Posted at 08:41h in Blogs by Di Freeze This week…

BLOODALCHEMY Malware
24
May
2024

Japanese Experts Warn of BLOODALCHEMY Malware Targeting Government Agencies

May 24, 2024NewsroomAPT Malware / Cyber Espionage Cybersecurity researchers have discovered that the malware known as BLOODALCHEMY used in attacks…

Hackers Backdoored Courtroom Video Recording Software With System Hijacking Malware
24
May
2024

Hackers Backdoored Courtroom Video Recording Software

A vulnerability (CVE-2024-4978) has been identified in JAVS Viewer v8.3.7, a critical component for managing digital recordings in legal and…

Microsoft Warns Of Storm-0539's Aggressive Gift Card Theft
24
May
2024

Microsoft Warns Of Storm-0539’s Aggressive Gift Card Theft

Gift cards are attractive to hackers since they provide quick monetization for stolen data or compromised systems. Reselling gift cards…

Russian Hackers Shift Tactics, Target More Victims with Paid Malware
24
May
2024

Russian Hackers Shift Tactics, Target More Victims with Paid Malware

Russian hackers and APT groups are escalating cyberattacks, leveraging readily available malware and broadening their targets beyond governments. Flashpoint researchers…

SMB Threat Landscape
24
May
2024

How Do Hackers Blend In So Well? Learn Their Tricks in This Expert Webinar

May 24, 2024The Hacker NewsCybersecurity Webinar Don’t be fooled into thinking that cyber threats are only a problem for large…

CISA Says 4-Year-Old Apache Flink Vulnerability Still Under Active Exploitation
24
May
2024

CISA Says 4-Year-Old Apache Flink Vulnerability Still Under Active Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently added a four-year-old security flaw affecting Apache Flink to its…

Japan To Launch Active Cyber Defense System To Prevent Cyber Attacks
24
May
2024

Japan To Launch Cyber Defense System Prevent Cyber Attacks

Japan is creating a consultative body to implement an active cyber defense system to improve its ability to counter cyberattacks…