News
Entertainment
Science & Technology
Sport
Business & Money
Life
Culture & Art
Hobbies
4 | Follower
The Hacker News
29.04.2024
Okta is sounding the alarm on an unprecedented spike in credential stuffing attacks targeting online services.
28.04.2024
Cybersecurity researchers have uncovered a targeted cyber attack against Ukraine that leveraged a 7-year-old Microsoft Office flaw to deploy Cobalt St
27.04.2024
A new Android malware called Brokewell is disguising itself as updates for popular apps like Google Chrome and Klarna
Unlock Endpoint Security with our top 10 must-know tips! From MFA to EDR, discover how to protect your digital kingdom.
A critical vulnerability (CVE-2024-3400) in PAN-OS could expose your systems to remote code execution attacks.
Hackers are disguising Python backdoors as legitimate npm packages to target developers during fake job interviews.
Multiple critical vulnerabilities discovered in Brocade SANnav SAN management application, impacting all versions up to 2.3.0.
26.04.2024
The U.S. DOJ has made a significant move by arresting the founders of Samourai, a crypto mixer, for laundering over $100M
A critical vulnerability (CVE-2024-27956) in the WP-Automatic plugin is being actively exploited. This flaw could allow attackers to take complete con
This article takes you through a real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration.
North Korean hackers used fake job offers to deliver a new Trojan called Kaolin RAT. It can change file timestamps and load malware.
25.04.2024
A new stealthy malware campaign leveraging two zero-day flaws in Cisco networking gear has been uncovered, allowing covert data collection and reconna
A sophisticated attack campaign dubbed "FROZEN#SHADOW" is underway, using phishing emails to infect systems with the stealthy malware SSLoad.
Google hits the brakes on phasing out third-party cookies in Chrome until 2024.
U.S. Treasury Department has sanctioned two Iranian firms and four individuals for their involvement in malicious cyber activities targeting U.S.
24.04.2024
Join industry experts Rhys Arkins and Jeffrey Martin for an exclusive webinar on combating supply chain threats.
Businesses face massive disruptions from cyberattacks. From revenue losses to strained customer relations. Discover the hidden costs of cyber breaches
Major security flaws uncovered in popular Chinese keyboard apps! Researchers found vulnerabilities that could expose users' private keystrokes.
European police warn that default E2EE could severely hamper efforts to tackle online crimes like child abuse and terrorism.
A sophisticated malware called GuptiMiner has been leveraging a flaw in eScan antivirus updates to spread backdoors and crypto miners across corporate
Researchers discovered a "dependency confusion" vulnerability in an archived Apache project, Cordova App Harness.
A suspected Vietnamese hacking group is leveraging CDN cache to distribute malware undetected.
German authorities issued arrest warrants against three citizens on suspicion of spying for China.
23.04.2024
Kaspersky has uncovered a concerning threat actor, ToddyCat, targeting government and military entities.
Hackers linked to Russia have been exploiting a Windows bug for YEARS to deploy GooseEgg malware for escalating attack access.
MITRE, a top cybersecurity firm, breached by a nation-state. Zero-days and session hijacking were the weapons.
With enterprises using 53 different security solutions, why are breaches still a frequent reality? Unpack the paradox in our latest report.
Major cybercrime groups are under attack by police. But are these takedowns effective? Some groups vanish, others bounce back in DAYS.
The U.S. is cracking down on individuals involved in the development and sale of commercial spyware.
Researchers detail a flaw in the Windows DOS-to-NT path conversion process which can be exploited by threat actors to gain rootkit like powers.
22.04.2024
North Korea's state-linked hackers are enhancing their operations with advanced artificial intelligence tools.
21.04.2024
A new variant of the RedLine Stealer malware has been discovered, utilizing Lua bytecode for stealth and effectiveness.
20.04.2024
If you use CrushFTP for file transfers, update to the latest version immediately.
A critical vulnerability (CVE-2024-3400) in Palo Alto Networks PAN-OS is being actively exploited by threat actors.
Akira Ransomware group has already extorted roughly $42 million from over 250 victims globally. They are now targeting both Windows and Linux systems.
How attackers are hacking organizations without touching the endpoint by targeting cloud identities.
China-linked hacking group Earth Hundun is targeting Asia-Pacific tech, research, and government sectors with advanced malware, including "Waterbear"
19.04.2024
New Android malware "SoumniBot" targets users in South Korea by exploiting unique evasion tactics. Find out how it slips through security cracks.
A new threat, 'DuneQuixote', targets Middle East governments with sophisticated evasion tactics.
Keep your organization out of the ransomware news headlines and your applications protected with this simple, effective solution from Zerto.