News
Entertainment
Science & Technology
Sport
Business & Money
Life
Culture & Art
Hobbies
4 | Follower
The Hacker News
21.11.2024
NHIDR secures non-human identities with real-time detection and automated response, preventing sophisticated breaches
NodeStealer malware targets Facebook Ads accounts, harvesting credit card data and spreading via malvertising
Hackers exploit NFC technology and mobile payments, enabling global fraud through Google Pay and Apple Pay.
Google’s AI tool OSS-Fuzz uncovers 26 vulnerabilities, including a decades-old OpenSSL flaw, boosting open-source security.
Microsoft is launching a new Windows Resiliency Initiative to enhance security and system integrity.
20.11.2024
China-linked "Liminal Panda" exploits telecom vulnerabilities in South Asia and Africa, using advanced malware for espionage since 2020.
Critical Ubuntu needrestart flaws allow local root privilege escalation; update immediately to safeguard systems.
Hackers hijack Jupyter Notebooks to exploit FFmpeg for illegal sports streaming, posing serious risks.
Helldown ransomware targets VMware and Linux systems using Zyxel flaws, disrupting IT, healthcare, and more.
Apple issues security updates for iOS, macOS, and Safari to fix two active zero-day exploits.
Critical flaw CVE-2024-21287 in Oracle Agile PLM allows unauthenticated file leaks; urgent patch advised.
Discover why managing privileged access isn’t enough and learn strategies to secure privileged accounts
Ngioweb malware fuels NSOCKS proxy service, exploiting IoT vulnerabilities for botnet monetization in minutes
19.11.2024
Cut pen testing costs by 60% with automated solutions like vPenTest. Achieve frequent, real-time network security beyond compliance schedules
Ready to outsmart the hackers? Dive into this week’s must-know updates.
79% of IT leaders face secrets leaks with 12.7M credentials exposed on GitHub. Learn solutions now.
Critical flaws in Progress Kemp LoadMaster and VMware vCenter Server are under active exploitation, warns CISA.
New stealthy malware loader BabbleLoader evades antivirus and sandboxes, delivering WhiteSnake and Meduza stealers globally.
New phishing campaign targets Black Friday e-commerce shoppers in Europe and US, stealing personal and financial data via fake brand websites.
T-Mobile targeted in Chinese cyber espionage campaign stealing telecom data; U.S. warns of ongoing threats.
Google launches Shielded Email, enabling unique aliases for sign-ups to boost privacy and reduce spam.
18.11.2024
Critical vulnerability (CVE-2024-10924) in Really Simple Security plugin allows attackers admin access to WordPress sites. Over 4 million affected.
NSO Group exploited WhatsApp to install Pegasus spyware even after Meta sued, controlling operations themselves, not clients, legal documents reveal.
16.11.2024
Vietnam-linked hackers target Europe and Asia with PXA Stealer malware, stealing credentials and Facebook ad data.
Learn how automation, crypto agility, and best practices can tackle certificate revocation risks.
BrazenBamboo exploits an unpatched FortiClient flaw to steal VPN credentials using DEEPDATA malware. Fortinet users advised to stay alert.
Palo Alto Networks confirms active exploitation of a critical zero-day in PAN-OS firewalls; users urged to secure interfaces immediately.
WezRat malware, linked to Iranian hackers, uses phishing and Trojanized Chrome installers to steal data.
AI revolutionizes IAM by enabling real-time monitoring, anomaly detection, and adaptive governance for better security.
Two Vertex AI flaws let attackers escalate privileges and exfiltrate sensitive ML models. Risks now mitigated.
15.11.2024
North Korean Lazarus Group uses extended macOS file attributes to deliver RustyAttr malware to unsuspecting users
Critical PostgreSQL flaw (CVE-2024-10979) patched; update now to prevent code execution and data breaches.
Cybercriminals exploit 'Sitting Ducks' attacks, hijacking thousands of domains for phishing and fraud, Infoblox reports.
Reflectiz identified a TikTok pixel misconfiguration at a travel site, preventing a costly GDPR breach.
Bitfinex hacker Ilya Lichtenstein sentenced for laundering $10.5B in bitcoin from 2016 crypto heist
Google exposes cloaking scams targeting users with fake sites and AI-driven fraud, bolstering defenses with real-time scam detection.
Critical Palo Alto Expedition flaws exploited in attacks; CISA mandates urgent patch by December 5
This article highlights the top five BCDR mistakes businesses make that leave them vulnerable to ransomware attacks. Learn more.
14.11.2024
Russian actors exploit NTLM flaw in attacks on Ukraine, patched by Microsoft this week
Hamas-linked cyber group WIRTE expands attacks on Israeli entities, using wipers and phishing tools.