Category: Hacker News
Cybercriminals Exploit HTTP Headers for Credential...
Cybersecurity researchers have warned of ongoing phishing campaigns that abuse refresh entries in HTTP headers to deliver spoofed ...
Apple Drops Spyware Case Against NSO Group, Citing...
Apple has filed a motion to "voluntarily" dismiss its lawsuit against commercial spyware vendor NSO Group, citing a shifting risk ...
Master Your PCI DSS v4 Compliance with Innovative ...
The PCI DSS landscape is evolving rapidly. With the Q1 2025 deadline looming ever larger, businesses are scrambling to meet the st...
From Breach to Recovery: Designing an Identity-Foc...
Imagine this... You arrive at work to a chaotic scene. Systems are down, panic is in the air. The culprit? Not a rogue virus, but ...
North Korean Hackers Target Cryptocurrency Users o...
Cybersecurity researchers are continuing to warn about North Korean threat actors' attempts to target prospective victims on Linke...
Google Fixes GCP Composer Flaw That Could've Led t...
A now-patched critical security flaw impacting Google Cloud Platform (GCP) Composer could have been exploited to achieve remote co...
Singapore Police Arrest Six Hackers Linked to Glob...
The Singapore Police Force (SPF) has announced the arrest of five Chinese nationals and one Singaporean man for their alleged invo...
DragonRank Black Hat SEO Campaign Targeting IIS Se...
A "simplified Chinese-speaking actor" has been linked to a new campaign that has targeted multiple countries in Asia and Europe wi...
Quad7 Botnet Expands to Target SOHO Routers and VP...
The operators of the mysterious Quad7 botnet are actively evolving by compromising several brands of SOHO routers and VPN applianc...
WordPress Mandates Two-Factor Authentication for P...
WordPress.org has announced a new account security measure that will require accounts with capabilities to update plugins and them...
Ireland's Watchdog Launches Inquiry into Google's ...
The Irish Data Protection Commission (DPC) has announced that it has commenced a "Cross-Border statutory inquiry" into Google's fo...
Iranian Cyber Group OilRig Targets Iraqi Governmen...
Iraqi government networks have emerged as the target of an "elaborate" cyber attack campaign orchestrated by an Iran state-sponsor...
Top 3 Threat Report Insights for Q2 2024
Cato CTRL (Cyber Threats Research Lab) has released its Q2 2024 Cato CTRL SASE Threat Report. The report highlights critical findi...
Exposed Selenium Grid Servers Targeted for Crypto ...
Internet-exposed Selenium Grid instances are being targeted by bad actors for illicit cryptocurrency mining and proxyjacking campa...
Beware: New Vo1d Malware Infects 1.3 Million Andro...
Nearly 1.3 million Android-based TV boxes running outdated versions of the operating system and belonging to users spanning 197 co...
Urgent: GitLab Patches Critical Flaw Allowing Unau...
GitLab on Wednesday released security updates to address 17 security vulnerabilities, including a critical flaw that allows an att...
New Android Malware 'Ajina.Banker' Steals Financia...
Bank customers in the Central Asia region have been targeted by a new strain of Android malware codenamed Ajina.Banker since at le...
New Linux Malware Campaign Exploits Oracle Weblogi...
Cybersecurity researchers have uncovered a new malware campaign targeting Linux environments to conduct illicit cryptocurrency min...
Progress WhatsUp Gold Exploited Just Hours After P...
Malicious actors are likely leveraging publicly available proof-of-concept (PoC) exploits for recently disclosed security flaws in...
Say Goodbye to Phishing: Must-Haves to Eliminate C...
Even as cyber threats become increasingly sophisticated, the number one attack vector for unauthorized access remains phished cred...