Category: Hacker News

RansomHub Becomes 2024’s Top Ransomware Group, Hit...

The threat actors behind the RansomHub ransomware-as-a-service (RaaS) scheme have been observed leveraging now-patched security fl...

PostgreSQL Vulnerability Exploited Alongside Beyon...

Threat actors who were behind the exploitation of a zero-day vulnerability in BeyondTrust Privileged Remote Access (PRA) and Remot...

Hackers Use CAPTCHA Trick on Webflow CDN PDFs to B...

A widespread phishing campaign has been observed leveraging bogus PDF documents hosted on the Webflow content delivery network (CD...

North Korean Hackers Exploit PowerShell Trick to H...

The North Korea-linked threat actor known as Kimsuky has been observed using a new tactic that involves deceiving targets into run...

Microsoft’s Patch Tuesday Fixes 63 Flaws, Includin...

Microsoft on Tuesday released fixes for 63 security flaws impacting its software products, including two vulnerabilities that it s...

Ivanti Patches Critical Flaws in Connect Secure an...

Ivanti has released security updates to address multiple security flaws impacting Connect Secure (ICS), Policy Secure (IPS), and C...

Palo Alto Networks Patches Authentication Bypass E...

Palo Alto Networks has addressed a high-severity security flaw in its PAN-OS software that could result in an authentication bypas...

FINALDRAFT Malware Exploits Microsoft Graph API fo...

Threat hunters have shed light on a new campaign targeting the foreign ministry of an unnamed South American nation with bespoke m...

Microsoft Uncovers Sandworm Subgroup's Global Cybe...

A subgroup within the infamous Russian state-sponsored hacking group known as Sandworm has been attributed to a multi-year initial...

Researchers Find New Exploit Bypassing Patched NVI...

Cybersecurity researchers have discovered a bypass for a now-patched security vulnerability in the NVIDIA Container Toolkit that c...

How to Steer AI Adoption: A CISO Guide

CISOs are finding themselves more involved in AI teams, often leading the cross-functional effort and AI strategy. But there aren’...

Protecting Your Software Supply Chain: Assessing t...

Imagine you're considering a new car for your family. Before making a purchase, you evaluate its safety ratings, fuel efficiency, ...

Threat Actors Exploit ClickFix to Deploy NetSuppor...

Threat actors have observed the increasingly common ClickFix technique to deliver a remote access trojan named NetSupport RAT sinc...

FBI, Europol, and NCA Take Down 8Base Ransomware D...

Source: The Nation A coordinated law enforcement operation has taken down the dark web data leak and negotiation sites associated ...

Hackers Exploit Google Tag Manager to Deploy Credi...

Threat actors have been observed leveraging Google Tag Manager (GTM) to deliver credit card skimmer malware targeting Magento-base...

⚡ THN Weekly Recap: Top Cybersecurity Threats, Too...

In cybersecurity, the smallest crack can lead to the biggest breaches. A leaked encryption key, an unpatched software bug, or an a...

Google Confirms Android SafetyCore Enables AI-Powe...

Google has stepped in to clarify that a newly introduced Android System SafetyCore app does not perform any client-side scanning o...

4 Ways to Keep MFA From Becoming too Much of a Goo...

Multi-factor authentication (MFA) has quickly become the standard for securing business accounts. Once a niche security measure, a...

Progress Software Patches High-Severity LoadMaster...

Progress Software has addressed multiple high-severity security flaws in its LoadMaster software that could be exploited by malici...

Gcore DDoS Radar Reveals 56% YoY Increase in DDoS ...

Gcore’s latest DDoS Radar report analyzes attack data from Q3–Q4 2024, revealing a 56% YoY rise in the total number of DDoS attack...