Category: Hacker News
Python-Based Bots Exploiting PHP Servers Fuel Gamb...
Cybersecurity researchers have exposed a new campaign that targets web servers running PHP-based applications to promote gambling ...
How to Bring Zero Trust to Wi-Fi Security with a C...
Recent data breaches have highlighted the critical need to improve guest Wi-Fi infrastructure security in modern business environm...
U.S. Sanctions North Korean IT Worker Network Supp...
The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned two individuals and four entities for their alle...
New 'Sneaky 2FA' Phishing Kit Targets Microsoft 36...
Cybersecurity researchers have detailed a new adversary-in-the-middle (AitM) phishing kit that's capable of Microsoft 365 accounts...
European Privacy Group Sues TikTok and AliExpress ...
Austrian privacy non-profit None of Your Business (noyb) has filed complaints accusing companies like TikTok, AliExpress, SHEIN, T...
Russian Star Blizzard Targets WhatsApp Accounts in...
The Russian threat actor known as Star Blizzard has been linked to a new spear-phishing campaign that targets victims' WhatsApp ac...
Ready to Simplify Trust Management? Join Free Webi...
The digital world is exploding. IoT devices are multiplying like rabbits, certificates are piling up faster than you can count, an...
The $10 Cyber Threat Responsible for the Biggest B...
You can tell the story of the current state of stolen credential-based attacks in three numbers: Stolen credentials were the #1 a...
New UEFI Secure Boot Vulnerability Could Allow Att...
Details have emerged about a now-patched security vulnerability that could allow a bypass of the Secure Boot mechanism in Unified ...
Researchers Find Exploit Allowing NTLMv1 Despite A...
Cybersecurity researchers have found that the Microsoft Active Directory Group Policy that's designed to disable NT LAN Manager (N...
Hackers Hide Malware in Images to Deploy VIP Keylo...
Threat actors have been observed concealing malicious code in images to deliver malware such as VIP Keylogger and 0bj3ctivity Stea...
Python-Based Malware Powers RansomHub Ransomware t...
Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a Python-based backdoor to maintain persi...
Researcher Uncovers Critical Flaws in Multiple Ver...
Ivanti has rolled out security updates to address several security flaws impacting Avalanche, Application Control Engine, and Endp...
Google Ads Users Targeted in Malvertising Scam Ste...
Cybersecurity researchers have alerted to a new malvertising campaign that's targeting individuals and businesses advertising via ...
Lazarus Group Targets Web3 Developers with Fake Li...
The North Korea-linked Lazarus Group has been attributed to a new cyber attack campaign dubbed Operation 99 that targeted software...
North Korean IT Worker Fraud Linked to 2016 Crowdf...
Cybersecurity researchers have identified infrastructure links between the North Korean threat actors behind the fraudulent IT wor...
Google Cloud Researchers Uncover Flaws in Rsync Fi...
As many as six security vulnerabilities have been disclosed in the popular Rsync file-synchronizing tool for Unix systems, some of...
The High-Stakes Disconnect For ICS/OT Security
Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS/OT security with an IT securit...
FBI Deletes PlugX Malware from 4,250 Hacked Comput...
The U.S. Department of Justice (DoJ) on Tuesday disclosed that a court-authorized operation allowed the Federal Bureau of Investig...
3 Actively Exploited Zero-Day Flaws Patched in Mic...
Microsoft kicked off 2025 with a new set of patches for a total of 161 security vulnerabilities across its software portfolio, inc...