Category: Hacker News

New ‘Rules File Backdoor’ Attack Lets Hackers Inje...

Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that affects artif...

Unpatched Windows Zero-Day Flaw Exploited by 11 St...

An unpatched security flaw impacting Microsoft Windows has been exploited by 11 state-sponsored groups from China, Iran, North Kor...

Google Acquires Wiz for $32 Billion in Its Biggest...

Google is making the biggest ever acquisition in its history by purchasing cloud security company Wiz in an all-cash deal worth $3...

New Critical AMI BMC Vulnerability Enables Remote ...

A critical security vulnerability has been disclosed in AMI's MegaRAC Baseboard Management Controller (BMC) software that could al...

How to Improve Okta Security in Four Steps

While Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide oppor...

New Ad Fraud Campaign Exploits 331 Apps with 60M+ ...

Cybersecurity researchers have warned about a large-scale ad fraud campaign that has leveraged hundreds of malicious apps publishe...

China-Linked MirrorFace Deploys ANEL and AsyncRAT ...

Threat hunters have shed more light on a previously disclosed malware campaign undertaken by the China-aligned MirrorFace threat a...

BADBOX 2.0 Botnet Infects 1 Million Android Device...

At least four different threat actors have been identified as involved in an updated version of a massive ad fraud and residential...

Microsoft Warns of StilachiRAT: A Stealthy RAT Tar...

Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs advanced techniques to...

Apache Tomcat Vulnerability Actively Exploited Jus...

A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following the release of...

Unpatched Edimax Camera Flaw Exploited for Mirai B...

An unpatched security flaw impacting the Edimax IC-7100 network camera is being exploited by threat actors to deliver Mirat botnet...

Cybercriminals Exploit CSS to Evade Spam Filters a...

Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to style and format the layout of web pages, to bypas...

Hackers Exploit Severe PHP Flaw to Deploy Quasar R...

Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurrency miners and remote access trojans (RATs) like ...

Leaked Black Basta Chats Suggest Russian Officials...

The recently leaked trove of internal chat logs among members of the Black Basta ransomware operation has revealed possible connec...

Watch This Webinar to Learn How to Eliminate Ident...

In today’s digital world, security breaches are all too common. Despite the many security tools and training programs available, i...

ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA...

The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Cloudflare Turnstile verifications as lures to trick u...

5 Identity Threat Detection & Response Must-Haves ...

Identity-based attacks are on the rise. Attackers are targeting identities with compromised credentials, hijacked authentication m...