Category: Hacker News

How to Make Your Employees Your First Line of Cybe...

There’s a natural human desire to avoid threatening scenarios. The irony, of course, is if you hope to attain any semblance of sec...

Bitcoin Forensic Analysis Uncovers Money Launderin...

A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain has revealed clusters associated with ill...

New Cuttlefish Malware Hijacks Router Connections,...

A new malware called Cuttlefish is targeting small office and home office (SOHO) routers with the goal of stealthily monitoring al...

CISA Warns of Active Exploitation of Severe GitLab...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting GitLab to its Known Exploited...

New "Goldoon" Botnet Targets D-Link Routers With D...

A never-before-seen botnet called Goldoon has been observed targeting D-Link routers with a nearly decade-old critical security fl...

Dropbox Discloses Breach of Digital Signature Serv...

Cloud storage services provider Dropbox on Wednesday disclosed that Dropbox Sign (formerly HelloSign) was breached by unidentified...

When is One Vulnerability Scanner Not Enough?

Like antivirus software, vulnerability scans rely on a database of known weaknesses. That’s why websites like VirusTotal exist, to...

Ukrainian REvil Hacker Sentenced to 13 Years and O...

A Ukrainian national has been sentenced to more than 13 years in prison and ordered to pay $16 million in restitution for carrying...

Popular Android Apps Like Xiaomi, WPS Office Vulne...

Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated vulnerability c...

Four Critical Vulnerabilities Expose HPE Aruba Dev...

HPE Aruba Networking (formerly Aruba Networks) has released security updates to address critical flaws impacting ArubaOS that coul...

Google Announces Passkeys Adopted by Over 400 Mill...

Google on Thursday announced that passkeys are being used by over 400 million Google accounts, authenticating users more than 1 bi...

NSA, FBI Alert on N. Korean Hackers Spoofing Email...

The U.S. government on Thursday published a new cybersecurity advisory warning of North Korean threat actors' attempts to send ema...

New Guide Explains How to Eliminate the Risk of Sh...

SaaS applications are dominating the corporate landscape. Their increased use enables organizations to push the boundaries of tech...

Hackers Increasingly Abusing Microsoft Graph API f...

Threat actors have been increasingly weaponizing Microsoft Graph API for malicious purposes with the aim of evading detection. Thi...

Expert-Led Webinar - Uncovering Latest DDoS Tactic...

In today's rapidly evolving digital landscape, the threat of Distributed Denial of Service (DDoS) attacks looms more significant t...

Microsoft Outlook Flaw Exploited by Russia's APT28...

Czechia and Germany on Friday revealed that they were the target of a long-term cyber espionage campaign conducted by the Russia-l...

New 'Cuckoo' Persistent macOS Spyware Targeting In...

Cybersecurity researchers have discovered a new information stealer targeting Apple macOS systems that's designed to set up persis...

Xiaomi Android Devices Hit by Multiple Flaws Acros...

Multiple security vulnerabilities have been disclosed in various applications and system components within Xiaomi devices running ...

It Costs How Much?!? The Financial Pitfalls of Cyb...

Cybercriminals are vipers. They’re like snakes in the grass, hiding behind their keyboards, waiting to strike. And if you're a sma...

China-Linked Hackers Suspected in ArcaneDoor Cyber...

The recently uncovered cyber espionage campaign targeting perimeter network devices from several vendors, including Cisco, may hav...