TheHackerNews
-
Gootkit RAT Using SEO to Distribute Malware Through Compromised Sites
A framework notorious for delivering a banking Trojan has received a facelift to deploy a wider range of malware, including ransomware payloads....
-
Why do companies fail to stop breaches despite soaring IT security investment?
Let's first take a look back at 2020! Adding to the list of difficulties that surfaced last year, 2020 was also grim for personal data protection,...
-
Chinese Hackers Targeted India's Power Grid Amid Geopolitical Tensions
Amid heightened border tensions between India and China, cybersecurity researchers have revealed a concerted campaign against India's critical...
-
SolarWinds Blame Intern for Weak Password That Led to Biggest Attack in 2020
As cybersecurity researchers continue to piece together the sprawling SolarWinds supply chain attack, top executives of the Texas-based software...
-
North Korean Hackers Targeting Defense Firms with ThreatNeedle Malware
A prolific North Korean state-sponsored hacking group has been tied to a new ongoing espionage campaign aimed at exfiltrating sensitive information...
-
ALERT: Malicious Amazon Alexa Skills Can Easily Bypass Vetting Process
Researchers have uncovered gaps in Amazon's skill vetting process for the Alexa voice assistant ecosystem that could allow a malicious actor to...
-
Cisco Releases Security Patches for Critical Flaws Affecting its Products
Cisco has addressed a maximum severity vulnerability in its Application Centric Infrastructure (ACI) Multi-Site Orchestrator (MSO) that could allow...
-
Chinese Hackers Using Firefox Extension to Spy On Tibetan Organizations
Cybersecurity researchers today unwrapped a new campaign aimed at spying on vulnerable Tibetan communities globally by deploying a malicious...
-
The Top Free Tools for Sysadmins in 2021
It's no secret that sysadmins have plenty on their plates. Managing, troubleshooting, and updating software or hardware is a tedious task....
-
Russian Hackers Targeted Ukraine Authorities With Supply-Chain Malware Attack
Ukraine is formally pointing fingers at Russian hackers for hacking into one of its government systems and attempting to plant and distribute...
-
Online Trackers Increasingly Switching to Invasive CNAME Cloaking Technique
With browser makers steadily clamping down on third-party tracking, advertising technology companies are increasingly embracing a DNS technique to...
-
Experts Warns of Notable Increase in QuickBooks Data Files Theft Attacks
New research has uncovered a significant increase in QuickBooks file data theft using social engineering tricks to deliver malware and exploit the...
-
Everything You Need to Know About Evolving Threat of Ransomware
The cybersecurity world is constantly evolving to new forms of threats and vulnerabilities. But ransomware proves to be a different animal—most...
-
Critical RCE Flaws Affect VMware ESXi and vSphere Client — Patch Now
VMware has addressed multiple critical remote code execution (RCE) vulnerabilities in VMware ESXi and vSphere Client virtual infrastructure...
-
Experts Find a Way to Learn What You're Typing During Video Calls
A new attack framework aims to infer keystrokes typed by a target user at the opposite end of a video conference call by simply leveraging the...