Cybersecurity researchers are warning about a spike in email phishing campaigns that are weaponizing the Google Cloud Run service to deliver various banking...
Feb 26, 2024The Hacker NewsSteganography / Malware
Ukrainian entities based in Finland have been targeted as part of a malicious campaign distributing a commercial...
More than 8,000 subdomains belonging to legitimate brands and institutions have been hijacked as part of a sophisticated distribution architecture for spam proliferation...
Feb 26, 2024The Hacker NewsSoftware Security / Cryptocurrency
A set of fake npm packages discovered on the Node.js repository has been found to share...
Last year, the Open Worldwide Application Security Project (OWASP) published multiple versions of the "OWASP Top 10 For Large Language Models," reaching a...
The threat actors behind the LockBit ransomware operation have resurfaced on the dark web using new infrastructure, days after an international law enforcement...
LockBitSupp, the individual(s) behind the persona representing the LockBit ransomware service on cybercrime forums such as Exploit and XSS, "has engaged with law...
Feb 24, 2024NewsroomActive Directory / Data Protection
Microsoft has expanded free logging capabilities to all U.S. federal agencies using Microsoft Purview Audit irrespective of...
Feb 23, 2024NewsroomSupply Chain Attack / Malware
A dormant package available on the Python Package Index (PyPI) repository was updated nearly after two years...