No menu items!
No menu items!
More

    THN

    China-Linked Earth Alux Uses VARGEIT and COBEACON in Multi-Stage Cyber Intrusions

    Cybersecurity researchers have shed light on a new China-linked threat actor called Earth Alux that has targeted various key sectors such as government,...

    Lucid PhaaS Hits 169 Targets in 88 Countries Using iMessage and RCS Smishing

    A new sophisticated phishing-as-a-service (PhaaS) platform called Lucid has targeted 169 entities in 88 countries using smishing messages propagated via Apple iMessage and...

    Global Retailer Overshares CSRF Tokens with Facebook

    Apr 01, 2025The Hacker NewsWeb Security / GDPR Compliance Are your security tokens truly secure? Explore how Reflectiz helped a giant retailer to expose a...

    Nearly 24,000 IPs Target PAN-OS GlobalProtect in Coordinated Login Scan Campaign

    Apr 01, 2025Ravie LakshmananNetwork Security / Vulnerability Cybersecurity researchers are warning of a spike in suspicious login scanning activity targeting Palo Alto Networks PAN-OS...

    Apple Backports Critical Fixes for 3 Live Exploits Impacting iOS and macOS Legacy Devices

    Apr 01, 2025Ravie LakshmananMobile Security / Vulnerability Apple on Monday backported fixes for three vulnerabilities that have come under active exploitation in the wild...

    Apple Fined €150 Million by French Regulator Over Discriminatory ATT Consent Practices

    Apr 01, 2025Ravie LakshmananData Protection / Privacy Apple has been hit with a fine of €150 million ($162 million) by France's competition watchdog over...

    Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp

    The threat actors behind the zero-day exploitation of a recently-patched security vulnerability in Microsoft Windows have been found to deliver two new backdoors...

    5 Impactful AWS Vulnerabilities You’re Responsible For

    Mar 31, 2025The Hacker NewsIntrusion Detection / Vulnerability If you're using AWS, it's easy to assume your cloud security is handled - but that's...

    Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images

    Mar 31, 2025Ravie LakshmananData Theft / Website Security Threat actors are using the "mu-plugins" directory in WordPress sites to conceal malicious code with the...

    Latest articles

    spot_imgspot_img