New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access
Eight vulnerabilities have been uncovered in Microsoft applications for macOS that an adversary could exploit to gain elevated privileges or access sensitive data...
Ex-Engineer Charged in Missouri for Failed $750,000 Bitcoin Extortion Attempt
Sep 03, 2024Ravie LakshmananInsider Threat / Network Security
A 57-year-old man from the U.S. state of Missouri has been arrested in connection with a...
RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors
Threat actors linked to the RansomHub ransomware group encrypted and exfiltrated data from at least 210 victims since its inception in February 2024,...
Learn to Boost Cybersecurity with AI-Powered Vulnerability Management
Sep 02, 2024The Hacker NewsVulnerability Management / Webinar
The world of cybersecurity is in a constant state of flux. New vulnerabilities emerge daily, and...
Next-Generation Attacks, Same Targets – How to Protect Your Users’ Identities
Sep 02, 2024The Hacker NewsCybercrime / CISO Insights
The FBI and CISA Issue Joint Advisory on New Threats and How to Stop Ransomware
Note: on...
Malicious npm Packages Mimicking ‘noblox.js’ Compromise Roblox Developers’ Systems
Sep 02, 2024Ravie LakshmananSoftware Security / Malware
Roblox developers are the target of a persistent campaign that seeks to compromise systems through bogus npm...
North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit
Aug 31, 2024Ravie LakshmananRootkit / Threat Intelligence
A recently patched security flaw in Google Chrome and other Chromium web browsers was exploited as a...
Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns
Aug 30, 2024Ravie LakshmananCryptojacking / Vulnerability
Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence Data Center and Confluence...
Cyberattackers Exploit Google Sheets for Malware Control in Global Espionage Campaign
Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism.
The activity, detected by Proofpoint starting August...
Latest articles