No menu items!
No menu items!
More

    THN

    Malicious PyPI Package Targets macOS to Steal Google Cloud Credentials

    Jul 27, 2024NewsroomCybersecurity / Cloud Security Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that targets Apple macOS...

    This AI-Powered Cybercrime Service Bundles Phishing Kits with Malicious Android Apps

    A Spanish-speaking cybercrime group named GXC Team has been observed bundling phishing kits with malicious Android applications, taking malware-as-a-service (MaaS) offerings to the...

    The Sine Qua Non of Cybersecurity

    Jul 26, 2024The Hacker NewsDigital Warfare / Cybersecurity Training "Peace is the virtue of civilization. War is its crime. Yet it is often in...

    U.S. DoJ Indicts North Korean Hacker for Ransomware Attacks on Hospitals

    The U.S. Department of Justice (DoJ) on Thursday unsealed an indictment against a North Korean military intelligence operative for allegedly carrying out ransomware...

    CrowdStrike Warns of New Phishing Scam Targeting German Customers

    Jul 26, 2024Mohit KumarEnterprise Security / Network Security CrowdStrike is alerting about an unfamiliar threat actor attempting to capitalize on the Falcon Sensor update...

    Ongoing Cyberattack Targets Exposed Selenium Grid Services for Crypto Mining

    Jul 26, 2024Newsroom Cybersecurity researchers are sounding the alarm over an ongoing campaign that's leveraging internet-exposed Selenium Grid services for illicit cryptocurrency mining. Cloud security...

    Critical Flaw in Telerik Report Server Poses Remote Code Execution Risk

    Jul 26, 2024NewsroomSoftware Security / Vulnerability Progress Software is urging users to update their Telerik Report Server instances following the discovery of a critical...

    Researchers Reveal ConfusedFunction Vulnerability in Google Cloud Platform

    Jul 25, 2024NewsroomCloud Security / Vulnerability Cybersecurity researchers have disclosed a privilege escalation vulnerability impacting Google Cloud Platform's Cloud Functions service that an attacker...

    North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks

    Jul 25, 2024NewsroomMalware / Cyber Espionage A North Korea-linked threat actor known for its cyber espionage operations has gradually expanded into financially-motivated attacks that...

    Latest articles

    spot_imgspot_img