The Hacker News

Microsoft Warns of Tax-Themed Email Attacks Using PDFs ...

Microsoft is warning of several phishing campaigns that are leveraging tax-relat...

Lazarus Group Targets Job Seekers With ClickFix Tactic ...

The North Korean threat actors behind Contagious Interview have adopted the incr...

AI Threats Are Evolving Fast — Learn Practical Defense ...

The rules have changed. Again. Artificial intelligence is bringing powerful new ...

AI Adoption in the Enterprise: Breaking Through the Sec...

AI holds the promise to revolutionize all sectors of enterpriseーfrom fraud dete...

Case Study: Are CSRF Tokens Sufficient in Preventing CS...

Explore how relying on CSRF tokens as a security measure against CSRF attacks is...

Google Patches Quick Share Vulnerability Enabling Silen...

Cybersecurity researchers have disclosed details of a new vulnerability impactin...

Triada Malware Preloaded on Counterfeit Android Phones ...

Counterfeit versions of popular smartphone models that are sold at reduced price...

Legacy Stripe API Exploited to Validate Stolen Payment ...

Threat hunters are warning of a sophisticated web skimmer campaign that leverage...

Europol Dismantles Kidflix With 72,000 CSAM Videos Seiz...

In one of the largest coordinated law enforcement operations, authorities have d...

Google Fixed Cloud Run Vulnerability Allowing Unauthori...

Cybersecurity researchers have disclosed details of a now-patched privilege esca...

Helping Your Clients Achieve NIST Compliance: A Step by...

Introduction As the cybersecurity landscape evolves, service providers play an i...

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacki...

Cybersecurity researchers have shed light on an "auto-propagating" cryptocurrenc...

How SSL Misconfigurations Impact Your Attack Surface

When assessing an organization’s external attack surface, encryption-related iss...

FIN7 Deploys Anubis Backdoor to Hijack Windows Systems ...

The financially motivated threat actor known as FIN7 has been linked to a Python...

New Malware Loaders Use Call Stack Spoofing, GitHub C2,...

Cybersecurity researchers have discovered an updated version of a malware loader...

Over 1,500 PostgreSQL Servers Compromised in Fileless C...

Exposed PostgreSQL instances are the target of an ongoing campaign designed to g...

Enterprise Gmail Users Can Now Send End-to-End Encrypte...

On the 21st birthday of Gmail, Google has announced a major update that allows e...

Lucid PhaaS Hits 169 Targets in 88 Countries Using iMes...

A new sophisticated phishing-as-a-service (PhaaS) platform called Lucid has targ...

Apple Backports Critical Fixes for 3 Recent 0-Days Impa...

Apple on Monday backported fixes for three vulnerabilities that have come under ...

Apple Backports Critical Fixes for 3 Live Exploits Impa...

Apple on Monday backported fixes for three vulnerabilities that have come under ...

Nearly 24,000 IPs Target PAN-OS GlobalProtect in Coordi...

Cybersecurity researchers are warning of a spike in suspicious login scanning ac...

New Case Study: Global Retailer Overshares CSRF Tokens ...

Are your security tokens truly secure? Explore how Reflectiz helped a giant reta...

China-Linked Earth Alux Uses VARGEIT and COBEACON in Mu...

Cybersecurity researchers have shed light on a new China-linked threat actor cal...

Researchers Uncover 46 Critical Flaws in Solar Power Sy...

Cybersecurity researchers have disclosed 46 new security flaws in products from ...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.