The Hacker News

How to Balance Password Security Against User Experience

If given the choice, most users are likely to favor a seamless experience over c...

Critical Next.js Vulnerability Allows Attackers to Bypa...

A critical security flaw has been disclosed in the Next.js React framework that ...

Coinbase Initially Targeted in GitHub Actions Supply Ch...

The supply chain attack involving the GitHub Action "tj-actions/changed-files" s...

GitHub Supply Chain Breach: Coinbase Attack Exposes 218...

The supply chain attack involving the GitHub Action "tj-actions/changed-files" s...

U.S. Treasury Lifts Tornado Cash Sanctions Amid North K...

The U.S. Treasury Department has announced that it's removing sanctions against ...

UAT-5918 Targets Taiwan's Critical Infrastructure Using...

Threat hunters have uncovered a new threat actor named UAT-5918 that has been at...

Medusa Ransomware Uses Malicious Driver to Disable Anti...

The threat actors behind the Medusa ransomware-as-a-service (RaaS) operation hav...

China-Linked APT Aquatic Panda: 10-Month Campaign, 7 Gl...

The China-linked advanced persistent threat (APT) group. known as Aquatic Panda ...

10 Critical Network Pentest Findings IT Teams Overlook

After conducting over 10,000 automated internal network penetration tests last y...

Kaspersky Links Head Mare to Twelve, Targeting Russian ...

Two known threat activity clusters codenamed Head Mare and Twelve have likely jo...

Ongoing Cyber Attacks Exploit Critical Vulnerabilities ...

Two now-patched security flaws impacting Cisco Smart Licensing Utility are seein...

YouTube Game Cheats Spread Arcane Stealer Malware to Ru...

YouTube videos promoting game cheats are being used to deliver a previously undo...

Veeam and IBM Release Patches for High-Risk Flaws in Ba...

Veeam has released security updates to address a critical security flaw impactin...

How to Protect Your Business from Cyber Threats: Master...

Cybersecurity isn't just another checkbox on your business agenda. It's a fundam...

Six Governments Likely Use Israeli Paragon Spyware to H...

The governments of Australia, Canada, Cyprus, Denmark, Israel, and Singapore are...

Why Continuous Compliance Monitoring Is Essential For I...

Regulatory compliance is no longer just a concern for large enterprises. Small a...

CISA Adds NAKIVO Vulnerability to KEV Catalog Amid Acti...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a hig...

CERT-UA Warns: Dark Crystal RAT Targets Ukrainian Defen...

The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of a new ca...

Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT an...

Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurr...

Leaked Black Basta Chats Suggest Russian Officials Aide...

The recently leaked trove of internal chat logs among members of the Black Basta...

Watch This Webinar to Learn How to Eliminate Identity-B...

In today’s digital world, security breaches are all too common. Despite the many...

ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and ...

The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Clou...

5 Identity Threat Detection & Response Must-Haves for S...

Identity-based attacks are on the rise. Attackers are targeting identities with ...

Critical mySCADA myPRO Flaws Could Let Attackers Take O...

Cybersecurity researchers have disclosed details of two critical flaws impacting...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.