The Hacker News

CISA Warns of Active Exploitation in GitHub Action Supp...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday adde...

New ‘Rules File Backdoor’ Attack Lets Hackers Inject Ma...

Cybersecurity researchers have disclosed details of a new supply chain attack ve...

Unpatched Windows Zero-Day Flaw Exploited by 11 State-S...

An unpatched security flaw impacting Microsoft Windows has been exploited by 11 ...

Google Acquires Wiz for $32 Billion in Its Biggest Deal...

Google is making the biggest ever acquisition in its history by purchasing cloud...

New Critical AMI BMC Vulnerability Enables Remote Serve...

A critical security vulnerability has been disclosed in AMI's MegaRAC Baseboard ...

New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downl...

Cybersecurity researchers have warned about a large-scale ad fraud campaign that...

How to Improve Okta Security in Four Steps

While Okta provides robust native security features, configuration drift, identi...

China-Linked MirrorFace Deploys ANEL and AsyncRAT in Ne...

Threat hunters have shed more light on a previously disclosed malware campaign u...

BADBOX 2.0 Botnet Infects 1 Million Android Devices for...

At least four different threat actors have been identified as involved in an upd...

Microsoft Warns of StilachiRAT: A Stealthy RAT Targetin...

Microsoft is calling attention to a novel remote access trojan (RAT) named Stila...

Apache Tomcat Vulnerability Actively Exploited Just 30 ...

A recently disclosed security flaw impacting Apache Tomcat has come under active...

Unpatched Edimax Camera Flaw Exploited for Mirai Botnet...

An unpatched security flaw impacting the Edimax IC-7100 network camera is being ...

Cybercriminals Exploit CSS to Evade Spam Filters and Tr...

Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to ...

⚡ THN Weekly Recap: Router Hacks, PyPI Attacks, New Ra...

From sophisticated nation-state campaigns to stealthy malware lurking in unexpec...

SANS Institute Warns of Novel Cloud-Native Ransomware A...

The latest Palo Alto Networks Unit 42 Cloud Threat Report found that sensitive d...

GitHub Action Compromise Puts CI/CD Secrets at Risk in ...

Cybersecurity researchers are calling attention to an incident in which the popu...

Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 ...

Cybersecurity researchers have warned of a malicious campaign targeting users of...

Alleged Israeli LockBit Developer Rostislav Panev Extra...

A 51-year-old dual Russian and Israeli national who is alleged to be a developer...

GSMA Confirms End-to-End Encryption for RCS, Enabling S...

The GSM Association (GSMA) has formally announced support for end-to-end encrypt...

Live Ransomware Demo: See How Hackers Breach Networks a...

Cyber threats evolve daily. In this live webinar, learn exactly how ransomware a...

Why Most Microsegmentation Projects Fail—And How Andely...

Most microsegmentation projects fail before they even get off the ground—too com...

New MassJacker Malware Targets Piracy Users, Hijacking ...

Users searching for pirated software are the target of a new malware campaign th...

OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy R...

A new malware campaign has been observed leveraging social engineering tactics t...

Microsoft Warns of ClickFix Phishing Campaign Targeting...

Microsoft has shed light on an ongoing phishing campaign that targeted the hospi...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.