The hacker new
-
Enigma, Vector, and TgToxic: The New Threats to Cryptocurrency Users
Suspected Russian threat actors have been targeting Eastern European users in the crypto industry with fake job opportunities as bait to install...
-
Reddit Suffers Security Breach Exposing Internal Documents and Source Code
Popular social news aggregation platform Reddit has disclosed that it was the victim of a security incident that enabled unidentified threat actors...
-
Critical Infrastructure at Risk from New Vulnerabilities Found in Wireless IIoT Devices
A set of 38 security vulnerabilities has been uncovered in wireless industrial internet of things (IIoT) devices from four different vendors that...
-
THN Webinar – Learn How to Comply with New Cyber Insurance Identity Security Requirements
The Hacker News is thrilled to announce the launch of our new educational webinar series, in collaboration with the leading cybersecurity companies...
-
NIST Standardizes Ascon Cryptographic Algorithm for IoT and Other Lightweight Devices
The U.S. National Institute of Standards and Technology (NIST) has announced that a family of authenticated encryption and hashing algorithms known...
-
Unpatched Security Flaws Disclosed in Multiple Document Management Systems
Multiple unpatched security flaws have been disclosed in open source and freemium Document Management System (DMS) offerings from four vendors...
-
Sydney Man Sentenced for Blackmailing Optus Customers After Data Breach
A Sydney man has been sentenced to an 18-month Community Correction Order (CCO) and 100 hours of community service for attempting to take advantage...
-
CERT-UA Alerts Ukrainian State Authorities of Remcos Software-Fueled Cyber Attacks
The Computer Emergency Response Team of Ukraine (CERT-UA) has issued an alert warning of cyber attacks against state authorities in the country...
-
Encrypted Messaging App Exclu Used by Criminal Groups Cracked by Joint Law Enforcement
A joint law enforcement operation conducted by Germany, the Netherlands, and Poland has cracked yet another encrypted messaging application named...
-
Hackers Exploit Vulnerabilities in Sunlogin to Deploy Sliver C2 Framework
Threat actors are leveraging known flaws in Sunlogin software to deploy the Sliver command-and-control (C2) framework for carrying out...
-
GuLoader Malware Using Malicious NSIS Executables to Target E-Commerce Industry
E-commerce industries in South Korea and the U.S. are at the receiving end of an ongoing GuLoader malware campaign, cybersecurity firm Trellix...
-
Microsoft: Iranian Nation-State Group Sanctioned by U.S. Behind Charlie Hebdo Hack
An Iranian nation-state group sanctioned by the U.S. government has been attributed to the hack of the French satirical magazine Charlie Hebdo in...