Google open sources Magika, an AI-powered tool that boosts file type identification accuracy by 30%, helping defenders more easily identify malicious files.
Learn more: https://thehackernews.com/2024/02/google-open-sources-magika-ai-powered.html
Learn more: https://thehackernews.com/2024/02/google-open-sources-magika-ai-powered.html
🔥26👍19🤔7👏6⚡4
Cyberattacks on business communication channels surged by 38% last year, exposing vulnerabilities that demand immediate attention. Are your communication platforms secure enough?
Learn essential strategies to protect your business from cyber threats: https://thehackernews.com/2024/02/how-businesses-can-safeguard-their.html
Learn essential strategies to protect your business from cyber threats: https://thehackernews.com/2024/02/how-businesses-can-safeguard-their.html
👍26🔥4🤔3⚡2
Ukrainian cybercriminal, Vyacheslav Igorevich Penchukov, pleads guilty to masterminding Zeus and IcedID malware attacks, infecting thousands of computers worldwide.
Learn more: https://thehackernews.com/2024/02/fbis-most-wanted-zeus-and-icedid.html
Learn more: https://thehackernews.com/2024/02/fbis-most-wanted-zeus-and-icedid.html
🤔34👍14👏5🤯5😁3⚡2
Iranian cyberespionage group Charming Kitten is using fake webinars and a new 'BASICSTAR' backdoor to target experts in Middle Eastern policy.
Learn more: https://thehackernews.com/2024/02/iranian-hackers-target-middle-east.html
Learn more: https://thehackernews.com/2024/02/iranian-hackers-target-middle-east.html
🔥16🤔4😁3👏2⚡1👍1😱1
A new cyberespionage campaign has targeted over 80 organizations in Europe, exploiting vulnerabilities in Roundcube webmail servers. The attackers were able to steal user credentials.
Learn more: https://thehackernews.com/2024/02/russian-linked-hackers-breach-80.html
Learn more: https://thehackernews.com/2024/02/russian-linked-hackers-breach-80.html
⚡16👍11
🚨 Alert: Anatsa dropper apps bypass Google Play protections and Android 13 restrictions, now targeting users in Slovakia, Slovenia, and Czechia to steal banking information.
Learn more: https://thehackernews.com/2024/02/anatsa-android-trojan-bypasses-google.html
Learn more: https://thehackernews.com/2024/02/anatsa-android-trojan-bypasses-google.html
🔥14👍8⚡3
🛑 Meta Platforms took action against 8 spyware firms targeting users on iOS, Android, and Windows devices. Their capabilities include data collection, camera use, and microphone access.
Learn more: https://thehackernews.com/2024/02/meta-warns-of-8-spyware-firms-targeting.html
Learn more: https://thehackernews.com/2024/02/meta-warns-of-8-spyware-firms-targeting.html
🤯17😁5👍4⚡3😱3
Cybersecurity pros say NDR's advanced detection and adaptive approach are the keys to beating sophisticated threats.
Stop chasing false alarms! See how NDR reduces noise and lets your team focus on what matters.
Read more: https://thehackernews.com/2024/02/bye-bye-siem-hello-risk-based-alerting.html
Stop chasing false alarms! See how NDR reduces noise and lets your team focus on what matters.
Read more: https://thehackernews.com/2024/02/bye-bye-siem-hello-risk-based-alerting.html
🤔15👍14⚡3
International law enforcement agencies seize multiple darknet domains operated by LockBit, a notorious ransomware group, in a major takedown.
Find details here: https://thehackernews.com/2024/02/lockbit-ransomwares-darknet-domains.html
Find details here: https://thehackernews.com/2024/02/lockbit-ransomwares-darknet-domains.html
👍21😱12🔥7⚡2🤯2
⚠️ Critical security flaw (CVE-2024-25600) in Bricks theme for WordPress (used by 25,000+ sites) is being exploited by attackers to run malicious PHP code on vulnerable installations.
Learn more: https://thehackernews.com/2024/02/wordpress-bricks-theme-under-active.html
Learn more: https://thehackernews.com/2024/02/wordpress-bricks-theme-under-active.html
⚡15👍7😱5👏1
Iranian and Hezbollah-backed hackers launched cyber attacks to sway public opinion during the Israel-Hamas conflict, highlighting the evolving nature of modern warfare.
Learn more: https://thehackernews.com/2024/02/iran-and-hezbollah-hackers-launch.html
Learn more: https://thehackernews.com/2024/02/iran-and-hezbollah-hackers-launch.html
🤯25🔥11👍9👏7⚡3
🚨 North Korean hackers target the defense sector with the 'Dream Job' campaign. They're using cyberattacks to steal sensitive defense technologies and advance their weapons programs.
Learn more: https://thehackernews.com/2024/02/new-report-reveals-north-korean-hackers.html
Learn more: https://thehackernews.com/2024/02/new-report-reveals-north-korean-hackers.html
👏10🤯6⚡4👍2
⚡ BREAKING: Major Blow to Cybercrime! LockBit, 'world's most harmful ransomware group', taken down:
- Source code seized
- Key players arrested
- 200+ LockBit-linked crypto accounts frozen
- Decryption keys obtained to aid victims
Read: https://thehackernews.com/2024/02/lockbit-ransomware-operation-shut-down.html
- Source code seized
- Key players arrested
- 200+ LockBit-linked crypto accounts frozen
- Decryption keys obtained to aid victims
Read: https://thehackernews.com/2024/02/lockbit-ransomware-operation-shut-down.html
🔥34👍18⚡14🤯13👏7😁3
SaaS data leaks often result from misconfigurations.
Stay ahead of attackers with a NIST-aligned checklist to protect your SaaS apps. Secure your SaaS stack with the right settings, not just fancy tools.
Read more here: https://thehackernews.com/2024/02/saas-compliance-through-nist.html
Stay ahead of attackers with a NIST-aligned checklist to protect your SaaS apps. Secure your SaaS stack with the right settings, not just fancy tools.
Read more here: https://thehackernews.com/2024/02/saas-compliance-through-nist.html
🔥11👍8🤔1
⚠️ Warning: New malicious Python packages discovered on PyPI targeting open-source software supply chains using DLL side-loading to evade detection and spread malware.
Learn more: https://thehackernews.com/2024/02/new-malicious-pypi-packages-caught.html
Learn more: https://thehackernews.com/2024/02/new-malicious-pypi-packages-caught.html
🔥15👍6😁4👏1
Heads up, Cloud Security professionals!
A novel malware named Migo is targeting Redis servers for cryptojacking. It disables security measures, injects XMRig miner, and hides processes. Linked to known groups like TeamTNT.
Learn more: https://thehackernews.com/2024/02/new-migo-malware-targeting-redis.html
A novel malware named Migo is targeting Redis servers for cryptojacking. It disables security measures, injects XMRig miner, and hides processes. Linked to known groups like TeamTNT.
Learn more: https://thehackernews.com/2024/02/new-migo-malware-targeting-redis.html
🤔15😁7👏5👍4🔥1
🚨 Attention VMware users!
New flaws identified (CVE-2024-22245 & CVE-2024-22250) in the EAP plugin. Attackers could exploit them to hijack Active Directory accounts and privileged EAP sessions.
UNINSTALL it immediately.
Learn more: https://thehackernews.com/2024/02/vmware-alert-uninstall-eap-now-critical.html
New flaws identified (CVE-2024-22245 & CVE-2024-22250) in the EAP plugin. Attackers could exploit them to hijack Active Directory accounts and privileged EAP sessions.
UNINSTALL it immediately.
Learn more: https://thehackernews.com/2024/02/vmware-alert-uninstall-eap-now-critical.html
👍21😁5⚡4
A new Russia-aligned influence operation is targeting Ukraine with disinformation campaigns and credential-harvesting attacks.
Details here ➡️ https://thehackernews.com/2024/02/russian-hackers-target-ukraine-with.html
Details here ➡️ https://thehackernews.com/2024/02/russian-hackers-target-ukraine-with.html
😁10🤯9👍6⚡1
🔐 Big news for privacy fans! Say goodbye to sharing your number with everyone you message!
Signal Messenger has finally introduced a "usernames" feature, allowing you to keep your phone number private.
Learn how to activate it: https://thehackernews.com/2024/02/signal-introduces-usernames-allowing.html
Signal Messenger has finally introduced a "usernames" feature, allowing you to keep your phone number private.
Learn how to activate it: https://thehackernews.com/2024/02/signal-introduces-usernames-allowing.html
👍32🔥16😁12👏4🤔3⚡2
🚨 New Malware Alert: VietCredCare is targeting Facebook advertisers in Vietnam, hijacking accounts with positive Meta ad credits.
The stolen accounts are used to post political content or to propagate phishing and affiliate scams.
Learn more: https://thehackernews.com/2024/02/new-vietcredcare-stealer-targeting.html
The stolen accounts are used to post political content or to propagate phishing and affiliate scams.
Learn more: https://thehackernews.com/2024/02/new-vietcredcare-stealer-targeting.html
🔥15⚡4👍4