🔒 Cyber insurance is a must, but MFA requirements can be a maze. This new eBook is your cheat sheet to compliance. #cybersecuritytips #cybersecurity #cyberinsurance
The Hacker News
Computer and Network Security
NY, New York 586,225 followers
#1 Most trusted publication for breaking cybersecurity news, insights & analysis for information security professionals.
About us
The Hacker News : #1 Most trusted publication for breaking cybersecurity and hacking news, insights, and analysis for information security professionals.
- Website
-
https://thehackernews.com
External link for The Hacker News
- Industry
- Computer and Network Security
- Company size
- 11-50 employees
- Headquarters
- NY, New York
- Type
- Privately Held
- Founded
- 2010
- Specialties
- Penetration Testing, Computer Security, Information Security, Network Security, Computer Forensics, Vulnerability Assessment, Security Awareness, Cryptography, Mobile Security, Encryption, Web Application Security, OWASP, CISSP, Kali Linux, Technology, Information Technology, Hacking, Ethical Hacker, Linux, Network Administration, Server Administration, Information Security Management, Malware, Computers, Cybersecurity, Infosec, and Tech News
Locations
-
Primary
NY, New York, US
-
New Delhi, IN
Employees at The Hacker News
Updates
-
Acronis warns of a critical security flaw in its Cyber Infrastructure (ACI) product. This vulnerability, CVE-2023-45249, allows remote code execution due to default passwords, posing a high risk (CVSS score: 9.8). Versions impacted are below 5.4 update 4.2. Acronis urges immediate updates to mitigate threats. Read: https://lnkd.in/eRZQZqSr Ensure your ACI is up-to-date. #cybersecurity #databreach #infosec
Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild
thehackernews.com
-
Searchable encryption is emerging as a new gold standard in data security. This breakthrough #technology enables data to be encrypted while still being used, eliminating flaws during data processing. Discover the power of searchable encryption: https://lnkd.in/eh3vcW9f #tech
How Searchable Encryption Changes the Data Security Game
thehackernews.com
-
An unknown threat actor exploited a misconfiguration in Proofpoint's email security to send millions of spoofed emails. This flaw allowed attackers to bypass major security protections, potentially deceiving recipients and stealing sensitive information. The campaign, named EchoSpoofing, peaked at sending 14 million emails per day in June. Read details: https://lnkd.in/gydBNUxD #infosec #cybersecurity
Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails
thehackernews.com
-
The threat actor Stargazer Goblin has created a network of over 3,000 fake GitHub accounts to distribute malware, netting $100,000 in illicit profits. The ability to bypass platform security raises questions about the robustness of our digital infrastructures. Update your security protocols and report suspicious activities. Learn more: https://lnkd.in/giB_sFxm #cybersecurity
'Stargazer Goblin' Creates 3,000 Fake GitHub Accounts for Malware Spread
thehackernews.com
-
Gh0st RAT malware is being delivered via the Gh0stGambit dropper, targeting Chinese-speaking Windows users through fake Chrome installers. The dropper checks for security software before activating Gh0st RAT, which can exfiltrate data, capture screenshots, and even drop additional malicious tools. Read: https://lnkd.in/gwn8_GBV #cybersecurity #infosec
Gh0st RAT Trojan Targets Chinese Windows Users via Fake Chrome Site
thehackernews.com
-
French authorities and Europol launch "disinfection operation" against PlugX malware. This operation aims to clean infected systems across multiple European countries, potentially affecting millions worldwide. PlugX can persist on air-gapped networks and USB drives, posing a long-term risk. Learn more: https://lnkd.in/gwfVrDnw #cybersecurity #hacking
French Authorities Launch Operation to Remove PlugX Malware from Infected Systems
thehackernews.com
-
Beware of the "lr-utils-lib" PyPI package—it's a new threat to macOS users! This package steals Google Cloud credentials, posing a serious risk to both individual developers and enterprises. The malware checks the system's UUID against a hard-coded list of hashes before stealing data and sending it to a remote server. Read details: https://lnkd.in/gRi9Duaq Developers, check your downloads and safeguard your credentials immediately! #cybersecuritynews #infosec #technology #coding
Malicious PyPI Package Targets macOS to Steal Google Cloud Credentials
thehackernews.com
-
A new phishing-as-a-service platform from the GXC Team targets Spanish banks and other institutions with malicious #Android apps and AI-powered voice calling tools. The app intercepts SMS messages, including OTPs, to bypass two-factor authentication, while pretending to be a legitimate banking app. This scheme affects Spanish financial institutions and organizations in the U.S., U.K., Slovakia, and Brazil. Learn more: https://lnkd.in/gsd9tfcm Regular security updates are essential to combat these advanced threats. #cybersecuritytips #hacking #CyberSecurityAwareness
This AI-Powered Cybercrime Service Bundles Phishing Kits with Malicious Android Apps
thehackernews.com
-
Cybersecurity expert Foster Nethercott highlights offensive AI’s potential as a major threat. Offensive AI can create novel #malware capable of evading traditional security measures, posing significant risks. His paper outlines key points: https://lnkd.in/eKYzMP29 #infosec
Offensive AI: The Sine Qua Non of Cybersecurity
thehackernews.com