The Hacker News

Microsoft Warns of Tax-Themed Email Attacks Using PDFs ...

Microsoft is warning of several phishing campaigns that are leveraging tax-relat...

Lazarus Group Targets Job Seekers With ClickFix Tactic ...

The North Korean threat actors behind Contagious Interview have adopted the incr...

AI Threats Are Evolving Fast — Learn Practical Defense ...

The rules have changed. Again. Artificial intelligence is bringing powerful new ...

Case Study: Are CSRF Tokens Sufficient in Preventing CS...

Explore how relying on CSRF tokens as a security measure against CSRF attacks is...

AI Adoption in the Enterprise: Breaking Through the Sec...

AI holds the promise to revolutionize all sectors of enterpriseーfrom fraud dete...

Google Patches Quick Share Vulnerability Enabling Silen...

Cybersecurity researchers have disclosed details of a new vulnerability impactin...

Triada Malware Preloaded on Counterfeit Android Phones ...

Counterfeit versions of popular smartphone models that are sold at reduced price...

Europol Dismantles Kidflix With 72,000 CSAM Videos Seiz...

In one of the largest coordinated law enforcement operations, authorities have d...

Legacy Stripe API Exploited to Validate Stolen Payment ...

Threat hunters are warning of a sophisticated web skimmer campaign that leverage...

Google Fixed Cloud Run Vulnerability Allowing Unauthori...

Cybersecurity researchers have disclosed details of a now-patched privilege esca...

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacki...

Cybersecurity researchers have shed light on an "auto-propagating" cryptocurrenc...

Helping Your Clients Achieve NIST Compliance: A Step by...

Introduction As the cybersecurity landscape evolves, service providers play an i...

How SSL Misconfigurations Impact Your Attack Surface

When assessing an organization’s external attack surface, encryption-related iss...

FIN7 Deploys Anubis Backdoor to Hijack Windows Systems ...

The financially motivated threat actor known as FIN7 has been linked to a Python...

New Malware Loaders Use Call Stack Spoofing, GitHub C2,...

Cybersecurity researchers have discovered an updated version of a malware loader...

Over 1,500 PostgreSQL Servers Compromised in Fileless C...

Exposed PostgreSQL instances are the target of an ongoing campaign designed to g...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.