TheHackersNews

Beware: New Vo1d Malware Infects 1.3 Million Android TV...

Nearly 1.3 million Android-based TV boxes running outdated versions of the opera...

Exposed Selenium Grid Servers Targeted for Crypto Minin...

Internet-exposed Selenium Grid instances are being targeted by bad actors for il...

Top 3 Threat Report Insights for Q2 2024

Cato CTRL (Cyber Threats Research Lab) has released its Q2 2024 Cato CTRL SASE T...

Iranian Cyber Group OilRig Targets Iraqi Government in ...

Iraqi government networks have emerged as the target of an "elaborate" cyber att...

Ireland's Watchdog Launches Inquiry into Google's AI Da...

The Irish Data Protection Commission (DPC) has announced that it has commenced a...

Quad7 Botnet Expands to Target SOHO Routers and VPN App...

The operators of the mysterious Quad7 botnet are actively evolving by compromisi...

DragonRank Black Hat SEO Campaign Targeting IIS Servers...

A "simplified Chinese-speaking actor" has been linked to a new campaign that has...

Singapore Police Arrest Six Hackers Linked to Global Cy...

The Singapore Police Force (SPF) has announced the arrest of five Chinese nation...

Why Is It So Challenging to Go Passwordless?

Imagine a world where you never have to remember another password. Seems like a ...

Developers Beware: Lazarus Group Uses Fake Coding Tests...

Cybersecurity researchers have uncovered a new set of malicious Python packages ...

Microsoft Issues Patches for 79 Flaws, Including 3 Acti...

Microsoft on Tuesday disclosed that three new security flaws impacting the Windo...

Ivanti Releases Urgent Security Updates for Endpoint Ma...

Ivanti has released software updates to address multiple security flaws impactin...

New PIXHELL Attack Exploits LCD Screen Noise to Exfiltr...

A new side-channel attack dubbed PIXHELL could be abused to target air-gapped co...

CosmicBeetle Deploys Custom ScRansom Ransomware, Partne...

The threat actor known as CosmicBeetle has debuted a new custom ransomware strai...

Experts Identify 3 Chinese-Linked Clusters Behind Cyber...

A trio of threat activity clusters linked to China has been observed compromisin...

Shining a Light on Shadow Apps: The Invisible Gateway t...

Shadow apps, a segment of Shadow IT, are SaaS applications purchased without the...