H  January(103)  February(113)  March(175)  APRIL(74)  MAY(28)  JUNE(198)  July(423)  August(462)  September(389)  October(48)  November()  December()

DATE

NAME

CATEGORY

WEB

29.4.23CISA Warns of Critical Flaws in Illumina's DNA Sequencing InstrumentsICSThe Hacker News
29.4.23ChatGPT is Back in Italy After Addressing Data Privacy ConcernsBigBrothersThe Hacker News
28.4.23New Atomic macOS Malware Steals Keychain Passwords and Crypto WalletsAppleThe Hacker News
28.4.23Zyxel Firewall Devices Vulnerable to Remote Code Execution Attacks — Patch NowVulnerebilityThe Hacker News
28.4.23ViperSoftX InfoStealer Adopts Sophisticated Techniques to Avoid DetectionVirusThe Hacker News
28.4.23Attention Online Shoppers: Don't Be Fooled by Their Sleek, Modern Looks — It's Magecart!CyberCrimeThe Hacker News
28.4.23Tonto Team Uses Anti-Malware File to Launch Attacks on South Korean InstitutionsBigBrothersThe Hacker News
27.4.23Google Gets Court Order to Take Down CryptBot That Infected Over 670,000 ComputersVirusThe Hacker News
27.4.23Paperbug Attack: New Politically-Motivated Surveillance Campaign in TajikistanBigBrothersThe Hacker News
27.4.23LimeRAT Malware Analysis: Extracting the ConfigVirusThe Hacker News
27.4.23RTM Locker's First Linux Ransomware Strain Targeting NAS and ESXi HostsRansomwareThe Hacker News
27.4.23Microsoft Confirms PaperCut Servers Used to Deliver LockBit and Cl0p RansomwareRansomwareThe Hacker News
26.4.23Chinese Hackers Spotted Using Linux Variant of PingPull in Targeted CyberattacksHackingThe Hacker News
26.4.23Charming Kitten's New BellaCiao Malware Discovered in Multi-Country AttacksVirusThe Hacker News
26.4.23Chinese Hackers Using MgBot Malware to Target International NGOs in Mainland ChinaVirusThe Hacker News
26.4.23Apache Superset Vulnerability: Insecure Default Configuration Exposes Servers to RCE AttacksVulnerebilityThe Hacker News
26.4.23VMware Releases Critical Patches for Workstation and Fusion SoftwareVulnerebilityThe Hacker News
25.4.23New SLP Vulnerability Could Let Attackers Launch 2200x Powerful DDoS AttacksVulnerebilityThe Hacker News
25.4.23Iranian Hackers Launch Sophisticated Attacks Targeting Israel with PowerLess BackdoorBigBrothersThe Hacker News
25.4.23Lazarus Subgroup Targeting Apple Devices with New RustBucket macOS MalwareAPTThe Hacker News
25.4.23Google Cloud Introduces Security AI Workbench for Faster Threat Detection and AnalysisSecurityThe Hacker News
25.4.23Google Authenticator App Gets Cloud Backup Feature for TOTP CodesSecurityThe Hacker News
24.4.23Russian Hackers Tomiris Targeting Central Asia for Intelligence GatheringBigBrothersThe Hacker News
24.4.23Ransomware Hackers Using AuKill Tool to Disable EDR Software Using BYOVD AttackRansomwareThe Hacker News
24.4.23Hackers Exploit Outdated WordPress Plugin to Backdoor Thousands of WordPress SitesExploitThe Hacker News
24.4.23New All-in-One "EvilExtractor" Stealer for Windows Systems Surfaces on the Dark WebVirusThe Hacker News
24.4.23Russian Hackers Suspected in Ongoing Exploitation of Unpatched PaperCut ServersExploitThe Hacker News
22.4.23Lazarus X_TRADER Hack Impacts Critical Infrastructure Beyond 3CX BreachICSThe Hacker News
22.4.23CISA Adds 3 Actively Exploited Flaws to KEV Catalog, including Critical PaperCut BugExploitThe Hacker News
21.4.23Kubernetes RBAC Exploited in Large-Scale Campaign for Cryptocurrency MiningCryptocurrencyThe Hacker News
21.4.23GhostToken Flaw Could Let Attackers Hide Malicious Apps in Google Cloud PlatformVirusThe Hacker News
21.4.23N.K. Hackers Employ Matryoshka Doll-Style Cascading Supply Chain Attack on 3CXAttackThe Hacker News
21.4.23Cisco and VMware Release Security Updates to Patch Critical Flaws in their ProductsVulnerebilityThe Hacker News
20.4.23Two Critical Flaws Found in Alibaba Cloud's PostgreSQL DatabasesVulnerebilityThe Hacker News
20.4.23Lazarus Group Adds Linux Malware to Arsenal in Operation Dream JobVirusThe Hacker News
20.4.23Fortra Sheds Light on GoAnywhere MFT Zero-Day Exploit Used in Ransomware AttacksExploitThe Hacker News
20.4.23ChatGPT's Data Protection Blind Spots and How Security Teams Can Solve ThemSecurityThe Hacker News
20.4.23Daggerfly Cyberattack Campaign Hits African Telecom Services ProvidersAttackThe Hacker News
20.4.23NSO Group Used 3 Zero-Click iPhone Exploits Against Human Rights DefendersAppleThe Hacker News
19.4.23Google TAG Warns of Russian Hackers Conducting Phishing Attacks in UkraineBigBrothersThe Hacker News
19.4.23Blind Eagle Cyber Espionage Group Strikes Again: New Attack Chain UncoveredAttackThe Hacker News
19.4.23Google Chrome Hit by Second Zero-Day Attack - Urgent Patch Update ReleasedVulnerebilityThe Hacker News
19.4.23Pakistani Hackers Use Linux Malware Poseidon to Target Indian Government AgenciesBigBrothersThe Hacker News
19.4.23U.S. and U.K. Warn of Russian Hackers Exploiting Cisco Router Flaws for EspionageBigBrothersThe Hacker News
19.4.23Iranian Government-Backed Hackers Targeting U.S. Energy and Transit SystemsBigBrothersThe Hacker News
19.4.23Critical Flaws in vm2 JavaScript Library Can Lead to Remote Code ExecutionVulnerebilityThe Hacker News
18.4.23YouTube Videos Distributing Aurora Stealer Malware via Highly Evasive LoaderVirusThe Hacker News
18.4.23Goldoson Android Malware Infects Over 100 Million Google Play Store DownloadsAndroidThe Hacker News
18.4.23Iranian Hackers Using SimpleHelp Remote Support Software for Persistent AccessBigBrothersThe Hacker News
18.4.23LockBit Ransomware Now Targeting Apple macOS DevicesAppleThe Hacker News
17.4.23Israeli Spyware Vendor QuaDream to Shut Down Following Citizen Lab and Microsoft ExposeVirusThe Hacker News
17.4.23New QBot Banking Trojan Campaign Hijacks Business Emails to Spread MalwareVirusThe Hacker News
17.4.23FIN7 and Ex-Conti Cybercrime Gangs Join Forces in Domino Malware AttacksVirusThe Hacker News
17.4.23Google Uncovers APT41's Use of Open Source GC2 Tool to Target Media and Job SitesAPTThe Hacker News
17.4.23Vice Society Ransomware Using Stealthy PowerShell Tool for Data ExfiltrationRansomwareThe Hacker News
17.4.23New Zaraza Bot Credential-Stealer Sold on Telegram Targeting 38 Web BrowsersBotNetThe Hacker News
15.4.23Google Releases Urgent Chrome Update to Fix Actively Exploited Zero-Day VulnerabilityVulnerebilityThe Hacker News
14.4.23Russia-Linked Hackers Launches Espionage Attacks on Foreign Diplomatic EntitiesBigBrothersThe Hacker News
14.4.23Kodi Confirms Data Breach: 400K User Records and Private Messages StolenIncindentThe Hacker News
14.4.23Severe Android and Novi Survey Vulnerabilities Under Active ExploitationAndroidThe Hacker News
13.4.23RTM Locker: Emerging Cybercrime Group Targeting Businesses with RansomwareRansomwareThe Hacker News
13.4.23WhatsApp Introduces New Device Verification Feature to Prevent Account Takeover AttacksSocialThe Hacker News
13.4.23New Python-Based "Legion" Hacking Tool Emerges on TelegramHackingThe Hacker News
13.4.23Pakistan-based Transparent Tribe Hackers Targeting Indian Educational InstitutionsBigBrothersThe Hacker News
13.4.23Lazarus Hacker Group Evolves Tactics, Tools, and Targets in DeathNote CampaignAPTThe Hacker News
13.4.23ChatGPT Security: OpenAI's Bug Bounty Program Offers Up to $20,000 PrizesSecurityThe Hacker News
12.4.23Israel-based Spyware Firm QuaDream Targets High-Risk iPhones with Zero-Click ExploitVirusThe Hacker News
12.4.23Urgent: Microsoft Issues Patches for 97 Flaws, Including Active Ransomware ExploitVulnerebilityThe Hacker News
12.4.23North Korean Hackers Uncovered as Mastermind in 3CX Supply Chain AttackAttackThe Hacker News
11.4.23Newly Discovered "By-Design" Flaw in Microsoft Azure Could Expose Storage Accounts to HackersVulnerebilityThe Hacker News
11.4.23Cybercriminals Turn to Android Loaders on Dark Web to Evade Google Play SecurityAndroidThe Hacker News
11.4.23Cryptocurrency Stealer Malware Distributed via 13 NuGet PackagesCryptocurrencyThe Hacker News
10.4.23Estonian National Charged in U.S. for Acquiring Electronics and Metasploit Pro for Russian MilitaryBigBrothersThe Hacker News
10.4.23Hackers Flood NPM with Bogus Packages Causing a DoS AttackAttackThe Hacker News
10.4.23Over 1 Million WordPress Sites Infected by Balada Injector Malware CampaignVirusThe Hacker News
10.4.23CISA Warns of 5 Actively Exploited Security Flaws: Urgent Action RequiredExploitThe Hacker News
5.4.23Typhon Reborn Stealer Malware Resurfaces with Advanced Evasion TechniquesVirusThe Hacker News
4.4.23Rorschach Ransomware Emerges: Experts Warn of Advanced Evasion StrategiesRansomwareThe Hacker News
4.4.23New Rilide Malware Targeting Chromium-Based Browsers to Steal CryptocurrencyVirusThe Hacker News
4.4.23Arid Viper Hacking Group Using Upgraded Malware in Middle East Cyber AttacksAPTThe Hacker News
4.4.23Microsoft Tightens OneNote Security by Auto-Blocking 120 Risky File ExtensionsSafetyThe Hacker News
4.4.23Cryptocurrency Companies Targeted in Sophisticated 3CX Supply Chain AttackAttackThe Hacker News
4.4.23Western Digital Hit by Network Security Breach - Critical Services Disrupted!IncindentThe Hacker News
4.4.23Italian Watchdog Bans OpenAI's ChatGPT Over Data Protection ConcernsSecurityThe Hacker News
1.4.23Winter Vivern APT Targets European Government Entities with Zimbra VulnerabilityAPTThe Hacker News
1.4.23Hackers Exploiting WordPress Elementor Pro Vulnerability: Millions of Sites at Risk!VulnerebilityThe Hacker News
1.4.23Cacti, Realtek, and IBM Aspera Faspex Vulnerabilities Under Active ExploitationVulnerebilityThe Hacker News
1.4.23Microsoft Fixes New Azure AD Vulnerability Impacting Bing Search and Major AppsVulnerebilityThe Hacker News