H  January(103)  February(113)  March(175)  APRIL(74)  MAY(28)  JUNE(198)  July(423)  August(462)  September(389)  October(48)  November()  December()

DATE

NAME

CATEGORY

WEB

6.5.23Dragon Breath APT Group Using Double-Clean-App Technique to Target Gambling IndustryAPTThe Hacker News
6.5.23New Vulnerability in Popular WordPress Plugin Exposes Over 2 Million Sites to CyberattacksVulnerebilityThe Hacker News
5.5.23New Android Malware 'FluHorse' Targeting East Asian Markets with Deceptive TacticsAndroidThe Hacker News
5.5.23Hackers Targeting Italian Corporate Banking Clients with New Web-Inject Toolkit DrIBANVirusThe Hacker News
5.5.23N. Korean Kimsuky Hackers Using New Recon Tool ReconShark in Latest CyberattacksVirusThe Hacker News
5.5.23Packagist Repository Hacked: Over a Dozen PHP Packages with 500 Million Installs CompromisedHackingThe Hacker News
5.5.23Fleckpe Android Malware Sneaks onto Google Play Store with Over 620,000 DownloadsAndroidThe Hacker News
5.5.23Cisco Warns of Vulnerability in Popular Phone Adapter, Urges Migration to Newer ModelVulnerebilityThe Hacker News
4.5.23Researchers Discover 3 Vulnerabilities in Microsoft Azure API Management ServiceVulnerebilityThe Hacker News
4.5.23Researchers Uncover New Exploit for PaperCut Vulnerability That Can Bypass DetectionExploitThe Hacker News
4.5.23Meta Uncovers Massive Social Media Cyber Espionage Operations Across South AsiaCyberThe Hacker News
4.5.23Meta Takes Down Malware Campaign That Used ChatGPT as a Lure to Steal AccountsVirusThe Hacker News
3.5.23Google Introduces Passwordless Secure Sign-In with Passkeys for Google AccountsSecurityThe Hacker News
3.5.23Chinese Hacker Group Earth Longzhi Resurfaces with Advanced Malware TacticsVirusThe Hacker News
3.5.23Operation SpecTor: $53.4 Million Seized, 288 Vendors Arrested in Dark Web Drug BustCrimeThe Hacker News
3.5.23Apple and Google Join Forces to Stop Unauthorized Location-Tracking DevicesAppleThe Hacker News
3.5.23Hackers Exploiting 5-year-old Unpatched Vulnerability in TBK DVR DevicesVulnerebilityThe Hacker News
3.5.23CISA Issues Advisory on Critical RCE Affecting ME RTU Remote Terminal UnitsVulnerebilityThe Hacker News
2.5.23Researchers Uncover New BGP Flaws in Popular Internet Routing Protocol SoftwareVulnerebilityThe Hacker News
2.5.23BouldSpy Android Spyware: Iranian Government's Alleged Tool for Spying on Minority GroupsAndroidThe Hacker News
2.5.23LOBSHOT: A Stealthy, Financial Trojan and Info Stealer Delivered through Google AdsVirusThe Hacker News
2.5.23North Korea's ScarCruft Deploys RokRAT Malware via LNK File Infection ChainsVirusThe Hacker News
2.5.23Alert: Active Exploitation of TP-Link, Apache, and Oracle Vulnerabilities DetectedExploitThe Hacker News
1.5.23New Decoy Dog Malware Toolkit Uncovered: Targeting Enterprise NetworksVirusThe Hacker News
1.5.23Wanted Dead or Alive: Real-Time Protection Against Lateral MovementSecurityThe Hacker News
1.5.23Vietnamese Threat Actor Infects 500,000 Devices Using 'Malverposting' TacticsVirusThe Hacker News
1.5.23APT28 Targets Ukrainian Government Entities with Fake "Windows Update" EmailsAPTThe Hacker News
1.5.23Google Blocks 1.43 Million Malicious Apps, Bans 173,000 Bad Accounts in 2022AndroidThe Hacker News