ARTICLES  HOME  MARCHLIST ARTICLES 2023 HOME  January(103February(113March(175)  APRIL(101)  MAY(28)  June()


HOME  Android  Apple  APT  Attack  BigBrothers  BotNet  Crime  Cryptocurrency  Cyber  CyberCrime  Exploit  Hacking  ICS  Incindent  IoT  Mobil  OS  Phishing  Ransomware  Safety  Security  Social  Spam  Virus  Vulnerebility


DATE

NAME

CATEGORY

SUBCATEGORIES

WEB

8.5.23CERT-UA Warns of SmokeLoader and RoarBAT Malware Attacks Against UkraineThe Hacker News
6.5.23Dragon Breath APT Group Using Double-Clean-App Technique to Target Gambling IndustryAPTAPTThe Hacker News
6.5.23New Vulnerability in Popular WordPress Plugin Exposes Over 2 Million Sites to CyberattacksVulnerebilityVulnerebilityThe Hacker News
5.5.23New Android Malware 'FluHorse' Targeting East Asian Markets with Deceptive TacticsAndroidAndroidThe Hacker News
5.5.23Hackers Targeting Italian Corporate Banking Clients with New Web-Inject Toolkit DrIBANVirusVirusThe Hacker News
5.5.23N. Korean Kimsuky Hackers Using New Recon Tool ReconShark in Latest CyberattacksVirusVirusThe Hacker News
5.5.23Packagist Repository Hacked: Over a Dozen PHP Packages with 500 Million Installs CompromisedHackingHackingThe Hacker News
5.5.23Fleckpe Android Malware Sneaks onto Google Play Store with Over 620,000 DownloadsAndroidAndroidThe Hacker News
5.5.23Cisco Warns of Vulnerability in Popular Phone Adapter, Urges Migration to Newer ModelVulnerebilityVulnerebilityThe Hacker News
4.5.23Researchers Discover 3 Vulnerabilities in Microsoft Azure API Management ServiceVulnerebilityVulnerebilityThe Hacker News
4.5.23Researchers Uncover New Exploit for PaperCut Vulnerability That Can Bypass DetectionExploitExploitThe Hacker News
4.5.23Meta Uncovers Massive Social Media Cyber Espionage Operations Across South AsiaCyberCyberThe Hacker News
4.5.23Meta Takes Down Malware Campaign That Used ChatGPT as a Lure to Steal AccountsVirusVirusThe Hacker News
3.5.23Google Introduces Passwordless Secure Sign-In with Passkeys for Google AccountsSecuritySecurityThe Hacker News
3.5.23Chinese Hacker Group Earth Longzhi Resurfaces with Advanced Malware TacticsVirusVirusThe Hacker News
3.5.23Operation SpecTor: $53.4 Million Seized, 288 Vendors Arrested in Dark Web Drug BustCrimeCrimeThe Hacker News
3.5.23Apple and Google Join Forces to Stop Unauthorized Location-Tracking DevicesAppleAppleThe Hacker News
3.5.23Hackers Exploiting 5-year-old Unpatched Vulnerability in TBK DVR DevicesVulnerebilityVulnerebilityThe Hacker News
3.5.23CISA Issues Advisory on Critical RCE Affecting ME RTU Remote Terminal UnitsVulnerebilityVulnerebilityThe Hacker News
2.5.23Researchers Uncover New BGP Flaws in Popular Internet Routing Protocol SoftwareVulnerebilityVulnerebilityThe Hacker News
2.5.23BouldSpy Android Spyware: Iranian Government's Alleged Tool for Spying on Minority GroupsAndroidAndroidThe Hacker News
2.5.23LOBSHOT: A Stealthy, Financial Trojan and Info Stealer Delivered through Google AdsVirusVirusThe Hacker News
2.5.23North Korea's ScarCruft Deploys RokRAT Malware via LNK File Infection ChainsVirusVirusThe Hacker News
2.5.23Alert: Active Exploitation of TP-Link, Apache, and Oracle Vulnerabilities DetectedExploitExploitThe Hacker News
1.5.23New Decoy Dog Malware Toolkit Uncovered: Targeting Enterprise NetworksVirusVirusThe Hacker News
1.5.23Wanted Dead or Alive: Real-Time Protection Against Lateral MovementSecuritySecurityThe Hacker News
1.5.23Vietnamese Threat Actor Infects 500,000 Devices Using 'Malverposting' TacticsVirusVirusThe Hacker News
1.5.23APT28 Targets Ukrainian Government Entities with Fake "Windows Update" EmailsAPTAPTThe Hacker News
1.5.23Google Blocks 1.43 Million Malicious Apps, Bans 173,000 Bad Accounts in 2022AndroidAndroidThe Hacker News