Hackers
-
How to Identify and Combat It
Oct 25, 2023The Hacker NewsRansomware/ Malware Threat In today’s digital landscape, around 60% of corporate data now resides in the…
-
ALPHV Ransomware Cyberattack On CBS Eastern Europe
The ALPHV ransomware group, known for its audacious cyberattacks on various organizations, has claimed that they have added CBS Eastern…
-
The Danger of Forgotten Pixels on Websites: A New Case Study
Oct 26, 2023The Hacker NewsWeb Security / Data Protection While cyberattacks on websites receive much attention, there are often unaddressed…
-
6 most common types of software supply chain attacks explained
The illicit update contained a modified DLL file titled, Moserware.SecretSplitter.dll, a small part of which is shown below: In a…
-
Record-Breaking 100 Million RPS DDoS Attack Exploits HTTP/2 Rapid Reset Flaw
Oct 26, 2023NewsroomNetwork Security / Cyber Attack Cloudflare on Thursday said it mitigated thousands of hyper-volumetric HTTP distributed denial-of-service (DDoS)…
-
Researchers Uncover Wiretapping of XMPP-Based Instant Messaging Service
Oct 28, 2023NewsroomPrivacy / Data Security New findings have shed light on what’s said to be a lawful attempt to…
-
Actor Ryan Gosling Tops ‘Hacker Celebrity Hot List’
In the shadowy world of cybercrime, there seems to be a rather unexpected love affair blossoming, one that intertwines the…
-
Signal debunks online rumours of zero-day security vulnerability
Over the weekend rumours circulated on social networks of an unpatched security hole in the Signal messaging app that could…
-
Vacum Stealer Sold For 250 EUR To Steal ETH Tokens
A hacker forum user was found advertising Vacum Stealer, a malware that can transfer cryptocurrency from a user to the…
-
5 Key Learnings For Securing Businesses
Okta, a leading identity and access management provider, announced over the weekend that its systems suffered a security breach. Cyber…