Exploiting
-
MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws
Apr 22, 2024The Hacker NewsNetwork Security / Cybersecurity The MITRE Corporation revealed that it was the target of a nation-state…
Read More » -
“Highly capable” hackers root corporate networks by exploiting firewall 0-day
Highly capable hackers are rooting multiple corporate networks by exploiting a maximum-severity zero-day vulnerability in a firewall product from Palo…
Read More » -
Learn How to Stop Hackers from Exploiting Hidden Identity Weaknesses
Apr 10, 2024The Hacker NewsWebinar / Identity Security We all know passwords and firewalls are important, but what about the…
Read More » -
Researchers Identify Multiple China Hacker Groups Exploiting Ivanti Security Flaws
Apr 05, 2024NewsroomAdvanced Persistent Threat Multiple China-nexus threat actors have been linked to the zero-day exploitation of three security flaws…
Read More » -
TheMoon Botnet Resurfaces, Exploiting EoL Devices to Power Criminal Proxy
Mar 29, 2024NewsroomNetwork Security / IoT Security A botnet previously considered to be rendered inert has been observed enslaving end-of-life…
Read More » -
Hackers Exploiting Popular Document Publishing Sites for Phishing Attacks
Mar 19, 2024NewsroomEmail Security / Social Engineering Threat actors are leveraging digital document publishing (DDP) sites hosted on platforms like…
Read More » -
How Cybercriminals are Exploiting India’s UPI for Money Laundering Operations
Cybercriminals are using a network of hired money mules in India using an Android-based application to orchestrate a massive money…
Read More » -
GTPDOOR Linux Malware Targets Telecoms, Exploiting GPRS Roaming Networks
Feb 29, 2024NewsroomLinux / Network Security Threat hunters have discovered a new Linux malware called GTPDOOR that’s designed to be…
Read More » -
Chinese Hackers Exploiting Ivanti VPN Flaws to Deploy New Malware
At least two different suspected China-linked cyber espionage clusters, tracked as UNC5325 and UNC3886, have been attributed to the exploitation…
Read More »