Cyber Security

Microsoft tests instant access to Android photos in Windows 11

Microsoft plans to provide Windows 11 users with almost instant access to photos and screenshots they've taken on their Android smartphones. As the company explained...

When Security Measures Go Wrong

Jan 18, 2024The Hacker NewsAuthentication Security / Passwords In today's digital landscape, traditional password-only authentication systems have proven to be vulnerable to a wide...

Threat Actors Team Up for Post-Holiday Phishing Email Surge

Last week, two different threat actors teamed up to send thousands of post-holiday-break phishing emails destined for North American organizations.Other than volume, the...

Critical Ivanti auth bypass bug now actively exploited

CISA warns that a critical authentication bypass vulnerability in Ivanti's Endpoint Manager Mobile (EPMM) and MobileIron Core device management software (patched in August 2023)...

TensorFlow CI/CD Flaw Exposed Supply Chain to Poisoning Attacks

Jan 18, 2024NewsroomSupply Chain Attacks / AI Security Continuous integration and continuous delivery (CI/CD) misconfigurations discovered in the open-source TensorFlow machine learning framework could...

Russia’s ColdRiver APT Unleashes Custom ‘Spica’ Malware

The Russia-backed advanced persistent threat (APT) known as ColdRiver has taken a dive into the icy waters of custom malware, rolling out a...

Is Temu safe? What to know before you ‘shop like a billionaire’

Scams, Digital Security Here are some scams you may encounter on the...

TeamViewer abused to breach networks in new ransomware attacks

Ransomware actors are again using TeamViewer to gain initial access to organization endpoints and attempt to deploy encryptors based on the leaked LockBit...

New Docker Malware Steals CPU for Crypto & Drives Fake Website Traffic

Jan 18, 2024NewsroomServer Security / Cryptocurrency Vulnerable Docker services are being targeted by a novel campaign in which the threat actors are deploying XMRig...

Latest articles