News
October 2, 2024 • 1 min read • Hackernews
5 Must-Have Tools for Effective Dynamic Malware Analysis
Dynamic malware analysis is a key part of any threat investigation. It involves executing a sample of a malicious program in the isolated environment of a malware sandbox to monitor its behavior and gather actionable indicators. Effective analysis must be fast, in-depth, and precise. These five tools will help you
October 2, 2024 • 1 min read • Hackernews
Andariel Hacking Group Shifts Focus to Financial Attacks on US Organizations
Three different organizations in the U.S. were targeted in August 2024 by a North Korean state-sponsored threat actor called Andariel as part of a likely financially motivated attack. While the attackers didnt succeed in deploying ransomware on the networks of any of the organizations affected, it is likely that the attacks
October 2, 2024 • 4 min read • theVerge
Microsoft Office 2024 is now available for Macs and PCs
October 2, 2024 • 1 min read • Hackernews
Researchers Warn of Ongoing Attacks Exploiting Critical Zimbra Postjournal Flaw
Cybersecurity researchers are warning about active exploitation attempts targeting a newly disclosed security flaw in Synacors Zimbra Collaboration. Enterprise security firm Proofpoint said it began observing the activity starting September 28, 2024. The attacks seek to exploit CVE-2024-45519, a severe security flaw in Zimbras postjournal service that could enable unauthenticated attackers
October 2, 2024 • 1 min read • Hackernews
PyPI Repository Found Hosting Fake Crypto Wallet Recovery Tools That Steal User Data
A new set of malicious packages has been unearthed in the Python Package Index (PyPI) repository that masqueraded as cryptocurrency wallet recovery and management services, only to siphon sensitive data and facilitate the theft of valuable digital assets. The attack targeted users of Atomic, Trust Wallet, Metamask, Ronin, TronLink, Exodus, and
October 1, 2024 • 2 min read • theVerge
YouTube TV may soon let you keep listening even when you cant watch
October 1, 2024 • 1 min read • Hackernews
AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition
The threat actors behind the Rhadamanthys information stealer have added new advanced features to the malware, including using artificial intelligence (AI) for optical character recognition (OCR) as part of whats called Seed Phrase Image Recognition. This allows Rhadamanthys to extract cryptocurrency wallet seed phrases from images, making it a highly potent
October 1, 2024 • 3 min read • theVerge
Microsoft is discontinuing its HoloLens headsets
October 1, 2024 • 3 min read • theVerge
Pebblebees trackers now work on Apples or Googles networks
October 1, 2024 • 1 min read • theVerge
All the news on Microsofts latest Copilot and Windows AI features
October 1, 2024 • 6 min read • theVerge
Read Microsofts optimistic memo about the future of AI companions
October 1, 2024 • 7 min read • theVerge
Microsoft gives Copilot a voice and vision in its biggest redesign yet
October 1, 2024 • 4 min read • theVerge
Microsoft is using AI to improve Windows search
October 1, 2024 • 2 min read • theVerge
Microsoft Paint is getting Photoshop-like generative AI fill and erase features
October 1, 2024 • 4 min read • theVerge
Microsoft starts rolling out its Windows 11 2024 update with lots of useful improvements
October 1, 2024 • 4 min read • theVerge
Chromebooks are getting a new button dedicated to Googles AI
October 1, 2024 • 8 min read • theVerge
How Google tried to unravel the DOJs ad tech case
October 1, 2024 • 2 min read • theVerge
Serve is partnering with Wing to expand the range of its robot deliveries
October 1, 2024 • 1 min read • Hackernews
5 Actionable Steps to Prevent GenAI Data Leaks Without Fully Blocking AI Usage
Since its emergence, Generative AI has revolutionized enterprise productivity. GenAI tools enable faster and more effective software development, financial analysis, business planning, and customer engagement. However, this business agility comes with significant risks, particularly the potential for sensitive data leakage. As organizations attempt to balance productivity gains with security
October 1, 2024 • 1 min read • Hackernews
Free Sniper Dz Phishing Tools Fuel 140000 Cyber Attacks Targeting User Credentials
More than 140,000 phishing websites have been found linked to a phishing-as-a-service (PhaaS) platform named Sniper Dz over the past year, indicating that its being used by a large number of cybercriminals to conduct credential theft. For prospective phishers, Sniper Dz offers an online admin panel with a catalog of phishing
October 1, 2024 • 1 min read • Hackernews
New Cryptojacking Attack Targets Docker API to Create Malicious Swarm Botnet
Cybersecurity researchers have uncovered a new cryptojacking campaign targeting the Docker Engine API with the goal of co-opting the instances to join a malicious Docker Swarm controlled by the threat actor. This enabled the attackers to use Docker Swarms orchestration features for command-and-control (C2) purposes, Datadog researchers Matt Muir and Andy
October 1, 2024 • 1 min read • Hackernews
UK Hacker Charged in 375 Million Insider Trading Scheme Using Hacked Executive Emails
The U.S. Department of Justice (DoJ) has charged a 39-year-old U.K. national for perpetrating a hack-to-trade fraud scheme that netted him nearly $3.75 million in illegal profits. Robert Westbrook of London was arrested last week and is expected to be extradited to the U.S. to face charges related to securities fraud,
September 30, 2024 • 1 min read • theVerge
PlayStation Network is down knocking PS5 and PS4 gamers offline
September 30, 2024 • 17 min read • theVerge
The best smartwatches for Android
September 30, 2024 • 1 min read • theVerge
T-Mobile promises to try not to get hacked again
September 30, 2024 • 1 min read • theVerge
A PS5 update that screwed up game backgrounds was just a bug
September 30, 2024 • 1 min read • theVerge
Trumps crypto platform is now open to the public kind of
September 30, 2024 • 1 min read • theVerge
Is this Ankers first 140W wall charger with a screen
September 30, 2024 • 1 min read • theVerge
How Hurricane Helene became a monster storm
September 30, 2024 • 1 min read • theVerge
The best Android phones for everyone
September 30, 2024 • 2 min read • theVerge
YouTubes missing hits will come back now that it has a deal with SESAC
September 30, 2024 • 1 min read • theVerge
The Echo Hub smart home controller is down to a new all-time low price
September 30, 2024 • 2 min read • theVerge
Leaked Google Pixel 9A renders reveal a visor-free look
September 30, 2024 • 1 min read • Hackernews
THN Cybersecurity Recap Last Weeks Top Threats and Trends September 23-29
Hold onto your hats, folks, because the cybersecurity world is anything but quiet! Last week, we dodged a bullet when we discovered vulnerabilities in CUPS that couldve opened the door to remote attacks. Googles switch to Rust is paying off big time, slashing memory-related vulnerabilities in Android. But it wasnt all
September 30, 2024 • 1 min read • Hackernews
Critical Flaws in Tank Gauge Systems Expose Gas Stations to Remote Attacks
Critical security vulnerabilities have been disclosed in six different Automatic Tank Gauge (ATG) systems from five manufacturers that could expose them to remote attacks. These vulnerabilities pose significant real-world risks, as they could be exploited by malicious actors to cause widespread damage, including physical damage, environmental hazards, and economic losses, Bitsight
September 30, 2024 • 1 min read • Hackernews
Session Hijacking 20 The Latest Way That Attackers are Bypassing MFA
Attackers are increasingly turning to session hijacking to get around widespread MFA adoption. The data supports this, as 147,000 token replay attacks were detected by Microsoft in 2023, a 111% increase year-over-year (Microsoft). Attacks on session cookies now happen in the same order of magnitude as password-based attacks (Google). But session hijacking isn’t
September 30, 2024 • 7 min read • theVerge
Epic is suing Google again and now Samsung too
September 30, 2024 • 1 min read • Hackernews
A Hackers Era Why Microsoft 365 Protection Reigns Supreme
Imagine a sophisticated cyberattack cripples your organization’s most critical productivity and collaboration tool — the platform you rely on for daily operations. In the blink of an eye, hackers encrypt your emails, files, and crucial business data stored in Microsoft 365, holding it hostage using ransomware. Productivity grinds to a
September 30, 2024 • 1 min read • Hackernews
Meta Fined 91 Million for Storing Millions of Facebook and Instagram Passwords in Plaintext
The Irish Data Protection Commission (DPC) has fined Meta €91 million ($101.56 million) as part of a probe into a security lapse in March 2019, when the company disclosed that it had mistakenly stored users passwords in plaintext in its systems. The investigation, launched by the DPC the next month, found
September 29, 2024 • 1 min read • theVerge
California governor vetoes major AI safety bill
September 29, 2024 • 1 min read • theVerge
Marvel and DC lose SUPER HERO trademarks
September 29, 2024 • 1 min read • theVerge
Razer leans into haptics with a new gaming cushion and vibrating headphones
September 29, 2024 • 1 min read • theVerge
Spotify is back after a Sunday morning outage
September 29, 2024 • 1 min read • theVerge
Apple may release an iPad-like smart home display next year
September 29, 2024 • 1 min read • theVerge
The future of AI might look a lot like Twitter
September 29, 2024 • 1 min read • theVerge
The AR and VR headsets youll actually wear
September 28, 2024 • 1 min read • theVerge
YouTube pulls songs from Adele Nirvana and others due to SESAC dispute
September 28, 2024 • 1 min read • theVerge
Amazon may tap Brian Williams to host an election night special
September 28, 2024 • 2 min read • theVerge
Meta blocks links to the hacked JD Vance dossier on Threads Instagram and Facebook
September 28, 2024 • 3 min read • theVerge
Samsungs gorgeous Galaxy Book4 Edge has fallen to its lowest price to date