From Misuse to Abuse: AI Risks and Attacks
Oct 16, 2024The Hacker NewsArtificial Intelligence / Cybercrime AI from the attacker's…
New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT
Oct 15, 2024Ravie LakshmananMalware / Cybercrime Cybersecurity researchers have disclosed a new…
TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns
Oct 15, 2024Ravie LakshmananMobile Security / Financial Fraud New variants of an…
China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns
China's National Computer Virus Emergency Response Center (CVERC) has doubled down on…
5 Steps to Boost Detection and Response in a Multi-Layered Cloud
Oct 14, 2024The Hacker NewsCloud Security / Vulnerability The link between detection…
Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration
Oct 14, 2024Ravie LakshmananNetwork Security / Vulnerability A suspected nation-state adversary has…
Cybercriminals Use Unicode to Hide Mongolian Skimmer in E-Commerce Platforms
Oct 10, 2024Ravie LakshmananCybercrime / Malware Cybersecurity researchers have shed light on…
Experts Warn of Critical Unpatched Vulnerability in Linear eMerge E3 Systems
Oct 10, 2024Ravie LakshmananVulnerability / Enterprise Security Cybersecurity researchers are warning about…
OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf
Oct 13, 2024Ravie Lakshmanan The Iranian threat actor known as OilRig has…


