The Hacker News Logo
Subscribe to Newsletter

The Hacker News - Cybersecurity News and Analysis: Cyber Attack

New Malware Family Uses Custom UDP Protocol for C&C Communications

New Malware Family Uses Custom UDP Protocol for C&C Communications

June 26, 2018Wang Wei
Security researchers have uncovered a new highly-targeted cyber espionage campaign, which is believed to be associated with a hacking gr...
OpenBSD Disables Intel Hyper-Threading to Prevent Spectre-Class Attacks

OpenBSD Disables Intel Hyper-Threading to Prevent Spectre-Class Attacks

June 20, 2018Swati Khandelwal
Security-oriented BSD operating system OpenBSD has decided to disable support for Intel's hyper-threading performance-boosting featur...
Email Phishers Using A Simple Way to Bypass MS Office 365 Protection

Email Phishers Using A Simple Way to Bypass MS Office 365 Protection

June 19, 2018Swati Khandelwal
Security researchers have been warning about a simple technique that cyber criminals and email scammers are using in the wild to bypass m...
Hackers Who Hit Winter Olympics 2018 Are Still Alive and Kicking

Hackers Who Hit Winter Olympics 2018 Are Still Alive and Kicking

June 19, 2018Swati Khandelwal
Remember the ' Olympic Destroyer ' cyber attack? The group behind it is still alive, kicking and has now been found targeting b...
Ex-CIA employee charged with leaking 'Vault 7' hacking tools to Wikileaks

Ex-CIA employee charged with leaking 'Vault 7' hacking tools to Wikileaks

June 19, 2018Mohit Kumar
A 29-year-old former CIA computer programmer who was charged with possession of child pornography last year has now been charged with mas...
Chinese Hackers Carried Out Country-Level Watering Hole Attack

Chinese Hackers Carried Out Country-Level Watering Hole Attack

June 14, 2018Swati Khandelwal
Cybersecurity researchers have uncovered an espionage campaign that has targeted a national data center of an unnamed central Asian country ...
A New Paradigm For Cyber Threat Hunting

A New Paradigm For Cyber Threat Hunting

June 11, 2018Mohit Kumar
It's no secret that expecting security controls to block every infection vector is unrealistic. For most organizations, the chances are v...
Hackers Stole Over $20 Million in Ethereum from Insecurely Configured Clients

Hackers Stole Over $20 Million in Ethereum from Insecurely Configured Clients

June 11, 2018Wang Wei
Security researchers have been warning about cybercriminals who have made over 20 million dollars in just past few months by hijacking in...
Adobe Issues Patch for Actively Exploited Flash Player Zero-Day Exploit

Adobe Issues Patch for Actively Exploited Flash Player Zero-Day Exploit

June 07, 2018Mohit Kumar
If you have already uninstalled Flash player, well done! But if you haven't, here's another great reason for ditching it. Adobe...
Prowli Malware Targeting Servers, Routers, and IoT Devices

Prowli Malware Targeting Servers, Routers, and IoT Devices

June 07, 2018Swati Khandelwal
After the discovery of massive VPNFilter malware botnet , security researchers have now uncovered another giant botnet that has already ...
Over 115,000 Drupal Sites Still Vulnerable to Drupalgeddon2 Exploit

Over 115,000 Drupal Sites Still Vulnerable to Drupalgeddon2 Exploit

June 05, 2018Swati Khandelwal
Hundreds of thousands of websites running on the Drupal CMS—including those of major educational institutions and government organization...
75% of the 'Left to Get Hacked' Redis Servers Found Infected

75% of the 'Left to Get Hacked' Redis Servers Found Infected

June 04, 2018Wang Wei
Despite the continual emergence of new cyber attacks because of misconfigured servers and applications, people continue to ignore securit...
FBI issues alert over two new malware linked to Hidden Cobra hackers

FBI issues alert over two new malware linked to Hidden Cobra hackers

May 30, 2018Swati Khandelwal
The US-CERT has released a joint technical alert from the DHS and the FBI, warning about two newly identified malware being used by the p...
FBI seizes control of a massive botnet that infected over 500,000 routers

FBI seizes control of a massive botnet that infected over 500,000 routers

May 24, 2018Swati Khandelwal
Shortly after Cisco's released its early report on a large-scale hacking campaign that infected over half a million routers and netwo...
Researchers unearth a huge botnet army of 500,000 hacked routers

Researchers unearth a huge botnet army of 500,000 hacked routers

May 23, 2018Swati Khandelwal
More than half a million routers and storage devices in dozens of countries have been infected with a piece of highly sophisticated IoT b...
DNS-Hijacking Malware Targeting iOS, Android and Desktop Users Worldwide

DNS-Hijacking Malware Targeting iOS, Android and Desktop Users Worldwide

May 21, 2018Swati Khandelwal
Widespread routers' DNS hijacking malware that recently found targeting Android devices has now been upgraded its capabilities to tar...
Nethammer—Exploiting DRAM Rowhammer Bug Through Network Requests

Nethammer—Exploiting DRAM Rowhammer Bug Through Network Requests

May 17, 2018Swati Khandelwal
Last week, we reported about the first network-based remote Rowhammer attack, dubbed Throwhammer , which involves the exploitation a know...
Here's How eFail Attack Works Against PGP and S/MIME Encrypted Emails

Here's How eFail Attack Works Against PGP and S/MIME Encrypted Emails

May 14, 2018Swati Khandelwal
With a heavy heart, security researchers have early released the details of a set of vulnerabilities discovered in email clients for two ...
Exclusive Deals

Cybersecurity Newsletter — Stay Informed

Sign up for cybersecurity newsletter and get latest news updates delivered straight to your inbox daily.