Cyber Kingpin – BreachForums' Mastermind Finally Caught in New York!

The Hacker News Daily Updates
Newsletter
cover

THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter

Don't Let Cybercriminals Sneak in Through the Identity Perimeter: Get Actionable Solutions!

Download Now Sponsored
LATEST NEWS Mar 18, 2023

Chinese Hackers Exploit Fortinet Zero-Day Flaw for Cyber Espionage Attack

The zero-day exploitation of a now-patched medium-severity security flaw in the Fortinet FortiOS operating system has been linked to a suspected Chinese hacking group. Threat intelligence firm Mandiant, which made the attribution, said the activity cluster is part of a broader campaign designed to deploy backdoors onto Fortinet and VMware solutions and maintain persistent access to ...

Read More
Twitter Facebook LinkedIn

Pompompurin Unmasked: Infamous BreachForums Mastermind Arrested in New York

U.S. law enforcement authorities have arrested a New York man in connection with running the infamous BreachForums hacking forum under the online alias "Pompompurin." The development, first reported by Bloomberg Law, comes after News 12 Westchester, earlier this week, said that federal investigators "spent hours inside and outside of a home in Peekskill." "At one point, investigators were ...

Read More
Twitter Facebook LinkedIn

THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter

Think of the typical portrayal of a cyberattack. Bad guy pounding furiously on a keyboard, his eyes peeking out from under a dark hoodie. At long last, his efforts pay off and he hits the right combination of keys. "I'm in!" he shouts in triumph. Clearly, there are many problems with this scenario – and it's not just the hoodie. What's even more inaccurate is that most cyber attackers today ...

Read More
Twitter Facebook LinkedIn

LockBit 3.0 Ransomware: Inside the Cyberthreat That's Costing Millions

U.S. government agencies have released a joint cybersecurity advisory detailing the indicators of compromise (IoCs) and tactics, techniques, and procedures (TTPs) associated with the notorious LockBit 3.0 ransomware. "The LockBit 3.0 ransomware operations function as a Ransomware-as-a-Service (RaaS) model and is a continuation of previous versions of the ransomware, LockBit 2.0, and ...

Read More
Twitter Facebook LinkedIn

FakeCalls Vishing Malware Targets South Korean Users via Popular Financial Apps

An Android voice phishing (aka vishing) malware campaign known as FakeCalls has reared its head once again to target South Korean users under the guise of over 20 popular financial apps. "FakeCalls malware possesses the functionality of a Swiss army knife, able not only to conduct its primary aim but also to extract private data from the victim's device," cybersecurity firm Check Point ...

Read More
Twitter Facebook LinkedIn

New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks

A new Golang-based botnet dubbed HinataBot has been observed to leverage known flaws to compromise routers and servers and use them to stage distributed denial-of-service (DDoS) attacks. "The malware binaries appear to have been named by the malware author after a character from the popular anime series, Naruto, with file name structures such as 'Hinata--,'" Akamai said in ...

Read More
Twitter Facebook LinkedIn

A New Security Category Addresses Web-borne Threats

In the modern corporate IT environment, which relies on cloud connectivity, global connections and large volumes of data, the browser is now the most important work interface. The browser connects employees to managed resources, devices to the web, and the on-prem environment to the cloud one. Yet, and probably unsurprisingly, this browser prominence has significantly increased the number ...

Read More
Twitter Facebook LinkedIn

Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing Malware

Copycat websites for instant messaging apps like Telegram and WhatApp are being used to distribute trojanized versions and infect Android and Windows users with cryptocurrency clipper malware. "All of them are after victims' cryptocurrency funds, with several targeting cryptocurrency wallets," ESET researchers Lukáš Štefanko and Peter Strýček said in a new analysis. While the first instance ...

Read More
Twitter Facebook LinkedIn
cover

THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter

Don't Let Cybercriminals Sneak in Through the Identity Perimeter: Get Actionable Solutions!

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

Key phrases

Older messages

Attention Samsung Users! Google Uncovers 18 Alarming Security Flaws in Exynos Chips

Friday, March 17, 2023

The Hacker News Daily Updates Newsletter cover THN Webinar: Master the Six Phases of Incident Response React fast, respond smart: Master the six phases of Incident Response with Cynet's IR Leader!

Act Now: Microsoft's New Security Patches Address 80 Flaws — Two Under Active Attack!

Thursday, March 16, 2023

The Hacker News Daily Updates Newsletter cover SBOM and Connected Device Security When it comes to device firmware and connected device security, where does a manufacturer or buyer start? Here's

Hackers Exploit 3-Year-Old Vulnerability to Breach U.S. Federal Agency!

Thursday, March 16, 2023

The Hacker News Daily Updates Newsletter cover THN Webinar: Master the Six Phases of Incident Response React fast, respond smart: Master the six phases of Incident Response with Cynet's IR Leader!

Fake ChatGPT Chrome Extension Hijacking Facebook Accounts for Malicious Advertising

Tuesday, March 14, 2023

The Hacker News Daily Updates Newsletter cover THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps Don't be a victim of 3rd-Party SaaS App breaches - Learn how to protect your business!

Warning: Xenomorph Android Banking Trojan is Back and Stronger Than Ever!

Monday, March 13, 2023

The Hacker News Daily Updates Newsletter cover 2022 Elastic Global Threat Report Vol.1 2022 Download Now Sponsored LATEST NEWS Mar 13, 2023 Warning: AI-generated YouTube Video Tutorials Spreading

You Might Also Like

Tesla layoffs 🚗, OpenAI Batch API 🤖, tech jobs leaving California 💼

Tuesday, April 16, 2024

Tesla plans to lay off more than 10% of its global workforce Sign Up |View Online TLDR Together With Camunda TLDR 2024-04-16 📔 Process Orchestration for Technical Leaders (Sponsor) Automation is high

Introducing our new mobile app! 🥁📱

Tuesday, April 16, 2024

Inside: a major new mobile update and a limited edition giveaway 🎁 Get it on Google Play Get it on Google Play Add to Home Screen Add to Home Screen Giveaway! 🎁 When we launch things, we like to

BetterDev #256 - How to write a code formatter and a search engine in 80 lines of Python

Tuesday, April 16, 2024

Better Dev #256 Apr 15, 2024 Hi all, We come back with a new issue this week. If you like BetterDev, please help spead word out by refer to your friends. Buy Me a coffee would be great too. This issue

New Blogs on ThomasMaurer.ch for 04/16/2024

Tuesday, April 16, 2024

View this email in your browser Thomas Maurer Cloud & Datacenter Update This is the update for blog posts on ThomasMaurer.ch. Automate on-premises Windows Server from the cloud using Azure Arc By

April TC39 meeting; Rspack v0.6; future of JS packages; Evan You on Vue, Vite, etc.

Tuesday, April 16, 2024

We have 7 links for you - Stay up-to-date on JavaScript and tools This Week In React - Keeps senior React devs up to date thisweekinreact.com Partner We keep over 37k mid/senior React devs up-to-date

Ingesting & Using CAD Data for Real-Time 3D

Tuesday, April 16, 2024

How engineering firms leverage real-time 3D technology View this email in your browser engineering.com White Paper - Ingesting and Using CAD Data for Real-Time 3D Ingesting and Using CAD Data for Real-

It’s Easy. But Is It Easy Enough? 🤓

Monday, April 15, 2024

Is self-hosting still too hard for normal people? Here's a version for your browser. Hunting for the end of the long tail • April 15, 2024 It's Easy. But Is It Easy Enough? Self-hosted apps are

Re: Free Class: Master the Notes app

Monday, April 15, 2024

Hi there, We are holding a Free Notes App Class tomorrow (Wednesday, April 17) at 4:30 pm ET! We do expect this class to fill up so register soon to save your spot! I wanted to take a minute to answer

Two Tesla execs leave amid layoffs

Monday, April 15, 2024

Tesla execs bid adieu View this email online in your browser By Christine Hall Monday, April 15, 2024 Welcome back to TechCrunch PM, where you can find me each day bringing you the most important

🍏 Why You Should Buy the MacBook Air Over the Pro — Thrift Stores Are a Goldmine for Geeks

Monday, April 15, 2024

Also: How to Play Epic Game Titles on the Steam Deck, and More! How-To Geek Logo April 15, 2024 📩 Get expert reviews, the hottest deals, how-to's, breaking news, and more delivered directly to your