UK Police Arrests 17-Yr-Old Teen Hacker Believed to be Behind Uber Hack

0
A British 17-year-old teen has been detained recently (Thursday 22 September 2022) by the City of London Police in connection with recent cyberattacks that...

Hacker Behind Optus Breach Releases 10,200 Customer Records in Extortion Scheme

0
The Australian Federal Police (AFP) on Monday disclosed it's working to gather "crucial evidence" and that it's collaborating with overseas law enforcement authorities following...

WhatsApp 0-Day Bug Let Hackers Execute an Arbitary Code Remotely

0
WhatsApp silently fixed two critical zero-day vulnerabilities that affect both Android & iOS versions allowing attackers to execute an arbitrary code remotely. Facebook-owned messenger WhatsApp...

Researchers Warn of New Go-based Malware Targeting Windows and Linux Systems

0
A new, multi-functional Go-based malware dubbed Chaos has been rapidly growing in volume in recent months to ensnare a wide range of Windows, Linux,...

New MS Exchange Zero-Day RCE Bug Actively Exploited by Hackers

0
New zero-day bugs existing in Microsoft Exchange that are not disclosed yet publicly are being exploited by the threat actors in order to perform...

Swachh City Platform Suffers Data Breach Leaking 16 Million User Records

0
A threat actor by the name of LeakBase has shared a database containing personal information allegedly affecting 16 million users of Swachh City, an...

Microsoft Confirms 2 New Exchange Zero-Day Flaws Being Used in the Wild

0
Microsoft officially disclosed it investigating two zero-day security vulnerabilities impacting Exchange Server 2013, 2016, and 2019 following reports of in-the-wild exploitation. "The first vulnerability, identified...

RCE Bug in ZOHO Products Let Hackers Execute Arbitrary Code Remotely

0
CISA’s bug catalog has been updated with a new vulnerability related to Java deserialization, which has been exploited in the wild by malicious threat...

What Stricter Data Privacy Laws Mean for Your Cybersecurity Policies

0
Dec 09, 2022The Hacker NewsData Protection / Privacy For today's businesses data privacy is already a big headache, and with modern privacy laws expanding...

Should You Use a VPN for Online Security? 4 Types of Malware and How...

0
A VPN creates an encrypted tunnel between your device and the VPN server. All of your data transmissions are protected by the VPN’s encrypted...