Home News Hackers

Hackers

Find the latest hackers news and articles at TheCyberPost.com. Keep yourself up to date with the current hacker news. Learn more about security vulnerabilities and how to defend against them. Enjoy relevant articles dedicated to hacking and the latest attacks. Looking for the latest cybercrime hacks and arrests? Than The Cyber Post offers all the latest concurrent articles related to hackers, the darkweb and cybercrime. We offer daily hacking news from all over the world. TheCyberPost also offers cyber security courses for ethical hackers, penetration testers and IT security experts. Read about the latest internet hacking incidents.

How to Identify a Cyber Adversary: Standards of Proof

0
COMMENTARYPart one of a two-part article.In cybersecurity, attribution refers to identifying an adversary (not just the persona) likely responsible for malicious activity. It is typically derived from collating many...

BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks

0
Mar 11, 2024NewsroomRansomware / Vulnerability The threat actors behind the BianLian ransomware have been observed exploiting security flaws in JetBrains TeamCity software to conduct their extortion-only attacks. According to a new...

CISA Warns of Actively Exploited JetBrains TeamCity Vulnerability

0
Mar 08, 2024NewsroomVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting JetBrains TeamCity On-Premises software to its Known Exploited...

Russia-Sponsored Cyberattackers Infiltrate Microsoft’s Code Base

0
The Russian state-sponsored advanced persistent threat (APT) group known as Midnight Blizzard has nabbed Microsoft source code after accessing internal repositories and systems, as part of an ongoing series...

Hacked WordPress Sites Abusing Visitors’ Browsers for Distributed Brute-Force Attacks

0
Mar 07, 2024NewsroomVulnerability / Web Security Threat actors are conducting brute-force attacks against WordPress sites by leveraging malicious JavaScript injections, new findings from Sucuri reveal. The attacks, which take the form...

Linux Variants of Bifrost Trojan Evade Detection via Typosquatting

0
A 20-year-old Trojan resurfaced recently with new variants that target Linux and impersonate a trusted hosted domain to evade detection.Researchers from Palo Alto Networks spotted a new Linux variant...

Alert: GhostSec and Stormous Launch Joint Ransomware Attacks in Over 15 Countries

0
The cybercrime group called GhostSec has been linked to a Golang variant of a ransomware family called GhostLocker. "TheGhostSec and Stormous ransomware groups are jointly conducting double extortion ransomware attacks...

Exit Scam: BlackCat Ransomware Group Vanishes After $22 Million Payout

0
Mar 06, 2024NewsroomCyber Crime / Ransomware The threat actors behind the BlackCat ransomware have shut down their darknet website and likely pulled an exit scam after uploading a bogus law...

Spoofed Zoom, Google & Skype Meetings Spread Corporate RATs

0
A threat actor is creating fake Skype, Google Meet, and Zoom meetings, mimicking these popular collaboration applications to spread various commodity malware that can steal sensitive data from both...

GhostLocker 2.0 Haunts Businesses Across Middle East, Africa & Asia

0
Cybercriminals have developed an enhanced version of the infamous GhostLocker ransomware that they are deploying in attacks across the Middle East, Africa, and Asia.Two ransomware groups, GhostSec and Stormous,...
Error decoding the Instagram API json