Category Security

CISA and FBI Warn Against Buffer Overflow Vulnerabilities

A new alert from the US Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) has outlined strategies to eliminate buffer overflow vulnerabilities in software. Part of the Secure by Design Alert series, the report published on…

Romance Baiting Losses Surge 40% Annually

Losses to romance baiting, or pig butchering, scams increased 40% year-on-year (YoY) in 2024 to comprise a third of total crypto fraud revenue, according to Chainalysis. A day before Valentine’s Day, the blockchain analytics company revealed the darker side of…

Astaroth Phishing Kit Bypasses 2FA Using Reverse Proxy Techniques

A sophisticated new phishing tool dubbed “Astaroth” has emerged on cybercrime platforms, boasting advanced methods to bypass two-factor authentication (2FA). First advertised in January 2025, the kit employs session hijacking and real-time credential interception to compromise accounts on Gmail, Yahoo,…

Watch this Learn to Sync Dev and Sec Teams

Feb 13, 2025The Hacker NewsApplication Security / DevOps Ever felt like your team is stuck in a constant battle? Developers rush to add new features, while security folks worry about vulnerabilities. What if you could bring both sides together without…

North Korea Targets Crypto Devs Through NPM Packages

Researchers have uncovered a highly sophisticated North Korean campaign to covertly distribute crypto-stealing malware via open source components. SecurityScorecard said in a blog post published this morning that it suspects the infamous Lazarus Group of being behind the live campaign,…