- New HTTP/2 'MadeYouReset' Vulnerability Enables Large-Scale DoS Attacksby info@thehackernews.com (The Hacker News) on 14/08/2025 at 15:20
Multiple HTTP/2 implementations have been found susceptible to a new attack technique called MadeYouReset that could be explored to conduct powerful denial-of-service (DoS) attacks. "MadeYouReset bypasses the typical server-imposed limit of 100 concurrent HTTP/2 requests per TCP connection from a client. This limit is intended to mitigate DoS attacks by restricting the number of simultaneous
- Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOSby info@thehackernews.com (The Hacker News) on 14/08/2025 at 13:16
Japan's CERT coordination center (JPCERT/CC) on Thursday revealed it observed incidents that involved the use of a command-and-control (C2) framework called CrossC2, which is designed to extend the functionality of Cobalt Strike to other platforms like Linux and Apple macOS for cross-platform system control. The agency said the activity was detected between September and December 2024, targeting
- Have You Turned Off Your Virtual Oven?by info@thehackernews.com (The Hacker News) on 14/08/2025 at 11:25
You check that the windows are shut before leaving home. Return to the kitchen to verify that the oven and stove were definitely turned off. Maybe even circle back again to confirm the front door was properly closed. These automatic safety checks give you peace of mind because you know the unlikely but potentially dangerous consequences of forgetting – a break-in, fire, or worse. Your
- New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploitsby info@thehackernews.com (The Hacker News) on 14/08/2025 at 11:06
Cybersecurity researchers have disclosed a new Android trojan called PhantomCard that abuses near-field communication (NFC) to conduct relay attacks for facilitating fraudulent transactions in attacks targeting banking customers in Brazil. "PhantomCard relays NFC data from a victim's banking card to the fraudster's device," ThreatFabric said in a report. "PhantomCard is based on
- Simple Steps for Attack Surface Reductionby info@thehackernews.com (The Hacker News) on 14/08/2025 at 09:30
Story teaser text: Cybersecurity leaders face mounting pressure to stop attacks before they start, and the best defense may come down to the settings you choose on day one. In this piece, Yuriy Tsibere explores how default policies like deny-by-default, MFA enforcement, and application Ringfencing ™ can eliminate entire categories of risk. From disabling Office macros to blocking outbound server