All News
The Hacker News
The Hacker News
November 24, 2025
New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
Fluent Bit, deployed in billions of containers, has five new flaws enabling log tampering, remote code execution, and cloud takeover paths.
The Hacker News
November 24, 2025
Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft
Security vendors warn Sha1-Hulud has hijacked 25,000+ GitHub repos via npm packages, stealing cloud credentials or wiping dev home directori...
The Hacker News
November 24, 2025
⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More
Fortinet exploit, Chrome 0-Day, BadIIS malware, SaaS breach, and record DDoS — plus 15+ top stories shaping this week in cybersecurity.
The Hacker News
November 24, 2025
Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs
CrowdStrike shows Chinese AI DeepSeek-R1 quietly weakens code security when prompts mention Tibet, Uyghurs, or Falun Gong.
The Hacker News
November 24, 2025
Smarter Access, Better Protected Data, Faster Audits: Enhancing Your Insider Threat Defense
Real-time masking, agentless access, and full-motion monitoring enhance insider threat defense and audit readiness without IT overhead.
The Hacker News
November 24, 2025
ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access
ShadowPad malware is being delivered through an actively exploited WSUS vulnerability, granting attackers full system access.
The Hacker News
November 22, 2025
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
APT31 secretly targeted Russian IT from 2022–2025 using cloud services, social media commands, and CloudyLoader malware to steal sensitive d...
The Hacker News
November 22, 2025
Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
Matrix Push C2 abuses browser notifications for fileless, cross-platform phishing, while Velociraptor misuse rises after a Windows Server fl...
The Hacker News
November 22, 2025
CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability
CISA adds exploited Oracle Identity Manager CVSS 9.8 flaw to KEV catalog as agencies rush to patch zero-day attacks.
The Hacker News
November 21, 2025
Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation
Grafana fixes CVSS 10.0 SCIM flaw that enabled user impersonation and privilege escalation in versions 12.x.
The Hacker News
November 21, 2025
Google Adds AirDrop Compatibility to Quick Share With Rust-Hardened Security on Pixel 10
Google expands Quick Share with AirDrop support, boosts Android security, and blocks 115M fraud attempts in India.
The Hacker News
November 21, 2025
Why IT Admins Choose Samsung for Mobile Security
Curious how IT teams protect data without getting in the way? Here’s a quick read on how Samsung Galaxy and Knox Suite do it.
The Hacker News
November 21, 2025
APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains
APT24 and Autumn Dragon launch multi-year espionage campaigns using BADAUDIO, supply chain attacks, and new CVE-2025-8088 exploits.
The Hacker News
November 21, 2025
SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny
SEC drops its SolarWinds case after court rulings undercut key allegations tied to the 2020 APT29 hack.
The Hacker News
November 21, 2025
Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity
Salesforce and Gainsight probe OAuth abuse tied to ShinyHunters as apps are pulled and customers alerted.
The Hacker News
November 20, 2025
ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet
ShadowRay 2.0 exploits an unpatched Ray flaw to spread cryptomining and DDoS malware across exposed GPU clusters.
The Hacker News
November 20, 2025
Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows
Tsundere botnet spreads via MSI and PowerShell installers, using Ethereum-based C2 rotation and game-themed lures to target Windows users.
The Hacker News
November 20, 2025
ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves
Discover the latest edition packed with expert insights, tech trends, and strategic analysis across cybersecurity, AI, and innovation — all...
The Hacker News
November 20, 2025
CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat
CTM360 reports thousands of malicious URLs driving global WhatsApp account hijacking through session hijacking and social engineering.
The Hacker News
November 20, 2025
New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices
Android banking trojan Sturnus enables screen-decrypted chat capture, device takeover, and targeted European financial fraud.
The Hacker News
November 20, 2025
Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
Cyber operations by Iran-linked groups used AIS and CCTV intelligence to support real-world missile attacks, Amazon reports.
The Hacker News
November 20, 2025
TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign
TamperedChef spreads through fake installers and SEO abuse, delivering a persistent JavaScript backdoor across multiple sectors.
The Hacker News
November 19, 2025
Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)
Active exploitation targets 7-Zip CVE-2025-11001; patch 25.00 fixes symbolic link RCE flaws.
The Hacker News
November 19, 2025
Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices
Eternidade Stealer spreads via WhatsApp hijacking, using Python scripts and IMAP-driven C2 updates to target Brazilian users.
The Hacker News
November 19, 2025
WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide
Global Operation WrtHug exploits multiple ASUS WRT flaws to hijack tens of thousands of EoL routers.
The Hacker News
November 19, 2025
Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software
Granular application containment reduces overreach, blocks lateral movement, and cuts SOC alerts by up to 90%.
The Hacker News
November 19, 2025
EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates
PlushDaemon hijacks software updates using EdgeStepper to redirect DNS traffic and deploy SlowStepper malware.
The Hacker News
November 19, 2025
ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts
Second-order prompt injection exploits ServiceNow agent discovery, enabling unauthorized actions unless configurations and monitoring are ti...
The Hacker News
November 19, 2025
Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild
Fortinet warns of FortiWeb flaw CVE-2025-58034 exploited in the wild and issues urgent upgrade guidance.
The Hacker News
November 18, 2025
Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar
Sneaky 2FA adds BitB phishing and attackers exploit passkey flaws using rogue extensions and downgrade attacks.
The Hacker News
November 18, 2025
Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year
Meta expands WhatsApp security research, reveals $4M payouts, new proxy tool, and patched high-severity flaws.
The Hacker News
November 18, 2025
Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale
Learn how CyberArk experts help businesses secure multi-cloud access, reduce identity risks, and stay compliant.
The Hacker News
November 18, 2025
Researchers Detail Tuoni C2's Role in an Attempted 2025 Real-Estate Cyber Intrusion
Researchers reveal a failed 2025 attack using Tuoni C2, steganographic payloads, and Teams impersonation.
The Hacker News
November 18, 2025
Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks
UNC1549 uses phishing, third-party breaches, and custom backdoors to infiltrate aerospace, telecom, and defense networks.
The Hacker News
November 18, 2025
Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities
Unified identity security fabric integrates IAM, governance, and threat response to protect all identities.
The Hacker News
November 18, 2025
Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages
Malicious npm packages use Adspect cloaking to filter victims and deliver crypto-themed redirects.
The Hacker News
November 18, 2025
Microsoft Mitigates Record 5.72 Tbps DDoS Attack Driven by AISURU Botnet
Microsoft reports a record 5.72 Tbps AISURU DDoS attack as related IoT botnets continue evolving.
The Hacker News
November 18, 2025
Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability
Google patches two critical V8 flaws, including actively exploited CVE-2025-13223, urging immediate Chrome updates.
The Hacker News
November 17, 2025
New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT
ClickFix attacks deploy Amatera Stealer and NetSupport RAT through multi-stage phishing tactics across several campaigns.
The Hacker News
November 17, 2025
⚡ Weekly Recap: Fortinet Exploited, China's AI Hacks, PhaaS Empire Falls & More
Fortinet CVE exploited, China-linked AI attacks exposed, PhaaS platform dismantled, and fake crypto apps deploy RATs. Catch this week’s top...
The Hacker News
November 17, 2025
5 Reasons Why Attackers Are Phishing Over LinkedIn
Phishing shifts to LinkedIn and other non-email channels, enabling scalable attacks and high-impact enterprise breaches.
The Hacker News
November 17, 2025
Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT
Gh0st RAT spreads through Dragon Breath and large-scale impersonation campaigns using multi-stage loaders and evasive NSIS installers target...
The Hacker News
November 17, 2025
Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time
Google reports Rust cut Android memory bugs below 20% while improving speed, safety, and development reliability.
The Hacker News
November 17, 2025
The Problem With 'Trust but Verify' Is That We Don’t Verify
Persistent SaaS tokens, over-privileged apps, and recent breaches reveal critical verification gaps demanding continuous Zero Trust.
The Hacker News
November 15, 2025
RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
RondoDox targets unpatched XWiki servers via CVE-2025-24893, driving record exploitation surges in November.
The Hacker News
November 15, 2025
Five Plead Guilty in U.S. for Helping North Korean IT Workers Infiltrate 136 Companies
Five Plead Guilty in U.S. for Helping North Korean IT Workers Infiltrate 136 Companies | Read more hacking news on The Hacker News cybersecu...
The Hacker News
November 14, 2025
North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
North Korean hackers exploit JSON storage services to deploy malware in Contagious Interview attacks.
The Hacker News
November 14, 2025
Researchers Find Serious AI Bugs Exposing Meta, Nvidia, and Microsoft Inference Frameworks
Researchers reveal RCE flaws in AI inference engines and Cursor IDE from unsafe code reuse.
The Hacker News
November 14, 2025
Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets
Iran’s APT42 launches SpearSpecter campaign using TAMECAT malware, targeting defense and government officials.
The Hacker News
November 14, 2025
Ransomware's Fragmentation Reaches a Breaking Point While LockBit Returns
Ransomware hit record highs in Q3 2025 with 85 active groups and LockBit 5.0’s return.- 1
- 2
Showing 50 results of 56 — Page 1