All News
The Hacker News

The Hacker News
April 26, 2025
ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion
ToyMaker deploys LAGTOY malware to steal credentials and sell access to CACTUS ransomware groups for double extortion.
The Hacker News
April 25, 2025
North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures
North Korean hackers use fake crypto firms and job interview lures to spread cross-platform malware targeting IT professionals globally.
The Hacker News
April 25, 2025
SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers
Threat actors exploit SAP NetWeaver flaw + zero-day suspected + CVE-2025-31324 enables file uploads.
The Hacker News
April 25, 2025
Why NHIs Are Security's Most Dangerous Blind Spot
23.7M secrets leaked in 2024 + 70% still valid from 2022 expose risks from unmanaged machine identities.
The Hacker News
April 25, 2025
Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers
CVE-2025-27610 allows unauthenticated access to sensitive files in Rack Ruby apps due to root misconfig.
The Hacker News
April 25, 2025
DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks
CVE-2025-0282 exploited by Chinese threat actors + DslogdRAT malware installs + 9X ICS scans spike
The Hacker News
April 24, 2025
Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Zero-Day and ThreatNeedle Malware
Lazarus exploited zero-days in South Korean software, targeting 6 firms with ThreatNeedle and more.
The Hacker News
April 24, 2025
Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools
ARMO shows io_uring-based rootkits evade Falco, Tetragon, and Defender, risking Linux runtime security.
The Hacker News
April 24, 2025
Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals
Darcula adds GenAI tools + Lowers phishing skills barrier + 25,000 scam pages taken down.
The Hacker News
April 24, 2025
Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network Redesign
71% of healthcare attacks involve ransomware + 11-day downtime + HIPAA mandates segmentation + Zero Trust critical.
The Hacker News
April 24, 2025
Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotely
Commvault flaw CVE-2025-34028 enables pre-auth SSRF leading to code execution; fix in 11.38.20+ versions.
The Hacker News
April 24, 2025
159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure
159 CVEs exploited in Q1 2025 + 28.3% within 1 day + Exploits drive 20% of breaches.
The Hacker News
April 24, 2025
WhatsApp Adds Advanced Chat Privacy to Blocks Chat Exports and Auto-Downloads
WhatsApp adds chat export block for privacy + Meta fined €200M by EU for illegal ad consent model.
The Hacker News
April 23, 2025
DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack
DPRK hackers stole $137M in 2023 from TRON users via phishing, fueling nuclear programs and cyberattacks.
The Hacker News
April 23, 2025
Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign
UNC2428 used fake Israeli defense job ads in Oct 2024 to deploy MURKYTOUR malware, says Mandiant.
The Hacker News
April 23, 2025
Android Spyware Disguised as Alpine Quest App Targets Russian Military Devices
Android spyware hidden in Alpine Quest targets Russian military, stealing files and locations via Telegram.
The Hacker News
April 23, 2025
Three Reasons Why the Browser is Best for Stopping Phishing Attacks
Phishing now causes most breaches + MFA kits bypass detection + browser-based tools offer real-time defense.
The Hacker News
April 23, 2025
Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp
Russian threat actors exploit Microsoft OAuth since March 2025 + Target Ukraine allies + Steal 365 access.
The Hacker News
April 23, 2025
Ripple's xrpl.js npm Package Backdoored to Steal Private Keys in Major Supply Chain Attack
Ripple’s xrpl.js npm package backdoored on April 21, exposing 135K users’ private keys to attackers.
The Hacker News
April 23, 2025
Google Drops Cookie Prompt in Chrome, Adds IP Protection to Incognito
Google scraps new third-party cookie prompt in Chrome + boosts Incognito protections + DOJ eyes Chrome breakup.
The Hacker News
April 22, 2025
Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals
Docker malware fakes Teneo node heartbeats to earn crypto + 63-layer obfuscation hides the code.
The Hacker News
April 22, 2025
GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages
GCP’s ConfusedComposer flaw let attackers escalate privileges via PyPI packages; patched by Google on April 13.
The Hacker News
April 22, 2025
5 Major Concerns With Employees Using The Browser
70% of malware attacks now target unmonitored browsers + Legacy tools fail + Enterprises must evolve.
The Hacker News
April 22, 2025
Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials
Phishers abused Google Sites and DKIM replay to send valid-signed emails, bypassing filters and stealing credentials.
The Hacker News
April 22, 2025
Microsoft Secures MSA Signing with Azure Confidential VMs Following Storm-0558 Breach
Microsoft secures MSA and Entra ID with Azure Confidential VMs + HSM, preventing token forgery and reducing breach risks.
The Hacker News
April 22, 2025
Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware
Lotus Panda breached 6 Southeast Asian organizations using custom tools, browser stealers, and sideloaded malware.
The Hacker News
April 21, 2025
Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan
Kimsuky exploited CVE-2019-0708 and CVE-2017-11882 since Oct 2023 to target 15 countries.
The Hacker News
April 21, 2025
SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks
SuperCard X malware exploits NFC relay and social engineering to steal card data in Italy, enabling ATM fraud.
The Hacker News
April 21, 2025
5 Reasons Device Management Isn't Device Trust
Device management tools miss unmanaged devices and OS gaps—device trust closes them for safer access.
The Hacker News
April 21, 2025
⚡ THN Weekly Recap: iOS Zero-Days, 4Chan Breach, NTLM Exploits, WhatsApp Spyware & More
From zero-click iOS exploits to NTLM credential leaks and the 4Chan breach — this week’s cyber threats hit where trust runs deepest.
The Hacker News
April 21, 2025
Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery
Proton66-hosted IPs launched global cyberattacks since Jan 8, 2025, exploiting critical CVEs to deploy malware.
The Hacker News
April 21, 2025
How AI and IoT are Supercharging the DDoS Threat
DDoS attacks surge in 2024 due to IoT growth and AI-enhanced botnets, exposing misconfigured defenses.
The Hacker News
April 20, 2025
APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures
APT29 deployed GRAPELOADER to target European diplomats in early 2025, enhancing stealth and persistence.
The Hacker News
April 19, 2025
Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems
3 fake npm packages mimicking Telegram Bot API added SSH backdoors on Linux, risking persistent access.
The Hacker News
April 19, 2025
ASUS Confirms Critical Flaw in AiCloud Routers; Users Urged to Update Firmware
CVE-2025-2492 flaw in ASUS AiCloud routers allows remote control; firmware fix issued for 4 versions.
The Hacker News
April 18, 2025
Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States
Smishing kits by Wang Duo Yu enabled toll fraud in 8 U.S. states since Oct 2024, stealing user data via fake E-ZPass pages.
The Hacker News
April 18, 2025
Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader
Multi-stage phishing attack in Dec 2024 used .JSE, PowerShell, and AutoIt to deliver Agent Tesla.
The Hacker News
April 18, 2025
[Webinar] AI Is Already Inside Your SaaS Stack — Learn How to Prevent the Next Silent Breach
AI use in SaaS tools bypasses security controls, creating shadow integrations and real breach risks.
The Hacker News
April 18, 2025
Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoT
XorDDoS malware targeted 71.3% of U.S. systems in latest wave; Docker, IoT, and Linux bots fuel rise.
The Hacker News
April 18, 2025
CVE-2025-24054 Under Active Attack—Steals NTLM Credentials on File Download
Windows flaw CVE-2025-24054 actively exploited since March 19 to leak NTLM hashes via phishing attacks.
The Hacker News
April 17, 2025
Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates
Mustang Panda uses StarProxy, SplatCloak, and updated TONESHELL to breach Myanmar target undetected.
The Hacker News
April 17, 2025
State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns
ClickFix malware tactic used by Iran, Russia, and North Korea from Nov 2024–Feb 2025 replaces payload delivery in major phishing campaigns.
The Hacker News
April 17, 2025
Artificial Intelligence – What's all the fuss?
AI-powered threats escalate: 25M fraud via voice cloning + state use of ChatGPT in cyberattacks.
The Hacker News
April 17, 2025
Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution
CVE-2025-32433 in Erlang SSH scores 10.0 CVSS, enables unauthenticated code execution on telecom and IoT systems.
The Hacker News
April 17, 2025
Blockchain Offers Security Benefits – But Don't Neglect Your Passwords
Blockchain reduces breach risks by removing central databases, but energy use and legal gaps remain.
The Hacker News
April 17, 2025
Node.js Malware Campaign Targets Crypto Users with Fake Binance and TradingView Installers
Malicious crypto installers using Node.js since Oct 2024 evade Microsoft Defender via PowerShell and DLLs, enabling stealthy data theft.
The Hacker News
April 17, 2025
CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices
CVE-2021-20035 added to CISA KEV list due to active exploitation; agencies must patch by May 7.
The Hacker News
April 17, 2025
Apple Patches Two Actively Exploited iOS Flaws Used in Sophisticated Targeted Attacks
Apple fixed 2 exploited flaws in iOS 18.4.1, one flagged by Google TAG, urging urgent updates.
The Hacker News
April 16, 2025
Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler
Four Windows Task Scheduler flaws allow attackers to bypass UAC, gain SYSTEM access, and erase logs.
The Hacker News
April 16, 2025
Google Blocked 5.1B Harmful Ads and Suspended 39.2M Advertiser Accounts in 2024
Google blocked 5.1B bad ads and suspended 39.2M advertiser accounts in 2024 using AI to fight scams.- 1
- 2
Showing 50 results of 51 — Page 1