The Hacker News July 5, 2025 Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties Taiwan NSB warns of security risks from Chinese apps, citing excessive data collection and sharing with China.
The Hacker News July 5, 2025 Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS Threat actors leverage exposed JDWP interfaces for code execution and cryptocurrency mining, with global scanning activity increasing.
The Hacker News July 4, 2025 NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors Cybersecurity researchers uncover NightEagle APT exploiting zero-day in Microsoft Exchange servers, targeting government, defense, and tech...
The Hacker News July 4, 2025 Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It AI agents are leaking enterprise data in GenAI workflows. Learn how to secure your systems before a breach.
The Hacker News July 4, 2025 Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros Two critical vulnerabilities in Sudo command-line tool allow privilege escalation for local attackers on Linux systems
The Hacker News July 4, 2025 Google Ordered to Pay $314M for Misusing Android Users' Cellular Data Without Permission Google faces $314M fine for misusing Android users’ cellular data while devices are idle.
The Hacker News July 3, 2025 Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams IconAds ad fraud operation disrupts 352 Android apps, impacting global users with hidden ads and obfuscation.
The Hacker News July 3, 2025 Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets Over 40 malicious Firefox extensions impersonating popular crypto wallets have been uncovered, putting digital assets at risk.
The Hacker News July 3, 2025 The Hidden Weaknesses in AI SOC Tools that No One Talks About Adaptive AI platforms for SOCs offer real-time alert triage, faster response times, and full-spectrum security coverage.
The Hacker News July 3, 2025 Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms Chinese hackers exploited Ivanti CSA zero-days, targeting French government, media, and telecom sectors in September 2024.
The Hacker News July 3, 2025 Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials CVE-2025-20309 in Cisco Unified CM could grant root access, allowing arbitrary command execution.
The Hacker News July 2, 2025 North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign North Korean cyber group targets Web3 businesses with Nim-based malware, exploiting AppleScript and Telegram for persistent attacks.
The Hacker News July 2, 2025 That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat SOCs face evolving cyber threats as 80% of attacks mimic user behavior. Discover how multi-layered NDR detection strategies enhance defense.
The Hacker News July 2, 2025 Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns Phishing campaigns use PDF attachments and callback phishing to exploit brands like Microsoft and DocuSign, affecting businesses and users.
The Hacker News July 2, 2025 U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware U.S. sanctions Russian BPH provider Aeza Group for hosting ransomware attacks, dark web drugs, and cybercrime.
The Hacker News July 2, 2025 Vercel's v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale Threat actors use Vercel's v0 AI tool to create fake sign-in pages, escalating phishing campaigns.
The Hacker News July 1, 2025 Critical Vulnerability in Anthropic's MCP Exposes Developer Machines to Remote Exploits Critical RCE vulnerability discovered in Anthropic's MCP Inspector, impacting AI developers and networks.
The Hacker News July 1, 2025 TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns Proofpoint tracks overlapping tactics of TA829 and UNK_GreenSec, deploying TransferLoader and RomCom RAT globally.
The Hacker News July 1, 2025 New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status A security flaw in IDEs like Visual Studio Code lets attackers bypass extension verification, running malicious code on developer machines
The Hacker News July 1, 2025 A New Maturity Model for Browser Security: Closing the Last-Mile Risk Discover how to secure browser usage in enterprises, from GenAI risks to control enforcement, with a three-stage maturity model.
The Hacker News July 1, 2025 Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation Google releases an update for Chrome’s CVE-2025-6554, a critical zero-day flaw, to prevent exploitation
The Hacker News July 1, 2025 U.S. Arrests Key Facilitator in North Korean IT Worker Scheme, Seizes $7.74 Million U.S. authorities target North Korean IT worker scheme, arresting one and seizing $7.74M in assets
The Hacker News July 1, 2025 Microsoft Removes Password Management from Authenticator App Starting August 2025 Microsoft will end password support in Authenticator by August 2025, shifting to Microsoft account syncing via Edge.
The Hacker News June 30, 2025 U.S. Agencies Warn of Rising Iranian Cyberattacks on Defense, OT Networks, and Critical Infrastructure U.S. issues warning on potential Iranian cyber-attacks, urging stronger protections for critical infrastructure and defense sectors.
The Hacker News June 30, 2025 Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects Europol dismantled a crypto fraud syndicate laundering $540M from 5,000 victims worldwide.
The Hacker News June 30, 2025 Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banks Trustwave links Blind Eagle cybercrime group to Proton66 hosting, targeting Colombian banks with VBS and RATs.
The Hacker News June 30, 2025 Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI Inventories Identity-based attacks are rising, with 83% involving compromised secrets. GitGuardian helps protect non-human identities and prevent breach...
The Hacker News June 30, 2025 ⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more ⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and more | Read more hacking news on The Hacker News cybersec...
The Hacker News June 28, 2025 FBI Warns of Scattered Spider's Expanding Attacks on Airlines Using Social Engineering Scattered Spider targets airlines with advanced social engineering and MFA bypass tactics. Industry must reassess identity verification.
The Hacker News June 28, 2025 GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Tool GIFTEDCROOK malware evolves in June 2025, shifting from browser data theft to targeting sensitive files in Ukraine.
The Hacker News June 28, 2025 Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns Meta's new AI feature requests photo uploads from users for personalized suggestions, sparking privacy concerns.
The Hacker News June 27, 2025 Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign China-linked hackers use compromised SOHO devices in espionage campaign, targeting Taiwan, the U.S., and Southeast Asia.
The Hacker News June 27, 2025 PUBLOAD and Pubshell Malware Used in Mustang Panda's Tibet-Specific Attack Mustang Panda malware targets Tibet and Taiwan, using spear-phishing emails and PUBLOAD for cyber espionage.
The Hacker News June 27, 2025 Business Case for Agentic AI SOC Analysts AI SOC Analysts reduce false positives by 90%, boost SOC productivity, and tackle the global analyst shortage.
The Hacker News June 27, 2025 Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkit Silver Fox hackers target Chinese-speaking users with fake sites delivering Sainbox RAT and Hidden rootkit
The Hacker News June 27, 2025 MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted Surge in scanning activity targets MOVEit Transfer systems, raising concerns over possible exploitation.
The Hacker News June 27, 2025 OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors OneClik malware exploits Microsoft ClickOnce to attack energy companies with stealthy Golang backdoors.
The Hacker News June 26, 2025 Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks A critical vulnerability in Open VSX Registry could allow attackers to control VS Code extensions, threatening millions of developers.
The Hacker News June 26, 2025 Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access Cisco fixes CVE-2025-20281 and CVE-2025-20282 in ISE, ISE-PIC to prevent remote code execution.
The Hacker News June 26, 2025 New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacks ClickFix attacks surged by 517% in 2024–2025, leading to ransomware, malware, and credential theft. Learn why it's a growing threat
The Hacker News June 26, 2025 The Hidden Risks of SaaS: Why Built-In Protections Aren't Enough for Modern Data Resilience SaaS platforms lack comprehensive data protection, exposing organizations to data loss, compliance risks, and cyberthreats.
The Hacker News June 26, 2025 Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacks Iranian hackers linked to APT35 target Israeli professionals using AI-driven phishing, fake Gmail pages, and 2FA bypass.
The Hacker News June 26, 2025 Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africa SaaS platforms lack comprehensive data protection, exposing organizations to data loss, compliance risks, and cyberthreats.
The Hacker News June 26, 2025 CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet CISA adds 3 critical vulnerabilities to KEV catalog, affecting AMI MegaRAC, D-Link, and Fortinet, urging mitigations by July 2025.
The Hacker News June 26, 2025 WhatsApp Adds AI-Powered Message Summaries for Faster Chat Previews WhatsApp adds AI-powered Message Summaries, preserving privacy with Private Processing in the U.S
The Hacker News June 25, 2025 nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery New research shows 9% of Microsoft Entra SaaS apps are vulnerable to nOAuth abuse, allowing full account takeovers.
The Hacker News June 25, 2025 Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC Citrix releases urgent patches for CVE-2025-6543 in NetScaler ADC, a critical flaw affecting multiple versions. CVSS score 9.2.
The Hacker News June 25, 2025 Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure Two critical flaws in SAP GUI expose sensitive data. Patches now available for Windows and Java versions.
The Hacker News June 25, 2025 Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games Thousands of personal records from Saudi Games leaked by Cyber Fattah, fueling geopolitical tensions between Iran, Israel, and the U.S.
The Hacker News June 25, 2025 Beware the Hidden Risk in Your Entra Environment Guest users in Entra ID may exploit billing roles to create and control subscriptions, escalating access undetected.