
- GPUHammer: New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUsby info@thehackernews.com (The Hacker News) (The Hacker News) on July 12, 2025 at 5:14 pm
NVIDIA is urging customers to enable System-level Error Correction Codes (ECC) as a defense against a variant of a RowHammer attack demonstrated against its graphics processing […]
- Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHubby info@thehackernews.com (The Hacker News) (The Hacker News) on July 12, 2025 at 12:45 pm
Cybersecurity researchers have discovered a serious security issue that allows leaked Laravel APP_KEYs to be weaponized to gain remote code execution capabilities on hundreds of […]
- Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)by info@thehackernews.com (The Hacker News) (The Hacker News) on July 11, 2025 at 2:38 pm
Fortinet has released fixes for a critical security flaw impacting FortiWeb that could enable an unauthenticated attacker to run arbitrary database commands on susceptible […]
- PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Executionby info@thehackernews.com (The Hacker News) (The Hacker News) on July 11, 2025 at 12:10 pm
Cybersecurity researchers have discovered a set of four security flaws in OpenSynergy’s BlueSDK Bluetooth stack that, if successfully exploited, could allow remote code execution […]
- Securing Data in the AI Eraby info@thehackernews.com (The Hacker News) (The Hacker News) on July 11, 2025 at 11:00 am
The 2025 Data Risk Report: Enterprises face potentially serious data loss risks from AI-fueled tools. Adopting a unified, AI-driven approach to data security can help. As […]
- Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wildby info@thehackernews.com (The Hacker News) (The Hacker News) on July 11, 2025 at 10:58 am
A recently disclosed maximum-severity security flaw impacting the Wing FTP Server has come under active exploitation in the wild, according to Huntress. The vulnerability, tracked […]
- Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminalsby info@thehackernews.com (The Hacker News) (The Hacker News) on July 11, 2025 at 10:46 am
An Iranian-backed ransomware-as-a-service (RaaS) named Pay2Key has resurfaced in the wake of the Israel-Iran-U.S. conflict last month, offering bigger payouts to cybercriminals […]
- CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprisesby info@thehackernews.com (The Hacker News) (The Hacker News) on July 11, 2025 at 4:25 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting Citrix NetScaler ADC and Gateway to its Known Exploited […]
- Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloadsby info@thehackernews.com (The Hacker News) (The Hacker News) on July 10, 2025 at 5:03 pm
Cybersecurity researchers have discovered a critical vulnerability in the open-source mcp-remote project that could result in the execution of arbitrary operating system (OS) […]
- Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discordby info@thehackernews.com (The Hacker News) (The Hacker News) on July 10, 2025 at 2:41 pm
Cryptocurrency users are the target of an ongoing social engineering campaign that employs fake startup companies to trick users into downloading malware that can drain digital […]
- Four Arrested in Β£440M Cyber Attack on Marks & Spencer, Co-op, and Harrodsby info@thehackernews.com (The Hacker News) (The Hacker News) on July 10, 2025 at 12:13 pm
The U.K. National Crime Agency (NCA) on Thursday announced that four people have been arrested in connection with cyber attacks targeting major retailers Marks & Spencer, […]
- What Security Leaders Need to Know About AI Governance for SaaSby info@thehackernews.com (The Hacker News) (The Hacker News) on July 10, 2025 at 11:00 am
Generative AI is not arriving with a bang, itβs slowly creeping into the software that companies already use on a daily basis. Whether it is video conferencing or CRM, vendors […]
- New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS Appby info@thehackernews.com (The Hacker News) (The Hacker News) on July 10, 2025 at 10:59 am
Cybersecurity researchers have discovered new artifacts associated with an Apple macOS malware called ZuRu, which is known to propagate via trojanized versions of legitimate […]
- AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUsby info@thehackernews.com (The Hacker News) (The Hacker News) on July 10, 2025 at 10:44 am
Semiconductor company AMD is warning of a new set of vulnerabilities affecting a broad range of chipsets that could lead to information disclosure. The flaws, collectively called […]
- ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLsby info@thehackernews.com (The Hacker News) (The Hacker News) on July 10, 2025 at 7:24 am
A high-severity security flaw has been disclosed in ServiceNow’s platform that, if successfully exploited, could result in data exposure and exfiltration. The vulnerability, […]
- Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targetsby info@thehackernews.com (The Hacker News) (The Hacker News) on July 9, 2025 at 4:26 pm
The Initial Access Broker (IAB) known as Gold Melody has been attributed to a campaign that exploits leaked ASP.NET machine keys to obtain unauthorized access to organizations and […]
- DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malwareby info@thehackernews.com (The Hacker News) (The Hacker News) on July 9, 2025 at 1:28 pm
A threat actor with suspected ties to India has been observed targeting a European foreign affairs ministry with malware capable of harvesting sensitive data from compromised […]
- U.S. Sanctions North Korean Andariel Hacker Behind Fraudulent IT Worker Schemeby info@thehackernews.com (The Hacker News) (The Hacker News) on July 9, 2025 at 11:25 am
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) on Tuesday sanctioned a member of a North Korean hacking group called Andariel for their role in the […]
- How To Automate Ticket Creation, Device Identification and Threat Triage With Tinesby info@thehackernews.com (The Hacker News) (The Hacker News) on July 9, 2025 at 11:00 am
Run by the team at workflow orchestration and AI platform Tines, the Tines library features over 1,000 pre-built workflows shared by security practitioners from across the […]
- Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacksby info@thehackernews.com (The Hacker News) (The Hacker News) on July 9, 2025 at 8:40 am
A Chinese national has been arrested in Milan, Italy, for his alleged links to a state-sponsored hacking group known as Silk Typhoon and for carrying out cyber attacks against […]
- Microsoft Patches 130 Vulnerabilities, Including Critical Flaws in SPNEGO and SQL Serverby info@thehackernews.com (The Hacker News) (The Hacker News) on July 9, 2025 at 7:10 am
For the first time in 2025, Microsoft’s Patch Tuesday updates did not bundle fixes for exploited security vulnerabilities, but the company acknowledged one of the addressed flaws […]
- Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malwareby info@thehackernews.com (The Hacker News) (The Hacker News) on July 8, 2025 at 5:35 pm
In yet another instance of threat actors repurposing legitimate tools for malicious purposes, it has been discovered that hackers are exploiting a popular red teaming tool called […]
- Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Playby info@thehackernews.com (The Hacker News) (The Hacker News) on July 8, 2025 at 4:13 pm
Cybersecurity researchers have discovered an Android banking malware campaign that has leveraged a trojan named Anatsa to target users in North America using malicious apps […]
- Malicious Pull Request Targets 6,000+ Developers via Vulnerable Ethcode VS Code Extensionby info@thehackernews.com (The Hacker News) (The Hacker News) on July 8, 2025 at 1:01 pm
Cybersecurity researchers have flagged a supply chain attack targeting a Microsoft Visual Studio Code (VS Code) extension called Ethcode that has been installed a little over […]
- 5 Ways Identity-based Attacks Are Breaching Retailby info@thehackernews.com (The Hacker News) (The Hacker News) on July 8, 2025 at 11:25 am
From overprivileged admin roles to long-forgotten vendor tokens, these attackers are slipping through the cracks of trust and access. Hereβs how five retail breaches unfolded, […]