
- Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourlyby info@thehackernews.com (The Hacker News) (The Hacker News) on November 5, 2025 at 3:33 pm
Google on Wednesday said it discovered an unknown threat actor using an experimental Visual Basic Script (VB Script) malware dubbed PROMPTFLUX that interacts with its Gemini […]
- Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Databy info@thehackernews.com (The Hacker News) (The Hacker News) on November 5, 2025 at 2:04 pm
Cybersecurity researchers have disclosed a new set of vulnerabilities impacting OpenAI’s ChatGPT artificial intelligence (AI) chatbot that could be exploited by an attacker to […]
- Securing the Open Android Ecosystem with Samsung Knoxby info@thehackernews.com (The Hacker News) (The Hacker News) on November 5, 2025 at 11:55 am
Raise your hand if you’ve heard the myth, “Android isn’t secure.” Android phones, such as the Samsung Galaxy, unlock new ways of working. But, as an IT admin, you may […]
- Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensionsby info@thehackernews.com (The Hacker News) (The Hacker News) on November 5, 2025 at 11:20 am
A never-before-seen threat activity cluster codenamed UNK_SmudgedSerpent has been attributed as behind a set of cyber attacks targeting academics and foreign policy experts […]
- U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraudby info@thehackernews.com (The Hacker News) (The Hacker News) on November 5, 2025 at 10:55 am
The U.S. Treasury Department on Tuesday imposed sanctions against eight individuals and two entities within North Korea’s global financial network for laundering money for various […]
- Why SOC Burnout Can Be Avoided: Practical Stepsby info@thehackernews.com (The Hacker News) (The Hacker News) on November 5, 2025 at 10:30 am
Behind every alert is an analyst; tired eyes scanning dashboards, long nights spent on false positives, and the constant fear of missing something big. It’s no surprise that […]
- CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidenceby info@thehackernews.com (The Hacker News) (The Hacker News) on November 5, 2025 at 6:12 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Gladinet and Control Web Panel (CWP) to its Known Exploited […]
- A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forcesby info@thehackernews.com (The Hacker News) (The Hacker News) on November 4, 2025 at 5:25 pm
The nascent collective that combines three prominent cybercrime groups, Scattered Spider, LAPSUS$, and ShinyHunters, has created no less than 16 Telegram channels since August 8, […]
- European Authorities Dismantle €600 Million Crypto Fraud Network in Global Sweepby info@thehackernews.com (The Hacker News) (The Hacker News) on November 4, 2025 at 3:57 pm
Nine people have been arrested in connection with a coordinated law enforcement operation that targeted a cryptocurrency money laundering network that defrauded victims of €600 […]
- Critical React Native CLI Flaw Exposed Millions of Developers to Remote Attacksby info@thehackernews.com (The Hacker News) (The Hacker News) on November 4, 2025 at 2:24 pm
Details have emerged about a now-patched critical security flaw in the popular “@react-native-community/cli” npm package that could be potentially exploited to run malicious […]
- Microsoft Teams Bugs Let Attackers Impersonate Colleagues and Edit Messages Unnoticedby info@thehackernews.com (The Hacker News) (The Hacker News) on November 4, 2025 at 2:00 pm
Cybersecurity researchers have disclosed details of four security flaws in Microsoft Teams that could have exposed users to serious impersonation and social engineering attacks. […]
- Ransomware Defense Using the Wazuh Open Source Platformby info@thehackernews.com (The Hacker News) (The Hacker News) on November 4, 2025 at 11:06 am
Ransomware is malicious software designed to block access to a computer system or encrypt data until a ransom is paid. This cyberattack is one of the most prevalent and damaging […]
- Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectorsby info@thehackernews.com (The Hacker News) (The Hacker News) on November 4, 2025 at 10:49 am
Threat actors are leveraging weaponized attachments distributed via phishing emails to deliver malware likely targeting the defense sector in Russia and Belarus. According to […]
- Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKitby info@thehackernews.com (The Hacker News) (The Hacker News) on November 4, 2025 at 8:10 am
Google’s artificial intelligence (AI)-powered cybersecurity agent called Big Sleep has been credited by Apple for discovering as many as five different security flaws in the […]
- U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacksby info@thehackernews.com (The Hacker News) (The Hacker News) on November 4, 2025 at 7:45 am
Federal prosecutors in the U.S. have accused a trio of allegedly hacking the networks of five U.S. companies with BlackCat (aka ALPHV) ransomware between May and November 2023 and […]
- Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channelby info@thehackernews.com (The Hacker News) (The Hacker News) on November 4, 2025 at 5:58 am
Microsoft has disclosed details of a novel backdoor dubbed SesameOp that uses OpenAI Assistants Application Programming Interface (API) for command-and-control (C2) […]
- Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Aliveby info@thehackernews.com (The Hacker News) (The Hacker News) on November 3, 2025 at 6:08 pm
Cybersecurity researchers have flagged a new malicious extension in the Open VSX registry that harbors a remote access trojan called SleepyDuck. According to Secure Annex’s John […]
- Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networksby info@thehackernews.com (The Hacker News) (The Hacker News) on November 3, 2025 at 1:18 pm
Bad actors are increasingly training their sights on trucking and logistics companies with an aim to infect them with remote monitoring and management (RMM) software for financial […]
- ⚡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & Moreby info@thehackernews.com (The Hacker News) (The Hacker News) on November 3, 2025 at 12:56 pm
Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage of new security problems—some just […]
- The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security Operationsby info@thehackernews.com (The Hacker News) (The Hacker News) on November 3, 2025 at 11:56 am
Security Operations Centers (SOC) today are overwhelmed. Analysts handle thousands of alerts every day, spending much time chasing false positives and adjusting detection rules […]
- Researchers Uncover BankBot-YNRK and DeliveryRAT Android Trojans Stealing Financial Databy info@thehackernews.com (The Hacker News) (The Hacker News) on November 3, 2025 at 11:14 am
Cybersecurity researchers have shed light on two different Android trojans called BankBot-YNRK and DeliveryRAT that are capable of harvesting sensitive data from compromised […]
- New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Koreaby info@thehackernews.com (The Hacker News) (The Hacker News) on November 3, 2025 at 10:42 am
The North Korea-linked threat actor known as Kimsuky has distributed a previously undocumented backdoor codenamed HttpTroy as part of a likely spear-phishing attack targeting a […]
- ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerabilityby info@thehackernews.com (The Hacker News) (The Hacker News) on November 1, 2025 at 1:43 pm
The Australian Signals Directorate (ASD) has issued a bulletin about ongoing cyber attacks targeting unpatched Cisco IOS XE devices in the country with a previously undocumented […]
- OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automaticallyby info@thehackernews.com (The Hacker News) (The Hacker News) on October 31, 2025 at 5:19 pm
OpenAI has announced the launch of an “agentic security researcher” that’s powered by its GPT-5 large language model (LLM) and is programmed to emulate a human expert capable of […]
- Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attackby info@thehackernews.com (The Hacker News) (The Hacker News) on October 31, 2025 at 4:08 pm
A suspected nation-state threat actor has been linked to the distribution of a new malware called Airstalk as part of a likely supply chain attack. Palo Alto Networks Unit 42 said […]
