
- Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWispby info@thehackernews.com (The Hacker News) (The Hacker News) on March 31, 2025 at 4:41 pm
The threat actors behind the zero-day exploitation of a recently-patched security vulnerability in Microsoft Windows have been found to deliver two new backdoors called […]
- Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Imagesby info@thehackernews.com (The Hacker News) (The Hacker News) on March 31, 2025 at 12:04 pm
Threat actors are using the “mu-plugins” directory in WordPress sites to conceal malicious code with the goal of maintaining persistent remote access and redirecting site visitors […]
- β‘ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and Moreby info@thehackernews.com (The Hacker News) (The Hacker News) on March 31, 2025 at 11:25 am
Every week, someone somewhere slips upβand threat actors slip in. A misconfigured setting, an overlooked vulnerability, or a too-convenient cloud tool becomes the perfect entry […]
- 5 Impactful AWS Vulnerabilities You’re Responsible Forby info@thehackernews.com (The Hacker News) (The Hacker News) on March 31, 2025 at 11:00 am
If you’re using AWS, it’s easy to assume your cloud security is handled – but that’s a dangerous misconception. AWS secures its own infrastructure, but security within a cloud […]
- Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraineby info@thehackernews.com (The Hacker News) (The Hacker News) on March 31, 2025 at 9:30 am
Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote access trojan called Remcos RAT. “The file names use Russian words related to […]
- RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Featuresby info@thehackernews.com (The Hacker News) (The Hacker News) on March 30, 2025 at 5:07 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has been deployed as part of exploitation activity targeting a […]
- New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentialsby info@thehackernews.com (The Hacker News) (The Hacker News) on March 29, 2025 at 7:28 am
Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that’s primarily designed to target users in Spain and Turkey. “Crocodilus enters the […]
- BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerabilityby info@thehackernews.com (The Hacker News) (The Hacker News) on March 29, 2025 at 3:52 am
In what’s an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering […]
- Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMAby info@thehackernews.com (The Hacker News) (The Hacker News) on March 28, 2025 at 1:21 pm
Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors, Sungrow, Growatt, and SMA, that could be exploited by a bad actor to […]
- CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detectionby info@thehackernews.com (The Hacker News) (The Hacker News) on March 28, 2025 at 11:57 am
Cybersecurity researchers are calling attention to a new sophisticated malware called CoffeeLoader that’s designed to download and execute secondary payloads. The malware, […]
- Product Walkthrough: How Datto BCDR Delivers Unstoppable Business Continuityby info@thehackernews.com (The Hacker News) (The Hacker News) on March 28, 2025 at 10:15 am
Long gone are the days when a simple backup in a data center was enough to keep a business secure. While backups store information, they do not guarantee business continuity […]
- PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Appsby info@thehackernews.com (The Hacker News) (The Hacker News) on March 28, 2025 at 8:06 am
An Android malware family previously observed targeting Indian military personnel has been linked to a new campaign likely aimed at users in Taiwan under the guise of chat apps. […]
- Nine-Year-Old npm Packages Hijacked to Exfiltrate API Keys via Obfuscated Scriptsby info@thehackernews.com (The Hacker News) (The Hacker News) on March 28, 2025 at 6:06 am
Cybersecurity researchers have discovered several cryptocurrency packages on the npm registry that have been hijacked to siphon sensitive information such as environment variables […]
- Mozilla Patches Critical Firefox Bug Similar to Chromeβs Recent Zero-Day Vulnerabilityby info@thehackernews.com (The Hacker News) (The Hacker News) on March 28, 2025 at 5:44 am
Mozilla has released updates to address a critical security flaw impacting its Firefox browser for Windows, merely days after Google patched a similar flaw in Chrome that came […]
- New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victimsβ DNS Email Recordsby info@thehackernews.com (The Hacker News) (The Hacker News) on March 27, 2025 at 4:58 pm
Cybersecurity researchers have shed light on a new phishing-as-a-service (PhaaS) platform that leverages the Domain Name System (DNS) mail exchange (MX) records to serve fake […]
- Hackers Repurpose RansomHub’s EDRKillShifter in Medusa, BianLian, and Play Attacksby info@thehackernews.com (The Hacker News) (The Hacker News) on March 27, 2025 at 2:10 pm
A new analysis has uncovered connections between affiliates of RansomHub and other ransomware groups like Medusa, BianLian, and Play. The connection stems from the use of a custom […]
- APT36 Spoofs India Post Website to Infect Windows and Android Users with Malwareby info@thehackernews.com (The Hacker News) (The Hacker News) on March 27, 2025 at 12:31 pm
An advanced persistent threat (APT) group with ties to Pakistan has been attributed to the creation of a fake website masquerading as India’s public sector postal system as part […]
- New Report Explains Why CASB Solutions Fail to Address Shadow SaaS and HowΒ toΒ FixΒ Itby info@thehackernews.com (The Hacker News) (The Hacker News) on March 27, 2025 at 11:25 am
Whether itβs CRMs, project management tools, payment processors, or lead management tools – your workforce is using SaaS applications by the pound. Organizations often rely on […]
- Top 3 MS Office Exploits Hackers Use in 2025 β Stay Alert!by info@thehackernews.com (The Hacker News) (The Hacker News) on March 27, 2025 at 10:00 am
Hackers have long used Word and Excel documents as delivery vehicles for malware, and in 2025, these tricks are far from outdated. From phishing schemes to zero-click exploits, […]
- 150,000 Sites Compromised by JavaScript Injection Promoting Chinese Gambling Platformsby info@thehackernews.com (The Hacker News) (The Hacker News) on March 27, 2025 at 8:13 am
An ongoing campaign that infiltrates legitimate websites with malicious JavaScript injects to promote Chinese-language gambling platforms has ballooned to compromise approximately […]
- CISA Warns of Sitecore RCE Flaws; Active Exploits Hit Next.js and DrayTek Devicesby info@thehackernews.com (The Hacker News) (The Hacker News) on March 27, 2025 at 6:23 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two six-year-old security flaws impacting Sitecore CMS and Experience Platform (XP) to its Known […]
- NetApp SnapCenter Flaw Could Let Users Gain Remote Admin Access on Plug-In Systemsby info@thehackernews.com (The Hacker News) (The Hacker News) on March 27, 2025 at 6:06 am
A critical security flaw has been disclosed in NetApp SnapCenter that, if successfully exploited, could allow privilege escalation. SnapCenter is an enterprise-focused software […]
- New SparrowDoor Backdoor Variants Found in Attacks on U.S. and Mexican Organizationsby info@thehackernews.com (The Hacker News) (The Hacker News) on March 26, 2025 at 4:59 pm
The Chinese threat actor known as FamousSparrow has been linked to a cyber attack targeting a trade group in the United States and a research institute in Mexico to deliver its […]
- EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malwareby info@thehackernews.com (The Hacker News) (The Hacker News) on March 26, 2025 at 1:53 pm
The threat actor known as EncryptHub exploited a recently-patched security vulnerability in Microsoft Windows as a zero-day to deliver a wide range of malware families, including […]
- RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deploymentby info@thehackernews.com (The Hacker News) (The Hacker News) on March 26, 2025 at 1:43 pm
The Russian-speaking hacking group called RedCurl has been linked to a ransomware campaign for the first time, marking a departure in the threat actor’s tradecraft. The activity, […]