
- Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Deliveryby info@thehackernews.com (The Hacker News) (The Hacker News) on May 20, 2025 at 3:53 pm
A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources of high-profile organizations, including Amazon S3 buckets and Microsoft Azure endpoints, […]
- 100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Adsby info@thehackernews.com (The Hacker News) (The Hacker News) on May 20, 2025 at 3:01 pm
An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024 that masquerade as seemingly benign utilities but […]
- AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitationby info@thehackernews.com (The Hacker News) (The Hacker News) on May 20, 2025 at 12:42 pm
Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the door for attackers to escalate […]
- The Crowded Battle: Key Insights from the 2025 State of Pentesting Reportby info@thehackernews.com (The Hacker News) (The Hacker News) on May 20, 2025 at 11:00 am
In the newly released 2025 State of Pentesting Report, Pentera surveyed 500 CISOs from global enterprises (200 from within the USA) to understand the strategies, tactics, and […]
- South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malwareby info@thehackernews.com (The Hacker News) (The Hacker News) on May 20, 2025 at 10:57 am
High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have emerged as the target of a new campaign orchestrated by a threat actor known as SideWinder. “The […]
- Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organizationby info@thehackernews.com (The Hacker News) (The Hacker News) on May 20, 2025 at 9:32 am
Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker that targeted an unnamed international organization in Saudi Arabia with a […]
- Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuseby info@thehackernews.com (The Hacker News) (The Hacker News) on May 20, 2025 at 8:25 am
Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign that’s targeting publicly accessible Redis servers. The malicious activity has been codenamed […]
- Malicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User Accountsby info@thehackernews.com (The Hacker News) (The Hacker News) on May 20, 2025 at 5:49 am
Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act as checker tools to validate stolen email addresses […]
- RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installerby info@thehackernews.com (The Hacker News) (The Hacker News) on May 19, 2025 at 3:48 pm
The official site for RVTools has been hacked to serve a compromised installer for the popular VMware environment reporting utility. “Robware.net and RVTools.com are currently […]
- Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Accessby info@thehackernews.com (The Hacker News) (The Hacker News) on May 19, 2025 at 2:38 pm
Several ransomware actors are using a malware called Skitnet as part of their post-exploitation efforts to steal sensitive data and establish remote control over compromised […]
- Why CTEM is the Winning Bet for CISOs in 2025by info@thehackernews.com (The Hacker News) (The Hacker News) on May 19, 2025 at 11:00 am
Continuous Threat Exposure Management (CTEM) has moved from concept to cornerstone, solidifying its role as a strategic enabler for CISOs. No longer a theoretical framework, CTEM […]
- Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewardsby info@thehackernews.com (The Hacker News) (The Hacker News) on May 19, 2025 at 10:37 am
Mozilla has released security updates to address two critical security flaws in its Firefox browser that could be potentially exploited to access sensitive data or achieve code […]
- β‘ Weekly Recap: Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and Moreby info@thehackernews.com (The Hacker News) (The Hacker News) on May 19, 2025 at 10:00 am
Cybersecurity leaders arenβt just dealing with attacksβtheyβre also protecting trust, keeping systems running, and maintaining their organizationβs reputation. This […]
- [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applicationsby info@thehackernews.com (The Hacker News) (The Hacker News) on May 17, 2025 at 4:07 am
Modern apps move fastβfaster than most security teams can keep up. As businesses rush to build in the cloud, security often lags behind. Teams scan code in isolation, react late […]
- New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectorsby info@thehackernews.com (The Hacker News) (The Hacker News) on May 16, 2025 at 11:37 am
Cybersecurity researchers are calling attention to a new botnet malware called HTTPBot that has been used to primarily single out the gaming industry, as well as technology […]
- Top 10 Best Practices for Effective Data Protectionby info@thehackernews.com (The Hacker News) (The Hacker News) on May 16, 2025 at 10:30 am
Data is the lifeblood of productivity, and protecting sensitive data is more critical than ever. With cyber threats evolving rapidly and data privacy regulations tightening, […]
- Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacksby info@thehackernews.com (The Hacker News) (The Hacker News) on May 16, 2025 at 9:08 am
Researchers at ETH ZΓΌrich have discovered yet another security flaw that they say impacts all modern Intel CPUs and causes them to leak sensitive data from memory, showing that […]
- Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacksby info@thehackernews.com (The Hacker News) (The Hacker News) on May 16, 2025 at 7:56 am
Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy a remote access trojan called Remcos RAT. […]
- Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuitby info@thehackernews.com (The Hacker News) (The Hacker News) on May 15, 2025 at 4:45 pm
Austrian privacy non-profit noyb (none of your business) has sent Meta’s Irish headquarters a cease-and-desist letter, threatening the company with a class action lawsuit if it […]
- Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Failsby info@thehackernews.com (The Hacker News) (The Hacker News) on May 15, 2025 at 2:28 pm
Cryptocurrency exchange Coinbase has disclosed that unknown cyber actors broke into its systems and stole account data for a small subset of its customers. “Criminals targeted our […]
- Pen Testing for Compliance Only? It’s Time to Change Your Approachby info@thehackernews.com (The Hacker News) (The Hacker News) on May 15, 2025 at 11:25 am
Imagine this: Your organization completed its annual penetration test in January, earning high marks for security compliance. In February, your development team deployed a routine […]
- New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policyby info@thehackernews.com (The Hacker News) (The Hacker News) on May 15, 2025 at 10:43 am
Google on Wednesday released updates to address four security issues in its Chrome web browser, including one for which it said there exists an exploit in the wild. The […]
- 5 BCDR Essentials for Effective Ransomware Defenseby info@thehackernews.com (The Hacker News) (The Hacker News) on May 15, 2025 at 10:30 am
Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat capable of crippling organizations of any size. Cybercriminals now exploit even […]
- Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Serversby info@thehackernews.com (The Hacker News) (The Hacker News) on May 15, 2025 at 10:05 am
A Russia-linked threat actor has been attributed to a cyber espionage operation targeting webmail servers such as Roundcube, Horde, MDaemon, and Zimbra via cross-site scripting […]
- Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropperby info@thehackernews.com (The Hacker News) (The Hacker News) on May 15, 2025 at 10:00 am
Cybersecurity researchers have discovered a malicious package named “os-info-checker-es6” that disguises itself as an operating system information utility to stealthily drop a […]