- Lazarus Group Uses React-Based Admin Panel to Control Global Cyber Attacksby info@thehackernews.com (The Hacker News) (The Hacker News) on January 29, 2025 at 4:56 pm
The North Korean threat actor known as the Lazarus Group has been observed leveraging a “web-based administrative platform” to oversee its command-and-control (C2) infrastructure, […]
- AI in Cybersecurity: What’s Effective and What’s Not – Insights from 200 Expertsby info@thehackernews.com (The Hacker News) (The Hacker News) on January 29, 2025 at 11:46 am
Curious about the buzz around AI in cybersecurity? Wonder if it’s just a shiny new toy in the tech world or a serious game changer? Let’s unpack this together in a […]
- New SLAP & FLOP Attacks Expose Apple M-Series Chips to Speculative Execution Exploitsby info@thehackernews.com (The Hacker News) (The Hacker News) on January 29, 2025 at 10:49 am
A team of security researchers from Georgia Institute of Technology and Ruhr University Bochum has demonstrated two new side-channel attacks targeting Apple silicon that could be […]
- How Interlock Ransomware Infects Healthcare Organizationsby info@thehackernews.com (The Hacker News) (The Hacker News) on January 29, 2025 at 10:30 am
Ransomware attacks have reached an unprecedented scale in the healthcare sector, exposing vulnerabilities that put millions at risk. Recently, UnitedHealth revealed that 190 […]
- Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Executionby info@thehackernews.com (The Hacker News) (The Hacker News) on January 29, 2025 at 10:21 am
A critical security flaw has been disclosed in the Cacti open-source network monitoring and fault management framework that could allow an authenticated attacker to achieve remote […]
- UAC-0063 Expands Cyber Attacks to European Embassies Using Stolen Documentsby info@thehackernews.com (The Hacker News) (The Hacker News) on January 29, 2025 at 5:52 am
The advanced persistent threat (APT) group known as UAC-0063 has been observed leveraging legitimate documents obtained by infiltrating one victim to attack another target with […]
- Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancerby info@thehackernews.com (The Hacker News) (The Hacker News) on January 29, 2025 at 5:29 am
Broadcom has alerted of a high-severity security flaw in VMware Avi Load Balancer that could be weaponized by malicious actors to gain entrenched database access. The […]
- Zyxel CPE Devices Face Active Exploitation Due to Unpatched CVE-2024-40891 Vulnerabilityby info@thehackernews.com (The Hacker News) (The Hacker News) on January 29, 2025 at 5:11 am
Cybersecurity researchers are warning that a critical zero-day vulnerability impacting Zyxel CPE Series devices is seeing active exploitation attempts in the wild. “Attackers can […]
- PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacksby info@thehackernews.com (The Hacker News) (The Hacker News) on January 28, 2025 at 4:34 pm
A financially motivated threat actor has been linked to an ongoing phishing email campaign that has been ongoing since at least July 2024 specifically targeting users in Poland […]
- OAuth Redirect Flaw in Airline Travel Integration Exposes Millions to Account Hijackingby info@thehackernews.com (The Hacker News) (The Hacker News) on January 28, 2025 at 2:02 pm
Cybersecurity researchers have disclosed details of a now-patched account takeover vulnerability affecting a popular online travel service for hotel and car rentals. “By […]
- AI SOC Analysts: Propelling SecOps into the futureby info@thehackernews.com (The Hacker News) (The Hacker News) on January 28, 2025 at 11:20 am
Triaging and investigating alerts is central to security operations. As SOC teams strive to keep up with ever-increasing alert volumes and complexity, modernizing SOC automation […]
- Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operationsby info@thehackernews.com (The Hacker News) (The Hacker News) on January 28, 2025 at 11:01 am
Cybersecurity researchers have found that ransomware attacks targeting ESXi systems are also leveraging the access to repurpose the appliances as a conduit to tunnel traffic to […]
- How Long Does It Take Hackers to Crack Modern Hashing Algorithms?by info@thehackernews.com (The Hacker News) (The Hacker News) on January 28, 2025 at 10:30 am
While passwords remain the first line of defense for protecting user accounts against unauthorized access, the methods for creating strong passwords and protecting them are […]
- Top-Rated Chinese AI App DeepSeek Limits Registrations Amid Cyberattacksby info@thehackernews.com (The Hacker News) (The Hacker News) on January 28, 2025 at 10:16 am
DeepSeek, the Chinese AI startup that has captured much of the artificial intelligence (AI) buzz in recent days, said it’s restricting registrations on the service, citing […]
- E.U. Sanctions 3 Russian Nationals for Cyber Attacks Targeting Estonia’s Key Ministriesby info@thehackernews.com (The Hacker News) (The Hacker News) on January 28, 2025 at 10:16 am
The Council of the European Union has sanctioned three individuals for allegedly carrying out “malicious cyber activities” against Estonia. The three Russian nationals – Nikolay […]
- Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and Moreby info@thehackernews.com (The Hacker News) (The Hacker News) on January 28, 2025 at 3:23 am
Apple has released software updates to address several security flaws across its portfolio, including a zero-day vulnerability that it said has been exploited in the wild. The […]
- GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLsby info@thehackernews.com (The Hacker News) (The Hacker News) on January 27, 2025 at 2:17 pm
Multiple security vulnerabilities have been disclosed in GitHub Desktop as well as other Git-related projects that, if successfully exploited, could permit an attacker to gain […]
- ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [27 January]by info@thehackernews.com (The Hacker News) (The Hacker News) on January 27, 2025 at 12:39 pm
Welcome to your weekly cybersecurity scoop! Ever thought about how the same AI meant to protect our hospitals could also compromise them? This week, we’re breaking down the […]
- Do We Really Need The OWASP NHI Top 10?by info@thehackernews.com (The Hacker News) (The Hacker News) on January 27, 2025 at 11:20 am
The Open Web Application Security Project has recently introduced a new Top 10 project – the Non-Human Identity (NHI) Top 10. For years, OWASP has provided security professionals […]
- GamaCopy Mimics Gamaredon Tactics in Cyber Espionage Targeting Russian Entitiesby info@thehackernews.com (The Hacker News) (The Hacker News) on January 27, 2025 at 7:59 am
A previously unknown threat actor has been observed copying the tradecraft associated with the Kremlin-aligned Gamaredon hacking group in its cyber attacks targeting […]
- MintsLoader Delivers StealC Malware and BOINC in Targeted Cyber Attacksby info@thehackernews.com (The Hacker News) (The Hacker News) on January 27, 2025 at 7:16 am
Threat hunters have detailed an ongoing campaign that leverages a malware loader called MintsLoader to distribute secondary payloads such as the StealC information stealer and a […]
- Meta’s Llama Framework Flaw Exposes AI Systems to Remote Code Execution Risksby info@thehackernews.com (The Hacker News) (The Hacker News) on January 26, 2025 at 10:15 am
A high-severity security flaw has been disclosed in Meta’s Llama large language model (LLM) framework that, if successfully exploited, could allow an attacker to execute arbitrary […]
- RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementationsby info@thehackernews.com (The Hacker News) (The Hacker News) on January 24, 2025 at 12:58 pm
A group of academics has disclosed details of over 100 security vulnerabilities impacting LTE and 5G implementations that could be exploited by an attacker to disrupt access to […]
- 2025 State of SaaS Backup and Recovery Reportby info@thehackernews.com (The Hacker News) (The Hacker News) on January 24, 2025 at 11:00 am
The modern workplace has undergone a seismic transformation over recent years, with hybrid work becoming the norm and businesses rapidly adopting cloud-based Software-as-a-Service […]
- DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violationsby info@thehackernews.com (The Hacker News) (The Hacker News) on January 24, 2025 at 9:53 am
The U.S. Department of Justice (DoJ) on Thursday indicted two North Korean nationals, a Mexican national, and two of its own citizens for their alleged involvement in the ongoing […]