
- North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaignby info@thehackernews.com (The Hacker News) (The Hacker News) on July 2, 2025 at 5:09 pm
Threat actors with ties to North Korea have been observed targeting Web3 and cryptocurrency-related businesses with malware written in the Nim programming language, underscoring a […]
- That Network Traffic Looks Legit, But it Could be Hiding a Serious Threatby info@thehackernews.com (The Hacker News) (The Hacker News) on July 2, 2025 at 11:00 am
With nearly 80% of cyber threats now mimicking legitimate user behavior, how are top SOCs determining what’s legitimate traffic and what is potentially dangerous? Where do you […]
- Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaignsby info@thehackernews.com (The Hacker News) (The Hacker News) on July 2, 2025 at 10:45 am
Cybersecurity researchers are calling attention to phishing campaigns that impersonate popular brands and trick targets into calling phone numbers operated by threat actors. “A […]
- U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomwareby info@thehackernews.com (The Hacker News) (The Hacker News) on July 2, 2025 at 8:56 am
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has levied sanctions against Russia-based bulletproof hosting (BPH) service provider Aeza Group to […]
- Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scaleby info@thehackernews.com (The Hacker News) (The Hacker News) on July 2, 2025 at 5:48 am
Unknown threat actors have been observed weaponizing v0, a generative artificial intelligence (AI) tool from Vercel, to design fake sign-in pages that impersonate their legitimate […]
- Critical Vulnerability in Anthropic’s MCP Exposes Developer Machines to Remote Exploitsby info@thehackernews.com (The Hacker News) (The Hacker News) on July 1, 2025 at 6:03 pm
Cybersecurity researchers have discovered a critical security vulnerability in artificial intelligence (AI) company Anthropic’s Model Context Protocol (MCP) Inspector project that […]
- TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaignsby info@thehackernews.com (The Hacker News) (The Hacker News) on July 1, 2025 at 4:26 pm
Cybersecurity researchers have flagged the tactical similarities between the threat actors behind the RomCom RAT and a cluster that has been observed delivering a loader dubbed […]
- New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Statusby info@thehackernews.com (The Hacker News) (The Hacker News) on July 1, 2025 at 1:51 pm
A new study of integrated development environments (IDEs) like Microsoft Visual Studio Code, Visual Studio, IntelliJ IDEA, and Cursor has revealed weaknesses in how they handle […]
- A New Maturity Model for Browser Security: Closing the Last-Mile Riskby info@thehackernews.com (The Hacker News) (The Hacker News) on July 1, 2025 at 11:00 am
Despite years of investment in Zero Trust, SSE, and endpoint protection, many enterprises are still leaving one critical layer exposed: the browser. It’s where 85% of modern […]
- Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security Updateby info@thehackernews.com (The Hacker News) (The Hacker News) on July 1, 2025 at 8:55 am
Google has released security updates to address a vulnerability in its Chrome browser for which an exploit exists in the wild. The zero-day vulnerability, tracked as CVE-2025-6554 […]
- U.S. Arrests Facilitator in North Korean IT Worker Scheme; Seizes 29 Domains and Raids 21 Laptop Farmsby info@thehackernews.com (The Hacker News) (The Hacker News) on July 1, 2025 at 7:53 am
The U.S. Department of Justice (DoJ) on Monday announced sweeping actions targeting the North Korean information technology (IT) worker scheme, leading to the arrest of one […]
- Microsoft Removes Password Management from Authenticator App Starting August 2025by info@thehackernews.com (The Hacker News) (The Hacker News) on July 1, 2025 at 4:21 am
Microsoft has said that it’s ending support for passwords in its Authenticator app starting August 1, 2025. Microsoft’s move is part of a much larger shift away from traditional […]
- U.S. Agencies Warn of Rising Iranian Cyber Attacks on Defense, OT Networks, and Critical Infrastructureby info@thehackernews.com (The Hacker News) (The Hacker News) on June 30, 2025 at 4:29 pm
U.S. cybersecurity and intelligence agencies have issued a joint advisory warning of potential cyber attacks from Iranian state-sponsored or affiliated threat actors. “Over the […]
- Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspectsby info@thehackernews.com (The Hacker News) (The Hacker News) on June 30, 2025 at 3:17 pm
Europol on Monday announced the takedown of a cryptocurrency investment fraud ring that laundered €460 million ($540 million) from more than 5,000 victims across the world. The […]
- Blind Eagle Uses Proton66 Hosting for Phishing, RAT Deployment on Colombian Banksby info@thehackernews.com (The Hacker News) (The Hacker News) on June 30, 2025 at 1:30 pm
The threat actor known as Blind Eagle has been attributed with high confidence to the use of the Russian bulletproof hosting service Proton66. Trustwave SpiderLabs, in a report […]
- Leveraging Credentials As Unique Identifiers: A Pragmatic Approach To NHI Inventories by info@thehackernews.com (The Hacker News) (The Hacker News) on June 30, 2025 at 11:00 am
Identity-based attacks are on the rise. Attacks in which malicious actors assume the identity of an entity to easily gain access to resources and sensitive data have been […]
- ⚡ Weekly Recap: Airline Hacks, Citrix 0-Day, Outlook Malware, Banking Trojans and moreby info@thehackernews.com (The Hacker News) (The Hacker News) on June 30, 2025 at 10:16 am
Ever wonder what happens when attackers don’t break the rules—they just follow them better than we do? When systems work exactly as they’re built to, but that “by […]
- FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineeringby info@thehackernews.com (The Hacker News) (The Hacker News) on June 28, 2025 at 9:48 am
The U.S. Federal Bureau of Investigation (FBI) has revealed that it has observed the notorious cybercrime group Scattered Spider broadening its targeting footprint to strike the […]
- GIFTEDCROOK Malware Evolves: From Browser Stealer to Intelligence-Gathering Toolby info@thehackernews.com (The Hacker News) (The Hacker News) on June 28, 2025 at 7:58 am
The threat actor behind the GIFTEDCROOK malware has made significant updates to turn the malicious program from a basic browser data stealer to a potent intelligence-gathering […]
- Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concernsby info@thehackernews.com (The Hacker News) (The Hacker News) on June 28, 2025 at 7:19 am
Facebook, the social network platform owned by Meta, is asking for users to upload pictures from their phones to suggest collages, recaps, and other ideas using artificial […]
- Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaignby info@thehackernews.com (The Hacker News) (The Hacker News) on June 27, 2025 at 3:58 pm
Threat hunters have discovered a network of more than 1,000 compromised small office and home office (SOHO) devices that have been used to facilitate a prolonged cyber espionage […]
- PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attackby info@thehackernews.com (The Hacker News) (The Hacker News) on June 27, 2025 at 1:25 pm
A China-linked threat actor known as Mustang Panda has been attributed to a new cyber espionage campaign directed against the Tibetan community. The spear-phishing attacks […]
- Business Case for Agentic AI SOC Analystsby info@thehackernews.com (The Hacker News) (The Hacker News) on June 27, 2025 at 11:00 am
Security operations centers (SOCs) are under pressure from both sides: threats are growing more complex and frequent, while security budgets are no longer keeping pace. Today’s […]
- Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkitby info@thehackernews.com (The Hacker News) (The Hacker News) on June 27, 2025 at 10:25 am
A new campaign has been observed leveraging fake websites advertising popular software such as WPS Office, Sogou, and DeepSeek to deliver Sainbox RAT and the open-source Hidden […]
- MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targetedby info@thehackernews.com (The Hacker News) (The Hacker News) on June 27, 2025 at 7:43 am
Threat intelligence firm GreyNoise is warning of a “notable surge” in scanning activity targeting Progress MOVEit Transfer systems starting May 27, 2025—suggesting that […]