
- A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forcesby info@thehackernews.com (The Hacker News) (The Hacker News) on November 4, 2025 at 5:25 pm
The nascent collective that combines three prominent cybercrime groups, Scattered Spider, LAPSUS$, and ShinyHunters, has created no less than 16 Telegram channels since August 8, […]
- Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweepby info@thehackernews.com (The Hacker News) (The Hacker News) on November 4, 2025 at 3:57 pm
Nine people have been arrested in connection with a coordinated law enforcement operation that targeted a cryptocurrency money laundering network that defrauded victims of €600 […]
- Critical React Native CLI Flaw Exposed Millions of Developers to Remote Attacksby info@thehackernews.com (The Hacker News) (The Hacker News) on November 4, 2025 at 2:24 pm
Details have emerged about a now-patched critical security flaw in the popular “@react-native-community/cli” npm package that could be potentially exploited to run malicious […]
- Microsoft Teams Bugs Let Attackers Impersonate Colleagues and Edit Messages Unnoticedby info@thehackernews.com (The Hacker News) (The Hacker News) on November 4, 2025 at 2:00 pm
Cybersecurity researchers have disclosed details of four security flaws in Microsoft Teams that could have exposed users to serious impersonation and social engineering attacks. […]
- Ransomware Defense Using the Wazuh Open Source Platformby info@thehackernews.com (The Hacker News) (The Hacker News) on November 4, 2025 at 11:06 am
Ransomware is malicious software designed to block access to a computer system or encrypt data until a ransom is paid. This cyberattack is one of the most prevalent and damaging […]
- Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectorsby info@thehackernews.com (The Hacker News) (The Hacker News) on November 4, 2025 at 10:49 am
Threat actors are leveraging weaponized attachments distributed via phishing emails to deliver malware likely targeting the defense sector in Russia and Belarus. According to […]
- Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKitby info@thehackernews.com (The Hacker News) (The Hacker News) on November 4, 2025 at 8:10 am
Google’s artificial intelligence (AI)-powered cybersecurity agent called Big Sleep has been credited by Apple for discovering as many as five different security flaws in the […]
- U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacksby info@thehackernews.com (The Hacker News) (The Hacker News) on November 4, 2025 at 7:45 am
Federal prosecutors in the U.S. have accused a trio of allegedly hacking the networks of five U.S. companies with BlackCat (aka ALPHV) ransomware between May and November 2023 and […]
- Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channelby info@thehackernews.com (The Hacker News) (The Hacker News) on November 4, 2025 at 5:58 am
Microsoft has disclosed details of a novel backdoor dubbed SesameOp that uses OpenAI Assistants Application Programming Interface (API) for command-and-control (C2) […]
- Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Aliveby info@thehackernews.com (The Hacker News) (The Hacker News) on November 3, 2025 at 6:08 pm
Cybersecurity researchers have flagged a new malicious extension in the Open VSX registry that harbors a remote access trojan called SleepyDuck. According to Secure Annex’s John […]
- Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networksby info@thehackernews.com (The Hacker News) (The Hacker News) on November 3, 2025 at 1:18 pm
Bad actors are increasingly training their sights on trucking and logistics companies with an aim to infect them with remote monitoring and management (RMM) software for financial […]
- ⚡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & Moreby info@thehackernews.com (The Hacker News) (The Hacker News) on November 3, 2025 at 12:56 pm
Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage of new security problems—some just […]
- The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security Operationsby info@thehackernews.com (The Hacker News) (The Hacker News) on November 3, 2025 at 11:56 am
Security Operations Centers (SOC) today are overwhelmed. Analysts handle thousands of alerts every day, spending much time chasing false positives and adjusting detection rules […]
- Researchers Uncover BankBot-YNRK and DeliveryRAT Android Trojans Stealing Financial Databy info@thehackernews.com (The Hacker News) (The Hacker News) on November 3, 2025 at 11:14 am
Cybersecurity researchers have shed light on two different Android trojans called BankBot-YNRK and DeliveryRAT that are capable of harvesting sensitive data from compromised […]
- New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Koreaby info@thehackernews.com (The Hacker News) (The Hacker News) on November 3, 2025 at 10:42 am
The North Korea-linked threat actor known as Kimsuky has distributed a previously undocumented backdoor codenamed HttpTroy as part of a likely spear-phishing attack targeting a […]
- ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerabilityby info@thehackernews.com (The Hacker News) (The Hacker News) on November 1, 2025 at 1:43 pm
The Australian Signals Directorate (ASD) has issued a bulletin about ongoing cyber attacks targeting unpatched Cisco IOS XE devices in the country with a previously undocumented […]
- OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automaticallyby info@thehackernews.com (The Hacker News) (The Hacker News) on October 31, 2025 at 5:19 pm
OpenAI has announced the launch of an “agentic security researcher” that’s powered by its GPT-5 large language model (LLM) and is programmed to emulate a human expert capable of […]
- Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attackby info@thehackernews.com (The Hacker News) (The Hacker News) on October 31, 2025 at 4:08 pm
A suspected nation-state threat actor has been linked to the distribution of a new malware called Airstalk as part of a likely supply chain attack. Palo Alto Networks Unit 42 said […]
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomatsby info@thehackernews.com (The Hacker News) (The Hacker News) on October 31, 2025 at 1:57 pm
A China-affiliated threat actor known as UNC6384 has been linked to a fresh set of attacks exploiting an unpatched Windows shortcut vulnerability to target European diplomatic and […]
- China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systemsby info@thehackernews.com (The Hacker News) (The Hacker News) on October 31, 2025 at 1:26 pm
The exploitation of a recently disclosed critical security flaw in Motex Lanscope Endpoint Manager has been attributed to a cyber espionage group known as Tick. The vulnerability, […]
- The MSP Cybersecurity Readiness Guide: Turning Security into Growthby info@thehackernews.com (The Hacker News) (The Hacker News) on October 31, 2025 at 11:30 am
MSPs are facing rising client expectations for strong cybersecurity and compliance outcomes, while threats grow more complex and regulatory demands evolve. Meanwhile, clients are […]
- CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Serversby info@thehackernews.com (The Hacker News) (The Hacker News) on October 31, 2025 at 8:46 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA), along with international partners from Australia and Canada, have released […]
- Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discoveryby info@thehackernews.com (The Hacker News) (The Hacker News) on October 31, 2025 at 8:02 am
Eclipse Foundation, which maintains the open-source Open VSX project, said it has taken steps to revoke a small number of tokens that were leaked within Visual Studio Code (VS […]
- CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacksby info@thehackernews.com (The Hacker News) (The Hacker News) on October 31, 2025 at 7:09 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Broadcom VMware Tools and VMware Aria Operations to its […]
- A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Doby info@thehackernews.com (The Hacker News) (The Hacker News) on October 31, 2025 at 3:37 am
A design firm is editing a new campaign video on a MacBook Pro. The creative director opens a collaboration app that quietly requests microphone and camera permissions. MacOS is […]
