
- U.S. Treasury Lifts Tornado Cash Sanctions Amid North Korea Money Laundering Probeby info@thehackernews.com (The Hacker News) (The Hacker News) on March 22, 2025 at 7:32 am
The U.S. Treasury Department has announced that it’s removing sanctions against Tornado Cash, a cryptocurrency mixer service that has been accused of aiding the North Korea-linked […]
- UAT-5918 Targets Taiwan’s Critical Infrastructure Using Web Shells and Open-Source Toolsby info@thehackernews.com (The Hacker News) (The Hacker News) on March 21, 2025 at 1:54 pm
Threat hunters have uncovered a new threat actor named UAT-5918 that has been attacking critical infrastructure entities in Taiwan since at least 2023. “UAT-5918, a threat actor […]
- Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificatesby info@thehackernews.com (The Hacker News) (The Hacker News) on March 21, 2025 at 12:58 pm
The threat actors behind the Medusa ransomware-as-a-service (RaaS) operation have been observed using a malicious driver dubbed ABYSSWORKER as part of a bring your own vulnerable […]
- 10 Critical Network Pentest Findings IT Teams Overlookby info@thehackernews.com (The Hacker News) (The Hacker News) on March 21, 2025 at 11:01 am
After conducting over 10,000 automated internal network penetration tests last year, vPenTest has uncovered a troubling reality that many businesses still have critical security […]
- China-Linked APT Aquatic Panda: 10-Month Campaign, 7 Global Targets, 5 Malware Familiesby info@thehackernews.com (The Hacker News) (The Hacker News) on March 21, 2025 at 11:01 am
The China-linked advanced persistent threat (APT) group known as Aquatic Panda has been linked to a “global espionage campaign” that took place in 2022 targeting seven […]
- Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Serversby info@thehackernews.com (The Hacker News) (The Hacker News) on March 21, 2025 at 10:28 am
Two known threat activity clusters codenamed Head Mare and Twelve have likely joined forces to target Russian entities, new findings from Kaspersky reveal. “Head Mare relied […]
- Ongoing Cyber Attacks Exploit Critical Vulnerabilities in Cisco Smart Licensing Utilityby info@thehackernews.com (The Hacker News) (The Hacker News) on March 21, 2025 at 5:09 am
Two now-patched security flaws impacting Cisco Smart Licensing Utility are seeing active exploitation attempts, according to SANS Internet Storm Center. The two critical-rated […]
- YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Usersby info@thehackernews.com (The Hacker News) (The Hacker News) on March 20, 2025 at 3:39 pm
YouTube videos promoting game cheats are being used to deliver a previously undocumented stealer malware called Arcane likely targeting Russian-speaking users. “What’s intriguing […]
- Veeam and IBM Release Patches for High-Risk Flaws in Backup and AIX Systemsby info@thehackernews.com (The Hacker News) (The Hacker News) on March 20, 2025 at 1:43 pm
Veeam has released security updates to address a critical security flaw impacting its Backup & Replication software that could lead to remote code execution. The […]
- How to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility Modelby info@thehackernews.com (The Hacker News) (The Hacker News) on March 20, 2025 at 11:25 am
Cybersecurity isn’t just another checkbox on your business agenda. It’s a fundamental pillar of survival. As organizations increasingly migrate their operations to the cloud, […]
- Six Governments Likely Use Israeli Paragon Spyware to Hack IM Apps and Harvest Databy info@thehackernews.com (The Hacker News) (The Hacker News) on March 20, 2025 at 10:56 am
The governments of Australia, Canada, Cyprus, Denmark, Israel, and Singapore are likely customers of spyware developed by Israeli company Paragon Solutions, according to a new […]
- Why Continuous Compliance Monitoring Is Essential For IT Managed Service Providersby info@thehackernews.com (The Hacker News) (The Hacker News) on March 20, 2025 at 10:00 am
Regulatory compliance is no longer just a concern for large enterprises. Small and mid-sized businesses (SMBs) are increasingly subject to strict data protection and security […]
- CISA Adds NAKIVO Vulnerability to KEV Catalog Amid Active Exploitationby info@thehackernews.com (The Hacker News) (The Hacker News) on March 20, 2025 at 9:43 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity security flaw impacting NAKIVO Backup & Replication software to its Known Exploited […]
- CERT-UA Warns: Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal Messagesby info@thehackernews.com (The Hacker News) (The Hacker News) on March 20, 2025 at 6:08 am
The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of a new campaign that targets the defense sectors with Dark Crystal RAT (aka DCRat). The campaign, detected […]
- Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Minersby info@thehackernews.com (The Hacker News) (The Hacker News) on March 19, 2025 at 3:52 pm
Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurrency miners and remote access trojans (RATs) like Quasar RAT. The vulnerability, assigned the CVE […]
- Leaked Black Basta Chats Suggest Russian Officials Aided Leader’s Escape from Armeniaby info@thehackernews.com (The Hacker News) (The Hacker News) on March 19, 2025 at 1:50 pm
The recently leaked trove of internal chat logs among members of the Black Basta ransomware operation has revealed possible connections between the e-crime gang and Russian […]
- Watch This Webinar to Learn How to Eliminate Identity-Based AttacksβBefore They Happenby info@thehackernews.com (The Hacker News) (The Hacker News) on March 19, 2025 at 11:35 am
In todayβs digital world, security breaches are all too common. Despite the many security tools and training programs available, identity-based attacksβlike phishing, […]
- ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealersby info@thehackernews.com (The Hacker News) (The Hacker News) on March 19, 2025 at 10:59 am
The threat actors behind the ClearFake campaign are using fake reCAPTCHA or Cloudflare Turnstile verifications as lures to trick users into downloading malware such as Lumma […]
- 5 Identity Threat Detection & Response Must-Haves for Super SaaS Securityby info@thehackernews.com (The Hacker News) (The Hacker News) on March 19, 2025 at 10:30 am
Identity-based attacks are on the rise. Attackers are targeting identities with compromised credentials, hijacked authentication methods, and misused privileges. While many threat […]
- Critical mySCADA myPRO Flaws Could Let Attackers Take Over Industrial Control Systemsby info@thehackernews.com (The Hacker News) (The Hacker News) on March 19, 2025 at 6:59 am
Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a Supervisory Control and Data Acquisition (SCADA) system used in operational […]
- CISA Warns of Active Exploitation in GitHub Action Supply Chain Compromiseby info@thehackernews.com (The Hacker News) (The Hacker News) on March 19, 2025 at 5:05 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a vulnerability linked to the supply chain compromise of the GitHub Action, […]
- New βRules File Backdoorβ Attack Lets Hackers Inject Malicious Code via AI Code Editorsby info@thehackernews.com (The Hacker News) (The Hacker News) on March 18, 2025 at 3:43 pm
Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that affects artificial intelligence (AI)-powered code editors like […]
- Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017by info@thehackernews.com (The Hacker News) (The Hacker News) on March 18, 2025 at 2:09 pm
An unpatched security flaw impacting Microsoft Windows has been exploited by 11 state-sponsored groups from China, Iran, North Korea, and Russia as part of data theft, espionage, […]
- Google Acquires Wiz for $32 Billion in Its Biggest Deal Ever to Boost Cloud Securityby info@thehackernews.com (The Hacker News) (The Hacker News) on March 18, 2025 at 2:00 pm
Google is making the biggest ever acquisition in its history by purchasing cloud security company Wiz in an all-cash deal worth $32 billion. “This acquisition represents an […]
- New Critical AMI BMC Vulnerability Enables Remote Server Takeover and Brickingby info@thehackernews.com (The Hacker News) (The Hacker News) on March 18, 2025 at 1:31 pm
A critical security vulnerability has been disclosed in AMI’s MegaRAC Baseboard Management Controller (BMC) software that could allow an attacker to bypass authentication and […]