All News
The Hacker News

The Hacker News
April 8, 2025
CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation
CrushFTP flaw CVE-2025-31161 exploited since March 30; 815 systems unpatched as agencies race to secure.
The Hacker News
April 8, 2025
Google Releases Android Update to Patch Two Actively Exploited Vulnerabilities
Google patched 62 flaws, including two actively exploited kernel bugs, closing exploit chains used in Android attacks.
The Hacker News
April 7, 2025
CISA and FBI Warn Fast Flux is Powering Resilient Malware, C2, and Phishing Networks
Fast flux exploits DNS gaps to evade takedowns since 2007, enabling resilient malware and phishing operations.
The Hacker News
April 7, 2025
Locking Out Threats: The Evolving Threat of Account Takeovers
MFA bypass attacks surge with session hijacking and token theft, requiring layered defenses to limit breach impact.
The Hacker News
April 7, 2025
⚡ Weekly Recap: VPN Exploits, Oracle's Silent Breach, ClickFix Comeback and More
This week’s THN Recap shows how attackers are outsmarting outdated defenses — and what you can do next.
The Hacker News
April 7, 2025
Security Theater: Vanity Metrics Keep You Busy
Vanity metrics mask real risks; Gartner forecasts CTEM adoption could cut breaches by two-thirds by 2026.
The Hacker News
April 7, 2025
PoisonSeed Exploits CRM Accounts to Launch Cryptocurrency Seed Phrase Poisoning Attacks
PoisonSeed exploits CRM credentials to spread cryptocurrency seed phrase attacks, risking major wallet compromises.
The Hacker News
April 7, 2025
The New Frontier of Security Risk: AI-Generated Credentials
GitHub Copilot adoption rose 27% (2023–2024), causing a 40% spike in secret leaks, widening enterprise attack surfaces.
The Hacker News
April 7, 2025
Supercharging Security & Compliance with AI Copilots
AI copilots streamline security compliance by automating audits, evidence collection, and policy support, improving efficiency by up to 60%.
The Hacker News
April 5, 2025
Microsoft Credits EncryptHub, Hacker Behind 618+ Breaches, for Disclosing Windows Flaws
EncryptHub compromised 618+ targets using Microsoft flaws and custom malware after failed freelance attempts.
The Hacker News
April 5, 2025
North Korean Hackers Deploy BeaverTail Malware via 11 Malicious npm Packages
North Korean actors used 11 npm packages downloaded 5,600+ times to spread BeaverTail malware, expanding attacks to Bitbucket.
The Hacker News
April 5, 2025
Malicious Python Packages on PyPI Downloaded 39,000+ Times, Steal Sensitive Data
Researchers found Disgrasya downloaded 37,217 times, targeting WooCommerce with carding scripts that steal payment data.
The Hacker News
April 4, 2025
SpotBugs Access Token Theft Identified as Root Cause of GitHub Supply Chain Attack
Leaked SpotBugs PAT in November 2024 led to a GitHub supply chain attack, compromising Coinbase in March 2025.
The Hacker News
April 4, 2025
Have We Reached a Distroless Tipping Point?
Chainguard OS cuts container vulnerabilities by 94% by continuously updating upstream packages, enhancing security and efficiency.
The Hacker News
April 4, 2025
Critical Ivanti Flaw Actively Exploited to Deploy TRAILBLAZE and BRUSHFIRE Malware
Ivanti patches CVE-2025-22457 exploited by UNC5221 in March 2025, risking remote code execution and credential theft.
The Hacker News
April 4, 2025
OPSEC Failure Exposes Coquettte’s Malware Campaigns on Bulletproof Hosting Servers
Novice hacker Coquettte exposed through OPSEC failure using Proton66 to distribute malware and illicit content via fake antivirus sites.
The Hacker News
April 4, 2025
CERT-UA Reports Cyberattacks Targeting Ukrainian State Systems with WRECKSTEEL Malware
CERT-UA reports three cyberattacks since fall 2024 using WRECKSTEEL malware to steal Ukrainian state data.
The Hacker News
April 4, 2025
Critical Flaw in Apache Parquet Allows Remote Attackers to Execute Arbitrary Code
Apache Parquet flaw CVE-2025-30065 enables remote code execution from crafted files, risking data pipelines.
The Hacker News
April 3, 2025
Microsoft Warns of Tax-Themed Email Attacks Using PDFs and QR Codes to Deliver Malware
Tax-themed phishing hit 2,300 U.S. firms in Feb 2025 using QR codes and fake login pages.
The Hacker News
April 3, 2025
Lazarus Group Targets Job Seekers With ClickFix Tactic to Deploy GolangGhost Malware
Lazarus Group deploys GolangGhost via fake job interviews using ClickFix, targeting Windows/macOS users with finance roles.
The Hacker News
April 3, 2025
AI Threats Are Evolving Fast — Learn Practical Defense Tactics in this Expert Webinar
AI-driven cyberattacks now clone voices and manipulate data in real time—adapt fast or fall behind.
The Hacker News
April 3, 2025
AI Adoption in the Enterprise: Breaking Through the Security and Compliance Gridlock
Compliance concerns delay AI adoption across enterprises, exposing them to faster, AI-driven cyberattacks.
The Hacker News
April 3, 2025
Google Patches Quick Share Vulnerability Enabling Silent File Transfers Without Consent
Quick Share flaw CVE-2024-10668 bypasses earlier fixes, enabling DoS or unauthorized file delivery.
The Hacker News
April 3, 2025
Triada Malware Preloaded on Counterfeit Android Phones Infects 2,600+ Devices
Triada malware infected 2,600+ Android devices via counterfeit phones in March 2025, enabling remote access and crypto theft.
The Hacker News
April 3, 2025
Legacy Stripe API Exploited to Validate Stolen Payment Cards in Web Skimmer Campaign
Sophisticated skimmer uses legacy Stripe API to validate and steal card data from 49 sites since Aug 2024.
The Hacker News
April 3, 2025
Europol Dismantles Kidflix With 72,000 CSAM Videos Seized in Major Operation
Kidflix had 1.8M users and 91K CSAM videos; Europol's 38-country probe seized 3K+ devices.
The Hacker News
April 2, 2025
Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse
ImageRunner exploit let attackers access private GCP container images; Google patched issue Jan 28, 2025.
The Hacker News
April 2, 2025
Helping Your Clients Achieve NIST Compliance: A Step by Step Guide for Service Providers
93% of service providers struggle with NIST compliance—automation reduces manual work by 70%, boosting efficiency.
The Hacker News
April 2, 2025
Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers
Outlaw malware exploits weak SSH credentials + uses worm-like spread since 2018 + enables cryptojacking.
The Hacker News
April 2, 2025
How SSL Misconfigurations Impact Your Attack Surface
53.5% of websites have weak SSL setups—leaving attack surfaces exposed and increasing breach risk.
The Hacker News
April 2, 2025
FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites
FIN7 deploys Anubis backdoor via malspam to control Windows systems using stealthy, memory-resident payloads.
The Hacker News
April 2, 2025
New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth
Hijack Loader now uses call stack spoofing and ANTIVM modules to bypass detection and persist.
The Hacker News
April 1, 2025
Over 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaign
Over 1,500 PostgreSQL servers compromised via weak credentials and SQL abuse, enabling fileless crypto mining.
The Hacker News
April 1, 2025
Enterprise Gmail Users Can Now Send End-to-End Encrypted Emails to Any Platform
Gmail launches client-side E2EE beta on its 21st birthday, simplifying encryption and boosting admin control.
The Hacker News
April 1, 2025
Lucid PhaaS Hits 169 Targets in 88 Countries Using iMessage and RCS Smishing
Lucid PhaaS hit 169 targets in 88 countries by abusing iMessage and RCS to bypass SMS filters
The Hacker News
April 1, 2025
Apple Backports Critical Fixes for 3 Live Exploits Impacting iOS and macOS Legacy Devices
Apple patched 3 live exploits—CVE-2025-24085, -24200, -24201—across legacy iOS/macOS devices to block escalation attacks.
The Hacker News
April 1, 2025
Nearly 24,000 IPs Target PAN-OS GlobalProtect in Coordinated Login Scan Campaign
23,958 IPs scanned Palo Alto GlobalProtect portals in late March, signaling systemic recon before potential exploits.
The Hacker News
April 1, 2025
Case Study: Are CSRF Tokens Sufficient in Preventing CSRF Attacks?
Misconfigured third-party script exposed CSRF tokens on retailer’s site + Reflectiz detected it + Breach risk averted.
The Hacker News
April 1, 2025
China-Linked Earth Alux Uses VARGEIT and COBEACON in Multi-Stage Cyber Intrusions
Earth Alux used VARGEIT and MASQLOADER in APAC and LATAM cyberattacks, bypassing defenses via stealth techniques.
The Hacker News
April 1, 2025
Apple Fined €150 Million by French Regulator Over Discriminatory ATT Consent Practices
Apple fined €150M for applying double consent only to third parties in ATT, breaching French privacy law.
The Hacker News
March 31, 2025
Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp
Water Gamayun exploited CVE-2025-26633 to deploy SilentPrism, DarkWisp, and stealers with persistence.
The Hacker News
March 31, 2025
Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images
Threat actors hide malware in WordPress mu-Plugins, exploiting 4 CVEs in 2024 to hijack websites.
The Hacker News
March 31, 2025
⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More
Google patched a Chrome 0-day (CVE-2025-2783) used in live attacks on Russian targets via phishing.
The Hacker News
March 31, 2025
5 Impactful AWS Vulnerabilities You're Responsible For
75% of AWS breaches stem from customer misconfigurations + AWS secures infra only + real risk persists.
The Hacker News
March 31, 2025
Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine
Gamaredon targets Ukraine with Remcos RAT via phishing using LNK files tied to reused infrastructure.
The Hacker News
March 31, 2025
What it Means to 'Fight AI with AI' using a Zero Trust Platform
AI worm “Morris II” targets only AI tools, highlighting need for zero trust and smarter patching.
The Hacker News
March 30, 2025
RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features
RESURGE malware exploits Ivanti flaw CVE-2025-0282, adding stealth tools and web shells for persistence.
The Hacker News
March 29, 2025
New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials
Crocodilus Android malware targets Spain and Turkey using overlays, accessibility abuse, and device takeover.
The Hacker News
March 29, 2025
BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability
BlackLock's misconfigured leak site exposed internal commands, aiding Resecurity in uncovering 46 ransomware victims.
The Hacker News
March 28, 2025
Researchers Uncover 46 Critical Flaws in Solar Power Systems From Sungrow, Growatt, and SMA
46 solar inverter flaws in Sungrow, Growatt, SMA expose power grids to botnet attacks, risking blackouts.- 1
- 2
Showing 50 results of 52 — Page 1