The Hacker News May 2, 2025 TikTok Slammed With €530 Million GDPR Fine for Sending E.U. Data to China TikTok fined €530M for illegally transferring EEA user data to China, violating GDPR Article 46(1).
The Hacker News May 2, 2025 How to Automate CVE and Vulnerability Advisory Response with Tines Workflow slashes CVE ticketing time by 60% using Tines, CrowdStrike, and ServiceNow for faster action.
The Hacker News May 2, 2025 MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks Stealth malware MintsLoader delivers GhostWeaver RAT + Evades sandboxes using DGA + Powers data theft via encrypted C2
The Hacker News May 2, 2025 Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support Microsoft now defaults new accounts to passkeys instead of passwords + Safer logins + Reduced phishing risk.
The Hacker News May 1, 2025 Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers Backdoor plugin hijacks WordPress sites with admin access, stealth reinfection, and JS ad fraud—active since Jan 2025.
The Hacker News May 1, 2025 Why top SOC teams are shifting to Network Detection and Response NDR solutions uncover hidden threats missed by legacy tools by analyzing encrypted traffic, lateral movement, and blind spots.
The Hacker News May 1, 2025 Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign Claude AI orchestrated 100 fake personas in global influence campaigns + enabled malware, scams, and brute-force attacks.
The Hacker News May 1, 2025 New Research Reveals: 95% of AppSec Fixes Don’t Reduce Risk 95–98% of AppSec alerts are noise — wasting time, straining dev teams, and weakening real threat response
The Hacker News May 1, 2025 DarkWatchman, Sheriff Malware Hit Russia and Ukraine with Stealth and Nation-Grade Tactics Phishing attacks deliver DarkWatchman and Sheriff malware; targets span Russia, Ukraine, Baltics, with stealth and persistence tactics.
The Hacker News May 1, 2025 Commvault Confirms Hackers Exploited CVE-2025-3928 as Zero-Day in Azure Breach Commvault confirms Azure breach via CVE-2025-3928 zero-day + no data loss + CISA mandates patch by May 19.
The Hacker News May 1, 2025 SonicWall Confirms Active Exploitation of Flaws Affecting Multiple Appliance Models SonicWall confirms wild exploitation of CVE-2023-44221 and CVE-2024-38475 in SMA100 devices, risking file access and session hijacking.
The Hacker News April 30, 2025 Experts Uncover Critical MCP and A2A Flaws Enabling AI Tool Hijacking and Data Exfiltration Prompt injection flaws in Anthropic’s MCP and Google’s A2A protocols enable covert data exfiltration and AI manipulation.
The Hacker News April 30, 2025 Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks RomCom RAT uses bulletproof hosting and encrypted C2 for stealth; PRODAFT links it to Russian-speaking APT Nebulous Mantis.
The Hacker News April 30, 2025 [Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats AI-powered impersonation is exploiting weak identity recovery and enrollment processes—learn how to secure them.
The Hacker News April 30, 2025 Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool Spellbinder used since 2022 to hijack Chinese software updates via IPv6 spoofing, enabling AitM attacks.
The Hacker News April 30, 2025 Customer Account Takeovers: The Multi-Billion Dollar Problem You Don’t Know About Over 100K accounts exposed monthly + 1.4% takeover rate + session hijacking = rising fraud & churn risks.
The Hacker News April 30, 2025 RansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed Control RansomHub's sudden offline status triggered affiliate migration to Qilin and cartel shifts, signaling major RaaS disruption.
The Hacker News April 30, 2025 Meta Launches LlamaFirewall Framework to Stop AI Jailbreaks, Injections, and Insecure Code Meta debuts LlamaFirewall with PromptGuard 2 and CyberSecEval 4 to defend AI from injection attacks and insecure code threats.
The Hacker News April 30, 2025 Indian Court Orders Action to Block Proton Mail Over AI Deepfake Abuse Allegations Indian court orders blocking of Proton Mail citing AI deepfakes and explicit emails, triggering national privacy concerns.
The Hacker News April 29, 2025 WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy WhatsApp launches Private Processing using CVM and OHTTP, ensuring AI-driven message privacy and auditable security.
The Hacker News April 29, 2025 New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI Systems Multiple AI jailbreaks and tool poisoning flaws expose GenAI systems like GPT-4.1 and MCP to critical security risks.
The Hacker News April 29, 2025 SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients SentinelOne uncovers China-linked PurpleHaze attacks and North Korean infiltration attempts amid rising EDR testing abuses.
The Hacker News April 29, 2025 Product Walkthrough: Securing Microsoft Copilot with Reco Find out how Reco keeps Microsoft 365 Copilot safe by spotting risky prompts, protecting data, managing user access, and identifying threats...
The Hacker News April 29, 2025 Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products 75 zero-days exploited in 2024, with 44% hitting enterprise tools and 34 tied to threat groups.
The Hacker News April 29, 2025 Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool Custom malware hidden in UyghurEdit++ targeted WUC leaders since May 2024, exposing Uyghur diaspora surveillance links to China.
The Hacker News April 29, 2025 CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database CISA added Broadcom and Commvault vulnerabilities to KEV after confirming active exploitation.
The Hacker News April 28, 2025 ⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More Ransomware, phishing, supply chain hits — this week’s threats show no signs of slowing down.
The Hacker News April 28, 2025 How Breaches Start: Breaking Down 5 Real Vulns Real-world exploits show how overlooked bugs, like SSRF and IDOR, can trigger massive data breaches.
The Hacker News April 28, 2025 Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft Tools Earth Kurma APT Targets Southeast Asia Governments With Rootkits and Cloud-Based Data Theft Tools
The Hacker News April 28, 2025 WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site Backdoors Cybercriminals are targeting WooCommerce users with fake patch emails that use IDN homograph spoofing to deliver backdoor malware.
The Hacker News April 28, 2025 Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised Threat actors exploited Craft CMS zero-days CVE-2025-32432 and CVE-2024-58136, compromising 300 of 13,000 vulnerable servers.
The Hacker News April 28, 2025 It's Time To Rethink Your Security for the AI Era VPN flaws leave networks exposed + AI boosts threat success + Zero Trust limits attack spread.
The Hacker News April 27, 2025 Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers Storm-1977 used AzureChecker in password spray attacks on education clouds, leading to crypto mining abuse.
The Hacker News April 26, 2025 ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion ToyMaker deploys LAGTOY malware to steal credentials and sell access to CACTUS ransomware groups for double extortion.
The Hacker News April 25, 2025 North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures North Korean hackers use fake crypto firms and job interview lures to spread cross-platform malware targeting IT professionals globally.
The Hacker News April 25, 2025 New Critical SAP NetWeaver Flaw Exploited to Drop Web Shell, Brute Ratel Framework Threat actors exploit SAP NetWeaver flaw + zero-day suspected + CVE-2025-31324 enables file uploads.
The Hacker News April 25, 2025 Why NHIs Are Security's Most Dangerous Blind Spot 23.7M secrets leaked in 2024 + 70% still valid from 2022 expose risks from unmanaged machine identities.
The Hacker News April 25, 2025 Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers CVE-2025-27610 allows unauthenticated access to sensitive files in Rack Ruby apps due to root misconfig.
The Hacker News April 25, 2025 DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks CVE-2025-0282 exploited by Chinese threat actors + DslogdRAT malware installs + 9X ICS scans spike
The Hacker News April 24, 2025 Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Flaws and ThreatNeedle Malware Lazarus exploited zero-days in South Korean software, targeting 6 firms with ThreatNeedle and more.
The Hacker News April 24, 2025 Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools ARMO shows io_uring-based rootkits evade Falco, Tetragon, and Defender, risking Linux runtime security.
The Hacker News April 24, 2025 Automating Zero Trust in Healthcare: From Risk Scoring to Dynamic Policy Enforcement Without Network Redesign 71% of healthcare attacks involve ransomware + 11-day downtime + HIPAA mandates segmentation + Zero Trust critical.
The Hacker News April 24, 2025 159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure 159 CVEs exploited in Q1 2025 + 28.3% within 1 day + Exploits drive 20% of breaches.
The Hacker News April 24, 2025 Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals Darcula adds GenAI tools + Lowers phishing skills barrier + 25,000 scam pages taken down.
The Hacker News April 24, 2025 Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotely Commvault flaw CVE-2025-34028 enables pre-auth SSRF leading to code execution; fix in 11.38.20+ versions.
The Hacker News April 24, 2025 WhatsApp Adds Advanced Chat Privacy to Blocks Chat Exports and Auto-Downloads WhatsApp adds chat export block for privacy + Meta fined €200M by EU for illegal ad consent model.
The Hacker News April 23, 2025 DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack DPRK hackers stole $137M in 2023 from TRON users via phishing, fueling nuclear programs and cyberattacks.
The Hacker News April 23, 2025 Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign UNC2428 used fake Israeli defense job ads in Oct 2024 to deploy MURKYTOUR malware, says Mandiant.
The Hacker News April 23, 2025 Android Spyware Disguised as Alpine Quest App Targets Russian Military Devices Android spyware hidden in Alpine Quest targets Russian military, stealing files and locations via Telegram.
The Hacker News April 23, 2025 Three Reasons Why the Browser is Best for Stopping Phishing Attacks Phishing now causes most breaches + MFA kits bypass detection + browser-based tools offer real-time defense.