The Hacker News

Google Fixed Cloud Run Vulnerability Allowing Unauthori...

Cybersecurity researchers have disclosed details of a now-patched privilege esca...

Helping Your Clients Achieve NIST Compliance: A Step by...

Introduction As the cybersecurity landscape evolves, service providers play an i...

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacki...

Cybersecurity researchers have shed light on an "auto-propagating" cryptocurrenc...

How SSL Misconfigurations Impact Your Attack Surface

When assessing an organization’s external attack surface, encryption-related iss...

FIN7 Deploys Anubis Backdoor to Hijack Windows Systems ...

The financially motivated threat actor known as FIN7 has been linked to a Python...

New Malware Loaders Use Call Stack Spoofing, GitHub C2,...

Cybersecurity researchers have discovered an updated version of a malware loader...

Over 1,500 PostgreSQL Servers Compromised in Fileless C...

Exposed PostgreSQL instances are the target of an ongoing campaign designed to g...

Enterprise Gmail Users Can Now Send End-to-End Encrypte...

On the 21st birthday of Gmail, Google has announced a major update that allows e...

Lucid PhaaS Hits 169 Targets in 88 Countries Using iMes...

A new sophisticated phishing-as-a-service (PhaaS) platform called Lucid has targ...

Apple Backports Critical Fixes for 3 Recent 0-Days Impa...

Apple on Monday backported fixes for three vulnerabilities that have come under ...

Apple Backports Critical Fixes for 3 Live Exploits Impa...

Apple on Monday backported fixes for three vulnerabilities that have come under ...

Nearly 24,000 IPs Target PAN-OS GlobalProtect in Coordi...

Cybersecurity researchers are warning of a spike in suspicious login scanning ac...

New Case Study: Global Retailer Overshares CSRF Tokens ...

Are your security tokens truly secure? Explore how Reflectiz helped a giant reta...

China-Linked Earth Alux Uses VARGEIT and COBEACON in Mu...

Cybersecurity researchers have shed light on a new China-linked threat actor cal...

Researchers Uncover 46 Critical Flaws in Solar Power Sy...

Cybersecurity researchers have disclosed 46 new security flaws in products from ...

Apple Fined €150 Million by French Regulator Over Discr...

Apple has been hit with a fine of €150 million ($162 million) by France's compet...

Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin...

The threat actors behind the zero-day exploitation of a recently-patched securit...

Hackers Exploit WordPress mu-Plugins to Inject Spam and...

Threat actors are using the "mu-plugins" directory in WordPress sites to conceal...

⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar ...

Every week, someone somewhere slips up—and threat actors slip in. A misconfigure...

5 Impactful AWS Vulnerabilities You're Responsible For

If you're using AWS, it's easy to assume your cloud security is handled - but th...

Russia-Linked Gamaredon Uses Troop-Related Lures to Dep...

Entities in Ukraine have been targeted as part of a phishing campaign designed t...

RESURGE Malware Exploits Ivanti Flaw with Rootkit and W...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light ...

New Android Trojan Crocodilus Abuses Accessibility to S...

Cybersecurity researchers have discovered a new Android banking malware called C...

New Security Flaws Found in VMware Tools and CrushFTP —...

Broadcom has issued security patches to address a high-severity security flaw in...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.