The Hacker News

New EDDIESTEALER Malware Bypasses Chrome's App-Bound En...

A new malware campaign is distributing a novel Rust-based information stealer du...

China-Linked Hackers Exploit SAP and SQL Server Flaws i...

The China-linked threat actor behind the recent in-the-wild exploitation of a cr...

From the "Department of No" to a "Culture of Yes": A He...

Breaking Out of the Security Mosh Pit When Jason Elrod, CISO of MultiCare Health...

U.S. Sanctions Funnull for $200M Romance Baiting Scams ...

The U.S. Department of Treasury's Office of Foreign Assets Control (OFAC) has le...

ConnectWise Hit by Cyberattack; Nation-State Actor Susp...

ConnectWise, the developer of remote access and support software ScreenConnect, ...

Meta Disrupts Influence Ops Targeting Romania, Azerbaij...

Meta on Thursday revealed that it disrupted three covert influence operations or...

Cybercriminals Target AI Users with Malware-Loaded Inst...

Fake installers for popular artificial intelligence (AI) tools like OpenAI ChatG...

New Windows RAT Evades Detection for Weeks Using Corrup...

Cybersecurity researchers have taken the wraps off an unusual cyber attack that ...

DragonForce Exploits SimpleHelp Flaws to Deploy Ransomw...

The threat actors behind the DragonForce ransomware gained access to an unnamed ...

Chinese APT41 Exploits Google Calendar for Malware Comm...

Google on Wednesday disclosed that the Chinese state-sponsored threat actor know...

Over 100,000 WordPress Sites at Risk from Critical CVSS...

Cybersecurity researchers have disclosed a critical unpatched security flaw impa...

Iranian Hacker Pleads Guilty in $19 Million Robbinhood ...

An Iranian national has pleaded guilty in the U.S. over his involvement in an in...

Czech Republic Blames China-Linked APT31 Hackers for 20...

The Czech Republic on Wednesday formally accused a threat actor associated with ...

Microsoft OneDrive File Picker Flaw Grants Apps Full Cl...

Cybersecurity researchers have discovered a security flaw in Microsoft's OneDriv...

New PumaBot Botnet Targets Linux IoT Devices to Steal S...

Embedded Linux-based Internet of Things (IoT) devices have become the target of ...

From Infection to Access: A 24-Hour Timeline of a Moder...

Stealer malware no longer just steals passwords. In 2025, it steals live session...

Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Dep...

A financially motivated threat actor has been observed exploiting a recently dis...

How 'Browser-in-the-Middle' Attacks Steal Sessions in S...

Would you expect an end user to log on to a cybercriminal’s computer, open their...

251 Amazon-Hosted IPs Used in Exploit Scan Targeting Co...

Cybersecurity researchers have disclosed details of a coordinated cloud-based sc...

Apple Blocks $9 Billion in Fraud Over 5 Years Amid Risi...

Apple on Tuesday revealed that it prevented over $9 billion in fraudulent transa...

New Self-Spreading Malware Infects Docker Containers to...

Misconfigured Docker API instances have become the target of a new malware campa...

Cybercriminals Clone Antivirus Site to Spread Venom RAT...

Cybersecurity researchers have disclosed a new malicious campaign that uses a fa...

Russian Hackers Breach 20+ NGOs Using Evilginx Phishing...

Microsoft has shed light on a previously undocumented cluster of threat activity...

AI Agents and the Non‑Human Identity Crisis: How to Dep...

Artificial intelligence is driving a massive shift in enterprise productivity, f...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.