The Hacker News

New OpenSSH Flaws Enable Man-in-the-Middle and DoS Atta...

Two security vulnerabilities have been discovered in the OpenSSH secure networki...

Chinese Hackers Exploit MAVInject.exe to Evade Detectio...

The Chinese state-sponsored threat actor known as Mustang Panda has been observe...

New FrigidStealer Malware Targets macOS Users via Fake ...

Cybersecurity researchers are alerting to a new campaign that leverages web inje...

Juniper Session Smart Routers Vulnerability Could Let A...

Juniper Networks has released security updates to address a critical security fl...

Debunking the AI Hype: Inside Real Hacker Tactics

Is AI really reshaping the cyber threat landscape, or is the constant drumbeat o...

Winnti APT41 Targets Japanese Firms in RevivalStone Cyb...

The China-linked threat actor known as Winnti has been attributed to a new campa...

New Xerox Printer Flaws Could Let Attackers Capture Win...

Security vulnerabilities have been disclosed in Xerox VersaLink C7025 Multifunct...

Cybercriminals Exploit Onerror Event in Image Tags to D...

Cybersecurity researchers have flagged a credit card stealing malware campaign t...

Microsoft Uncovers New XCSSET macOS Malware Variant wit...

Microsoft said it has discovered a new variant of a known Apple macOS malware ca...

South Korea Suspends DeepSeek AI Downloads Over Privacy...

South Korea has formally suspended new downloads of Chinese artificial intellige...

CISO's Expert Guide To CTEM And Why It Matters

Cyber threats evolve—has your defense strategy kept up? A new free guide availab...

⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hac...

Welcome to this week’s Cybersecurity News Recap. Discover how cyber attackers ar...

New Golang-Based Backdoor Uses Telegram Bot API for Eva...

Cybersecurity researchers have shed light on a new Golang-based backdoor that us...

Android's New Feature Blocks Fraudsters from Sideloadin...

Google is working on a new security feature for Android that blocks device owner...

New “whoAMI” Attack Exploits AWS AMI Name Confusion for...

Cybersecurity researchers have disclosed a new type of name confusion attack cal...

Lazarus Group Deploys Marstech1 JavaScript Implant in T...

The North Korean threat actor known as the Lazarus Group has been linked to a pr...

AI-Powered Social Engineering: Ancillary Tools and Tech...

Social engineering is advancing fast, at the speed of generative AI. This is off...

Microsoft: Russian-Linked Hackers Using 'Device Code Ph...

Microsoft is calling attention to an emerging threat cluster it calls Storm-2372...

RansomHub Becomes 2024’s Top Ransomware Group, Hitting ...

The threat actors behind the RansomHub ransomware-as-a-service (RaaS) scheme hav...

PostgreSQL Vulnerability Exploited Alongside BeyondTrus...

Threat actors who were behind the exploitation of a zero-day vulnerability in Be...

Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass...

A widespread phishing campaign has been observed leveraging bogus PDF documents ...

North Korean APT43 Uses PowerShell and Dropbox in Targe...

A nation-state threat actor with ties to North Korea has been linked to an ongoi...

Fast Deployments, Secure Code: Watch this Learn to Sync...

Ever felt like your team is stuck in a constant battle? Developers rush to add n...

RA World Ransomware Attack in South Asia Links to Chine...

An RA World ransomware attack in November 2024 targeting an unnamed Asian softwa...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.