The Hacker News

Ransomware Extortion Drops to $813.5M in 2024, Down fro...

Ransomware attacks netted cybercrime groups a total of $813.5 million in 2024, a...

SparkCat Malware Uses OCR to Extract Crypto Wallet Reco...

A new malware campaign dubbed SparkCat has leveraged a suit of bogus apps on bot...

The Evolving Role of PAM in Cybersecurity Leadership Ag...

Privileged Access Management (PAM) has emerged as a cornerstone of modern cybers...

North Korean APT Kimsuky Uses forceCopy Malware to Stea...

The North Korea-linked nation-state hacking group known as Kimsuky has been obse...

Top 3 Ransomware Threats Active in 2025

You arrive at the office, power up your system, and panic sets in. Every file is...

Cisco Patches Critical ISE Vulnerabilities Enabling Roo...

Cisco has released updates to address two critical security flaws Identity Servi...

Cross-Platform JavaScript Stealer Targets Crypto Wallet...

The North Korea-linked Lazarus Group has been linked to an active campaign that ...

Cybercriminals Use Go Resty and Node Fetch in 13 Millio...

Cybercriminals are increasingly leveraging legitimate HTTP client tools to facil...

Silent Lynx Using PowerShell, Golang, and C++ Loaders i...

A previously undocumented threat actor known as Silent Lynx has been linked to c...

New Veeam Flaw Allows Arbitrary Code Execution via Man-...

Veeam has released patches to address a critical security flaw impacting its Bac...

Navigating the Future: Key IT Vulnerability Management ...

As the cybersecurity landscape continues to evolve, proactive vulnerability mana...

AsyncRAT Campaign Uses Python Payloads and TryCloudflar...

A malware campaign has been observed delivering a remote access trojan (RAT) nam...

CISA Adds Four Actively Exploited Vulnerabilities to KE...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday adde...

Malicious Go Package Exploits Module Mirror Caching for...

Cybersecurity researchers have called attention to a software supply chain attac...

Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypa...

A recently patched security vulnerability in the 7-Zip archiver tool was exploit...

North Korean Hackers Deploy FERRET Malware via Fake Job...

The North Korean threat actors behind the Contagious Interview campaign have bee...

Watch Out For These 8 Cloud Security Shifts in 2025

As cloud security evolves in 2025 and beyond, organizations must adapt to both n...

Taiwan Bans DeepSeek AI Over National Security Concerns...

Taiwan has become the latest country to ban government agencies from using Chine...

AMD SEV-SNP Vulnerability Allows Malicious Microcode In...

A security vulnerability has been disclosed in AMD's Secure Encrypted Virtualiza...

Microsoft Patches Critical Azure AI Face Service Vulner...

Microsoft has released patches to address two Critical-rated security flaws impa...

Google Patches 47 Android Security Flaws, Including Act...

Google has shipped patches to address 47 security flaws in its Android operating...

Microsoft SharePoint Connector Flaw Could've Enabled Cr...

Cybersecurity researchers have disclosed details of a now-patched vulnerability ...

768 CVEs Exploited in 2024, Reflecting a 20% Increase f...

As many as 768 vulnerabilities with designated CVE identifiers were reported as ...

PyPI Introduces Archival Status to Alert Users About Un...

The maintainers of the Python Package Index (PyPI) registry have announced a new...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.