The Hacker News

Employees Searching Payroll Portals on Google Tricked I...

Threat hunters have exposed a novel campaign that makes use of search engine opt...

Hackers Are Calling Your Office: FBI Alerts Law Firms t...

The U.S. Federal Bureau of Investigation (FBI) has warned of social engineering ...

Russia-Linked Hackers Target Tajikistan Government with...

The Russia-aligned threat actor known as TAG-110 has been observed conducting a ...

Over 70 Malicious npm and VS Code Packages Found Steali...

As many as 60 malicious npm packages have been discovered in the package registr...

CISO's Guide To Web Privacy Validation And Why It's Imp...

Are your web privacy controls protecting your users, or just a box-ticking exerc...

⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Mal...

Cyber threats don't show up one at a time anymore. They’re layered, planned, and...

Hackers Use Fake VPN and Browser NSIS Installers to Del...

Cybersecurity researchers have disclosed a malware campaign that uses fake softw...

Hackers Use TikTok Videos to Distribute Vidar and Steal...

The malware known as Latrodectus has become the latest to embrace the widely-use...

ViciousTrap Uses Cisco Flaw to Build Global Honeypot fr...

Cybersecurity researchers have disclosed that a threat actor codenamed ViciousTr...

300 Servers and €3.5M Seized as Europol Strikes Ransomw...

As part of the latest "season" of Operation Endgame, a coalition of law enforcem...

Noyb Threatens Meta with Lawsuit for Violating GDPR to ...

Austrian privacy non-profit noyb (none of your business) has sent Meta's Irish h...

SafeLine WAF: Open Source Web Application Firewall with...

From zero-day exploits to large-scale bot attacks — the demand for a powerful, s...

U.S. Dismantles DanaBot Malware Network, Charges 16 in ...

The U.S. Department of Justice (DoJ) on Thursday announced the disruption of the...

CISA Warns of Suspected Broader SaaS Attacks Exploiting...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday rev...

GitLab Duo Vulnerability Enabled Attackers to Hijack AI...

Cybersecurity researchers have discovered an indirect prompt injection flaw in G...

Critical Versa Concerto Flaws Let Attackers Escape Dock...

Cybersecurity researchers have uncovered multiple critical security vulnerabilit...

Google Chrome's Built-in Manager Lets Users Update Brea...

Google has announced a new feature in its Chrome browser that lets its built-in ...

Chinese Hackers Exploit Trimble Cityworks Flaw to Infil...

A Chinese-speaking threat actor tracked as UAT-6382 has been linked to the explo...

Critical Windows Server 2025 dMSA Vulnerability Enables...

A privilege escalation flaw has been demonstrated in Windows Server 2025 that ma...

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Ente...

A recently patched pair of security flaws affecting Ivanti Endpoint Manager Mobi...

Webinar: Learn How to Build a Reasonable and Legally De...

It’s not enough to be secure. In today’s legal climate, you need to prove it. Wh...

Identity Security Has an Automation Problem—And It's Bi...

For many organizations, identity security appears to be under control. On paper,...

Unpatched Versa Concerto Flaws Let Attackers Escape Doc...

Cybersecurity researchers have uncovered multiple critical security vulnerabilit...

FBI and Europol Disrupt Lumma Stealer Malware Network L...

A sprawling operation undertaken by global law enforcement agencies and a consor...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.