The Hacker News

GitHub Action Compromise Puts CI/CD Secrets at Risk in ...

Cybersecurity researchers are calling attention to an incident in which the popu...

Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 ...

Cybersecurity researchers have warned of a malicious campaign targeting users of...

Alleged Israeli LockBit Developer Rostislav Panev Extra...

A 51-year-old dual Russian and Israeli national who is alleged to be a developer...

GSMA Confirms End-to-End Encryption for RCS, Enabling S...

The GSM Association (GSMA) has formally announced support for end-to-end encrypt...

Live Ransomware Demo: See How Hackers Breach Networks a...

Cyber threats evolve daily. In this live webinar, learn exactly how ransomware a...

Why Most Microsegmentation Projects Fail—And How Andely...

Most microsegmentation projects fail before they even get off the ground—too com...

New MassJacker Malware Targets Piracy Users, Hijacking ...

Users searching for pirated software are the target of a new malware campaign th...

OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy R...

A new malware campaign has been observed leveraging social engineering tactics t...

Microsoft Warns of ClickFix Phishing Campaign Targeting...

Microsoft has shed light on an ongoing phishing campaign that targeted the hospi...

North Korea’s ScarCruft Deploys KoSpy Malware, Spying o...

The North Korea-linked threat actor known as ScarCruft is said to have been behi...

GitHub Uncovers New ruby-saml Vulnerabilities Allowing ...

Two high-severity security flaws have been disclosed in the open-source ruby-sam...

Future-Proofing Business Continuity: BCDR Trends and Ch...

As IT environments grow more complex, IT professionals are facing unprecedented ...

Meta Warns of FreeType Vulnerability (CVE-2025-27363) W...

Meta has warned that a security vulnerability impacting the FreeType open-source...

WARNING: Expiring Root Certificate May Disable Firefox ...

Browser maker Mozilla is urging users to update their Firefox instances to the l...

Chinese Hackers Breach Juniper Networks Routers With Cu...

The China-nexus cyber espionage group tracked as UNC3886 has been observed targe...

Over 400 IPs Exploiting Multiple SSRF Vulnerabilities i...

Threat intelligence firm GreyNoise is warning of a "coordinated surge" in the ex...

Pentesters: Is AI Coming for Your Role?

We’ve been hearing the same story for years: AI is coming for your job. In fact,...

URGENT: Microsoft Patches 57 Security Flaws, Including ...

Microsoft on Tuesday released security updates to address 57 security vulnerabil...

Apple Releases Patch for WebKit Zero-Day Vulnerability ...

Apple on Tuesday released a security update to address a zero-day flaw that it s...

Ballista Botnet Exploits Unpatched TP-Link Vulnerabilit...

Unpatched TP-Link Archer routers have become the target of a new botnet campaign...

Blind Eagle Hacks Colombian Institutions Using NTLM Fla...

The threat actor known as Blind Eagle has been linked to a series of ongoing cam...

Ballista Botnet Exploits Unpatched TP-Link Vulnerabilit...

Unpatched TP-Link Archer routers have become the target of a new botnet campaign...

Your Risk Scores Are Lying: Adversarial Exposure Valida...

In cybersecurity, confidence is a double-edged sword. Organizations often operat...

Steganography Explained: How XWorm Hides Inside Images

Inside the most innocent-looking image, a breathtaking landscape, or a funny mem...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.