The Hacker News

Silver Fox APT Uses Winos 4.0 Malware in Cyber Attacks ...

A new campaign is targeting companies in Taiwan with malware known as Winos 4.0 ...

Space Pirates Targets Russian IT Firms With New LuckySt...

The threat actor known as Space Pirates has been linked to a malicious campaign ...

89% of Enterprise GenAI Usage Is Invisible to Organizat...

Organizations are either already adopting GenAI solutions, evaluating strategies...

New TgToxic Banking Trojan Variant Evolves with Anti-An...

Cybersecurity researchers have discovered an updated version of an Android malwa...

PolarEdge Botnet Exploits Cisco and Other Flaws to Hija...

A new malware campaign has been observed targeting edge devices from Cisco, ASUS...

Bybit Hack Traced to Safe{Wallet} Supply Chain Attack E...

The U.S. Federal Bureau of Investigation (FBI) formally linked the record-breaki...

Hackers Exploited Krpano Framework Flaw to Inject Spam ...

A cross-site scripting (XSS) vulnerability in a virtual tour framework has been ...

Leaked Black Basta Ransomware Chat Logs Reveal Inner Wo...

More than a year's worth of internal chat logs from a ransomware gang known as B...

Leaked Black Basta Chat Logs Reveal $107M Ransom Earnin...

More than a year's worth of internal chat logs from a ransomware gang known as B...

SOC 3.0 - The Evolution of the SOC and How AI is Empowe...

Organizations today face relentless cyber attacks, with high-profile breaches hi...

New Linux Malware ‘Auto-Color’ Grants Hackers Full Remo...

Universities and government organizations in North America and Asia have been ta...

Three Password Cracking Techniques and How to Defend Ag...

Passwords are rarely appreciated until a security breach occurs; suffice to say,...

CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Co...

The Computer Emergency Response Team of Ukraine (CERT-UA) on Tuesday warned of r...

Malicious PyPI Package "automslc" Enables 104K+ Unautho...

Cybersecurity researchers have flagged a malicious Python library on the Python ...

CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Ami...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday plac...

LightSpy Expands to 100+ Commands, Increasing Control O...

Cybersecurity researchers have flagged an updated version of the LightSpy implan...

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Ex...

Opposition activists in Belarus as well as Ukrainian military and government org...

5 Active Malware Campaigns in Q1 2025

The first quarter of 2025 has been a battlefield in the world of cybersecurity. ...

2,500+ Truesight.sys Driver Variants Exploited to Bypas...

A large-scale malware campaign has been found leveraging a vulnerable Windows dr...

GitVenom Malware Steals $456K in Bitcoin Using Fake Git...

Cybersecurity researchers are calling attention to an ongoing campaign that's ta...

FatalRAT Phishing Attacks Target APAC Industries Using ...

Various industrial organizations in the Asia-Pacific (APAC) region have been tar...

Two Actively Exploited Security Flaws in Adobe and Orac...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two s...

New Malware Campaign Uses Cracked Software to Spread Lu...

Cybersecurity researchers are warning of a new campaign that leverages cracked v...

⚡ THN Weekly Recap: From $1.5B Crypto Heist to AI Misu...

Welcome to your weekly roundup of cyber news, where every headline gives you a p...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.