Category: TheHackerNews

Top 10 Best Practices for Effective Data Protection
16
May
2025

Top 10 Best Practices for Effective Data Protection

Data is the lifeblood of productivity, and protecting sensitive data is more critical than ever. With cyber threats evolving rapidly…

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
16
May
2025

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks

May 16, 2025Ravie LakshmananHardware Security / Vulnerability Researchers at ETH Zürich have discovered yet another security flaw that they say…

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
16
May
2025

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy…

Learn a Smarter Way to Defend Modern Applications
16
May
2025

Learn a Smarter Way to Defend Modern Applications

May 16, 2025The Hacker NewsDevSecOps / Threat Detection Modern apps move fast—faster than most security teams can keep up. As…

Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
15
May
2025

Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit

May 15, 2025Ravie LakshmananAI Training / Data Protection Austrian privacy non-profit noyb (none of your business) has sent Meta’s Irish…

Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
15
May
2025

Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails

May 15, 2025Ravie LakshmananCryptocurrency / Threat Intelligence Cryptocurrency exchange Coinbase has disclosed that unknown cyber actors broke into its systems…

Malicious npm Package
15
May
2025

Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper

May 15, 2025Ravie LakshmananMalware / Threat Intelligence Cybersecurity researchers have discovered a malicious package named “os-info-checker-es6” that disguises itself as…

Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers
15
May
2025

Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

A Russia-linked threat actor has been attributed to a cyber espionage operation targeting webmail servers such as Roundcube, Horde, MDaemon,…

Pen Testing for Compliance Only? It's Time to Change Your Approach
15
May
2025

Pen Testing for Compliance Only? It’s Time to Change Your Approach

May 15, 2025The Hacker NewsCompliance / Penetration Testing Imagine this: Your organization completed its annual penetration test in January, earning…

5 BCDR Essentials for Effective Ransomware Defense
15
May
2025

5 BCDR Essentials for Effective Ransomware Defense

Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat capable of crippling organizations of any size. Cybercriminals…

New Chrome Vulnerability
15
May
2025

New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy

May 15, 2025Ravie LakshmananBrowser Security / Web Security Google on Wednesday released updates to address four security issues in its…

BianLian and RansomExx Exploit SAP NetWeaver Flaw
14
May
2025

BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan

May 14, 2025Ravie LakshmananRansomware / Vulnerability At least two different cybercrime groups BianLian and RansomExx are said to have exploited…