Category: TheHackerNews

Europol Dismantles Kidflix With 72,000 CSAM Videos Seized in Major Operation
03
Apr
2025

Europol Dismantles Kidflix With 72,000 CSAM Videos Seized in Major Operation

In one of the largest coordinated law enforcement operations, authorities have dismantled Kidflix, a streaming platform that offered child sexual…

Web Skimmer Campaign
03
Apr
2025

Legacy Stripe API Exploited to Validate Stolen Payment Cards in Web Skimmer Campaign

Apr 03, 2025Ravie LakshmananCybersecurity / Threat Intelligence Threat hunters are warning of a sophisticated web skimmer campaign that leverages a…

Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse
02
Apr
2025

Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse

Apr 02, 2025Ravie LakshmananCloud Security / Vulnerability Cybersecurity researchers have disclosed details of a now-patched privilege escalation vulnerability in Google…

Cryptojacking Malware on Linux Servers
02
Apr
2025

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers

Apr 02, 2025Ravie LakshmananCryptojacking / Malware Cybersecurity researchers have shed light on an “auto-propagating” cryptocurrency mining botnet called Outlaw (aka…

A Step by Step Guide for Service Providers
02
Apr
2025

A Step by Step Guide for Service Providers

Apr 02, 2025The Hacker NewsCompliance / Data Protection Introduction As the cybersecurity landscape evolves, service providers play an increasingly vital…

SSL Misconfigurations
02
Apr
2025

How SSL Misconfigurations Impact Your Attack Surface

Apr 02, 2025The Hacker NewsWeb Security / Attack Surface When assessing an organization’s external attack surface, encryption-related issues (especially SSL…

Hijack Windows Systems
02
Apr
2025

FIN7 Deploys Anubis Backdoor to Hijack Windows Systems via Compromised SharePoint Sites

Apr 02, 2025Ravie LakshmananRansomware / Email Security The financially motivated threat actor known as FIN7 has been linked to a…

New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth
02
Apr
2025

New Malware Loaders Use Call Stack Spoofing, GitHub C2, and .NET Reactor for Stealth

Apr 02, 2025Ravie LakshmananThreat Detection / Malware Cybersecurity researchers have discovered an updated version of a malware loader called Hijack…

Over 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaign
01
Apr
2025

Over 1,500 PostgreSQL Servers Compromised in Fileless Cryptocurrency Mining Campaign

Apr 01, 2025Ravie LakshmananCryptojacking / Cloud Security Exposed PostgreSQL instances are the target of an ongoing campaign designed to gain…

End-to-End Encrypted Gmail
01
Apr
2025

Enterprise Gmail Users Can Now Send End-to-End Encrypted Emails to Any Platform

Apr 01, 2025Ravie LakshmananEncryption / Email Security On the 21st birthday of Gmail, Google has announced a major update that…

Lucid PhaaS
01
Apr
2025

Lucid PhaaS Hits 169 Targets in 88 Countries Using iMessage and RCS Smishing

A new sophisticated phishing-as-a-service (PhaaS) platform called Lucid has targeted 169 entities in 88 countries using smishing messages propagated via…

Multi-Stage Cyber Intrusions
01
Apr
2025

China-Linked Earth Alux Uses VARGEIT and COBEACON in Multi-Stage Cyber Intrusions

Cybersecurity researchers have shed light on a new China-linked threat actor called Earth Alux that has targeted various key sectors…