Category: TheHackerNews

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation
23
May
2025

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

The U.S. Department of Justice (DoJ) on Thursday announced the disruption of the online infrastructure associated with DanaBot (aka DanaTools)…

GitLab Duo Vulnerability
23
May
2025

GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts

Cybersecurity researchers have discovered an indirect prompt injection flaw in GitLab’s artificial intelligence (AI) assistant Duo that could have allowed…

Broader SaaS Attacks
23
May
2025

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

May 23, 2025Ravie LakshmananCloud Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday revealed that Commvault…

Chinese Hackers Exploit Trimble Cityworks Flaw
22
May
2025

Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks

May 22, 2025Ravie LakshmananVulnerability / Threat Intelligence A Chinese-speaking threat actor tracked as UAT-6382 has been linked to the exploitation…

Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host
22
May
2025

Unpatched Versa Concerto Flaws Let Attackers Escape Docker and Compromise Host

May 22, 2025Ravie LakshmananVulnerability / Software Security Cybersecurity researchers have uncovered multiple critical security vulnerabilities impacting the Versa Concerto network…

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise
22
May
2025

Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise

May 22, 2025Ravie LakshmananCybersecurity / Vulnerability A privilege escalation flaw has been demonstrated in Windows Server 2025 that makes it…

Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program
22
May
2025

Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

May 22, 2025The Hacker NewsSecurity Framework / Cyber Defense It’s not enough to be secure. In today’s legal climate, you…

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks
22
May
2025

Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks

May 22, 2025Ravie LakshmananEnterprise Security / Malware A recently patched pair of security flaws affecting Ivanti Endpoint Manager Mobile (EPMM)…

Identity Security
22
May
2025

Identity Security Has an Automation Problem—And It’s Bigger Than You Think

May 22, 2025The Hacker NewsEnterprise Security / Identity Management For many organizations, identity security appears to be under control. On…

Lumma Stealer Malware Network
22
May
2025

FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections

A sprawling operation undertaken by global law enforcement agencies and a consortium of private sector firms has disrupted the online…

Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics
21
May
2025

Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics

Russian cyber threat actors have been attributed to a state-sponsored campaign targeting Western logistics entities and technology companies since 2022….

PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms
21
May
2025

PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms

May 21, 2025Ravie LakshmananMalware / Windows Security Russian organizations have become the target of a phishing campaign that distributes malware…