Category: TheHackerNews

Clouds with AzureChecker
27
Apr
2025

Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers

Apr 27, 2025Ravie LakshmananKubernetes / Cloud Security Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted…

CACTUS Ransomware
26
Apr
2025

ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion

Apr 26, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker…

North Korean Hackers Spread Malware
25
Apr
2025

North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures

North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during…

Why NHIs Are Security's Most Dangerous Blind Spot
25
Apr
2025

Why NHIs Are Security’s Most Dangerous Blind Spot

When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA prompt. But lurking…

SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers
25
Apr
2025

SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers

Apr 25, 2025Ravie LakshmananVulnerability / Enterprise Security Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload…

DslogdRAT Malware
25
Apr
2025

DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks

Apr 25, 2025Ravie LakshmananVulnerability / Network Security Cybersecurity researchers are warning about a new malware called DslogdRAT that’s installed following…

Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers
25
Apr
2025

Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers

Apr 25, 2025Ravie LakshmananVulnerability / Data Breach Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server…

Cross EX, Innorix Zero-Day
24
Apr
2025

Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Flaws and ThreatNeedle Malware

Apr 24, 2025Ravie LakshmananMalware / Threat Intelligence At least six organizations in South Korea have been targeted by the prolific…

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools
24
Apr
2025

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

Apr 24, 2025Ravie LakshmananEndpoint Security / Linux Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a…

159 CVEs
24
Apr
2025

159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure

Apr 24, 2025Ravie LakshmananVulnerability / Threat Intelligence As many as 159 CVE identifiers have been flagged as exploited in the…

Darcula Adds GenAI to Phishing Toolkit
24
Apr
2025

Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals

Apr 24, 2025Ravie LakshmananPhishing / Cybercrime The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform have released new updates to…

Commvault Command Center Flaw
24
Apr
2025

Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotely

Apr 24, 2025Ravie LakshmananData Breach / Vulnerability A critical security flaw has been disclosed in the Commvault Command Center that…