Category: TheHackerNews

Learn How to Prevent the Next Silent Breach
18
Apr
2025

[Webinar] AI Is Already Inside Your SaaS Stack — Learn How to Prevent the Next Silent Breach

Apr 18, 2025The Hacker NewsSaaS Security / Shadow IT Your employees didn’t mean to expose sensitive data. They just wanted…

New XorDDoS Controller, Infrastructure
18
Apr
2025

Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoT

Apr 18, 2025Ravie LakshmananIoT Security / Malware Cybersecurity researchers are warning of continued risks posed by a distributed denial-of-service (DDoS)…

NTLM Credentials
18
Apr
2025

CVE-2025-24054 Under Active Attack—Steals NTLM Credentials on File Download

Apr 18, 2025Ravie LakshmananWindows Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a medium-severity…

Mustang Panda Targets Myanmar
17
Apr
2025

Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates

The China-linked threat actor known as Mustang Panda has been attributed to a cyber attack targeting an unspecified organization in…

State-Sponsored Hackers
17
Apr
2025

State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns

Multiple state-sponsored hacking groups from Iran, North Korea, and Russia have been found leveraging the increasingly popular ClickFix social engineering…

Fake Binance and TradingView Installers
17
Apr
2025

Node.js Malware Campaign Targets Crypto Users with Fake Binance and TradingView Installers

Apr 17, 2025Ravie LakshmananCybersecurity / Malware Microsoft is calling attention to an ongoing malvertising campaign that makes use of Node.js…

Blockchain Offers Security Benefits
17
Apr
2025

Blockchain Offers Security Benefits – But Don’t Neglect Your Passwords

Apr 17, 2025The Hacker NewsPassword Security / Blockchain Blockchain is best known for its use in cryptocurrencies like Bitcoin, but…

Critical Erlang/OTP SSH Vulnerability
17
Apr
2025

Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution

Apr 17, 2025Ravie LakshmananVulnerability / Network Security A critical security vulnerability has been disclosed in the Erlang/Open Telecom Platform (OTP)…

Actively Exploited Vulnerability in SonicWall SMA Devices
17
Apr
2025

CISA Flags Actively Exploited Vulnerability in SonicWall SMA Devices

Apr 17, 2025Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security…

Actively Exploited iOS Flaws
17
Apr
2025

Apple Patches Two Actively Exploited iOS Flaws Used in Sophisticated Targeted Attacks

Apr 17, 2025Ravie LakshmananZero-Day / Vulnerability Apple on Wednesday released security updates for iOS, iPadOS, macOS Sequoia, tvOS, and visionOS…

Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler
16
Apr
2025

Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler

Apr 16, 2025Ravie LakshmananEndpoint Security / Vulnerability Cybersecurity researchers have detailed four different vulnerabilities in a core component of the…

The New Cyber Risks Facing Supply Chains
16
Apr
2025

The New Cyber Risks Facing Supply Chains

Introduction Cyber threats targeting supply chains have become a growing concern for businesses across industries. As companies continue to expand…