Category: TheHackerNews

Hackers Turn Velociraptor DFIR Tool
11
Oct
2025

Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks

Oct 11, 2025Ravie LakshmananNetwork Security / Vulnerability Threat actors are abusing Velociraptor, an open-source digital forensics and incident response (DFIR)…

Payroll Pirates
10
Oct
2025

Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries

Oct 10, 2025Ravie LakshmananSaaS Security / Threat Intelligence A threat actor known as Storm-2657 has been observed hijacking employee accounts…

Stealit Malware Abuses Node.js Single Executable Feature
10
Oct
2025

Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers

Oct 10, 2025Ravie LakshmananRansomware / Data Theft Cybersecurity researchers have disclosed details of an active malware campaign called Stealit that…

175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign
10
Oct
2025

175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign

Oct 10, 2025Ravie LakshmananCybercrime / Malware Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm…

Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation
10
Oct
2025

Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation

Oct 10, 2025Ravie LakshmananVulnerability / Network Security Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical…

What Sets Top-Tier Platforms Apart?
10
Oct
2025

What Sets Top-Tier Platforms Apart?

The SOC of 2026 will no longer be a human-only battlefield. As organizations scale and threats evolve in sophistication and…

Gladinet and TrioFox Vulnerability
10
Oct
2025

Active Exploitation Detected in Gladinet and TrioFox Vulnerability

Oct 10, 2025Ravie LakshmananVulnerability / Zero-Day Cybersecurity company Huntress said it has observed active in-the-wild exploitation of an unpatched security…

CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw
10
Oct
2025

CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw

Oct 10, 2025Ravie LakshmananVulnerability / Threat Intelligence Dozens of organizations may have been impacted following the zero-day exploitation of a…

The Evolution of UTA0388's Espionage Malware
09
Oct
2025

The Evolution of UTA0388’s Espionage Malware

Oct 09, 2025Ravie LakshmananCyber Espionage / Artificial Intelligence A China-aligned threat actor codenamed UTA0388 has been attributed to a series…

New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps
09
Oct
2025

New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps

Oct 09, 2025Ravie LakshmananMobile Security / Malware A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia…

Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks
09
Oct
2025

Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks

Oct 09, 2025Ravie LakshmananCloud Security / Network Security SonicWall on Wednesday disclosed that an unauthorized party accessed firewall configuration backup…

SaaS Breaches Start with Tokens
09
Oct
2025

SaaS Breaches Start with Tokens

Token theft is a leading cause of SaaS breaches. Discover why OAuth and API tokens are often overlooked and how…