Category: TheHackerNews

Leaked Black Basta Chat Logs
26
Feb
2025

Leaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles

More than a year’s worth of internal chat logs from a ransomware gang known as Black Basta have been published…

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware
25
Feb
2025

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware

Feb 25, 2025Ravie LakshmananMalware / Cyber Espionage Opposition activists in Belarus as well as Ukrainian military and government organizations are…

LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile
25
Feb
2025

LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile

Cybersecurity researchers have flagged an updated version of the LightSpy implant that comes equipped with an expanded set of data…

GitVenom Malware
25
Feb
2025

GitVenom Malware Steals $456K in Bitcoin Using Fake GitHub Projects to Hijack Wallets

Feb 25, 2025Ravie LakshmananGaming / Threat Intelligence Cybersecurity researchers are calling attention to an ongoing campaign that’s targeting gamers and…

Truesight.sys Driver Variants
25
Feb
2025

2,500+ Truesight.sys Driver Variants Exploited to Bypass EDR and Deploy HiddenGh0st RAT

Feb 25, 2025Ravie LakshmananWindows Security / Vulnerability A large-scale malware campaign has been found leveraging a vulnerable Windows driver associated…

5 Active Malware Campaigns in Q1 2025
25
Feb
2025

5 Active Malware Campaigns in Q1 2025

The first quarter of 2025 has been a battlefield in the world of cybersecurity. Cybercriminals continued launching aggressive new campaigns…

Chinese Cloud Services
25
Feb
2025

FatalRAT Phishing Attacks Target APAC Industries Using Chinese Cloud Services

Various industrial organizations in the Asia-Pacific (APAC) region have been targeted as part of phishing attacks designed to deliver a…

Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA
25
Feb
2025

Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA

Feb 25, 2025Ravie LakshmananNetwork Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two security flaws…

New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer
24
Feb
2025

New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer

Feb 24, 2025Ravie LakshmananEndpoint Security / Vulnerability Cybersecurity researchers are warning of a new campaign that leverages cracked versions of…

Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats
24
Feb
2025

Google Cloud KMS Adds Quantum-Safe Digital Signatures to Defend Against Future Threats

Feb 24, 2025Ravie LakshmananCloud Security / Encryption Google Cloud has announced quantum-safe digital signatures in Google Cloud Key Management Service…

Australia Bans Kaspersky Software Over National Security and Espionage Concerns
24
Feb
2025

Australia Bans Kaspersky Software Over National Security and Espionage Concerns

Feb 24, 2025Ravie LakshmananSoftware Security / Data Protection Australia has become the latest country to ban the installation of security…

Bybit Confirms Record-Breaking $1.46 Billion Crypto Heist in Sophisticated Cold Wallet Attack
22
Feb
2025

Bybit Confirms Record-Breaking $1.46 Billion Crypto Heist in Sophisticated Cold Wallet Attack

Feb 22, 2025Ravie LakshmananFinancial Crime / Cryptocurrency Cryptocurrency exchange Bybit on Friday revealed that a “sophisticated” attack led to the…