Category: TheHackerNews

New "Cavalry Werewolf" Attack Hits Russian Agencies with FoalShell and StallionRAT
03
Oct
2025

New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT

Oct 03, 2025Ravie LakshmananCybersecurity / Malware A threat actor that’s known to share overlaps with a hacking group called YoroTrooper…

CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild
03
Oct
2025

CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild

Oct 03, 2025Ravie LakshmananVulnerability / IoT Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity…

Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware
02
Oct
2025

Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware

Oct 02, 2025Ravie LakshmananMalware / Cyber Espionage The threat actor known as Confucius has been attributed to a new phishing…

Malicious PyPI Package
02
Oct
2025

Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown

Oct 02, 2025Ravie LakshmananPython / Malware Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository…

Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware
02
Oct
2025

Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware

Oct 02, 2025Ravie LakshmananRansomware / Threat Intelligence Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are…

7 Key Workflows for Maximum Impact
02
Oct
2025

7 Key Workflows for Maximum Impact

Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is time…

How to Close Threat Detection Gaps: Your SOC's Action Plan
02
Oct
2025

How to Close Threat Detection Gaps: Your SOC’s Action Plan

Running a SOC often feels like drowning in alerts. Every morning, dashboards light up with thousands of signals; some urgent,…

Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro
02
Oct
2025

Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro

Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like Signal and ToTok to…

New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer
01
Oct
2025

New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer

Oct 01, 2025Ravie LakshmananEncryption / Hardware Security In yet another piece of research, academics from Georgia Institute of Technology and…

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps
01
Oct
2025

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps

Oct 01, 2025Ravie LakshmananVulnerability / API Security A high-severity security flaw has been disclosed in the One Identity OneLogin Identity…

Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover
01
Oct
2025

Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover

Oct 01, 2025Ravie LakshmananAI Security / Cloud Security A severe security flaw has been disclosed in the Red Hat OpenShift…

Leading Security Teams Blend AI + Human Workflows
01
Oct
2025

How Leading Security Teams Blend AI + Human Workflows (Free Webinar)

Oct 01, 2025The Hacker NewsAutomation / IT Operations AI is changing automation—but not always for the better. That’s why we’re…