Category: TheHackerNews

KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet
10
Mar
2026

KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet

Cybersecurity researchers have discovered a new malware called KadNap that’s primarily targeting Asus routers to enlist them into a botnet…

APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military
10
Mar
2026

APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military

Ravie LakshmananMar 10, 2026Cyber Espionage / Threat Intelligence The Russian state-sponsored hacking group tracked as APT28 has been observed using…

A Guide to Attack Surface Reduction
10
Mar
2026

A Guide to Attack Surface Reduction

You can’t control when the next critical vulnerability drops. You can control how much of your environment is exposed when…

New "LeakyLooker" Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries
10
Mar
2026

New “LeakyLooker” Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries

Ravie LakshmananMar 10, 2026Database Security / Vulnerability Cybersecurity researchers have disclosed nine cross-tenant vulnerabilities in Google Looker Studio that could…

A Webinar Guide to Auditing Modern Agentic Workflows
10
Mar
2026

A Webinar Guide to Auditing Modern Agentic Workflows

The Hacker NewsMar 10, 2026Artificial Intelligence / Threat Detection Artificial Intelligence (AI) is no longer just a tool we talk…

Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool
10
Mar
2026

Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool

Ravie LakshmananMar 10, 2026Cloud Security / API Security Salesforce has warned of an increase in threat actor activity that’s aimed…

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited
10
Mar
2026

CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

Ravie LakshmananMar 10, 2026Vulnerability / Enterprise Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security…

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials
09
Mar
2026

Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials

Cybersecurity researchers have discovered a malicious npm package that masquerades as an OpenClaw installer to deploy a remote access trojan…

UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device
09
Mar
2026

UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device

Ravie LakshmananMar 09, 2026DevOps / Threat Intelligence The North Korean threat actor known as UNC4899 is suspected to be behind…

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks
09
Mar
2026

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

Ravie LakshmananFeb 27, 2026Malware / Surveillance The North Korean threat actor known as ScarCruft has been attributed to a fresh…

Rekoobe Backdoor
09
Mar
2026

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

Ravie LakshmananFeb 27, 2026Malware / Linux Security Cybersecurity researchers have disclosed details of a malicious Go module that’s designed to…

900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks
09
Mar
2026

900+ Sangoma FreePBX Instances Compromised in Ongoing Web Shell Attacks

Ravie LakshmananFeb 27, 2026Network Security / Vulnerability The Shadowserver Foundation has revealed that over 900 Sangoma FreePBX instances still remain…