Category: TheHackerNews

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware
26
Nov
2025

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

Nov 26, 2025Ravie LakshmananMalware / Cyber Espionage The threat actors behind a malware family known as RomCom targeted a U.S.-based…

FBI Reports $262M in ATO Fraud as Researchers Cite Growing AI Phishing and Holiday Scams
26
Nov
2025

FBI Reports $262M in ATO Fraud as Researchers Cite Growing AI Phishing and Holiday Scams

The U.S. Federal Bureau of Investigation (FBI) has warned that cybercriminals are impersonating financial institutions with an aim to steal…

Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys
25
Nov
2025

Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys

Nov 25, 2025Ravie LakshmananData Exposure / Cloud Security New research has found that organizations in various sensitive sectors, including governments,…

JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers
25
Nov
2025

JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers

Cybersecurity researchers are calling attention to a new campaign that’s leveraging a combination of ClickFix lures and fake adult websites…

ToddyCat's New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens
25
Nov
2025

ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens

Nov 25, 2025Ravie LakshmananMalware / Vulnerability The threat actor known as ToddyCat has been observed adopting new methods to obtain…

Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware
25
Nov
2025

Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware

Nov 25, 2025Ravie LakshmananMalware / Browser Security Cybersecurity researchers have disclosed details of a new campaign that has leveraged Blender…

3 SOC Challenges You Need to Solve Before 2026
25
Nov
2025

3 SOC Challenges You Need to Solve Before 2026

2026 will mark a pivotal shift in cybersecurity. Threat actors are moving from experimenting with AI to making it their…

CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users
25
Nov
2025

CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users

Nov 25, 2025Ravie LakshmananSpyware / Mobile Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday issued an alert…

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
24
Nov
2025

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Nov 24, 2025Ravie LakshmananVulnerability / Container Security Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight…

Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft
24
Nov
2025

Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft

Nov 24, 2025Ravie LakshmananCloud Security / Vulnerability Multiple security vendors are sounding the alarm about a second wave of attacks…

Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs
24
Nov
2025

Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs

New research from CrowdStrike has revealed that DeepSeek’s artificial intelligence (AI) reasoning model DeepSeek-R1 produces more security vulnerabilities in response…

WSUS Vulnerability ShadowPad Malware
24
Nov
2025

ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access

Nov 24, 2025Ravie LakshmananMalware / Vulnerability A recently patched security flaw in Microsoft Windows Server Update Services (WSUS) has been…