Category: TheHackerNews

ToddyCat's New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens
25
Nov
2025

ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens

Nov 25, 2025Ravie LakshmananMalware / Vulnerability The threat actor known as ToddyCat has been observed adopting new methods to obtain…

Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware
25
Nov
2025

Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware

Nov 25, 2025Ravie LakshmananMalware / Browser Security Cybersecurity researchers have disclosed details of a new campaign that has leveraged Blender…

3 SOC Challenges You Need to Solve Before 2026
25
Nov
2025

3 SOC Challenges You Need to Solve Before 2026

2026 will mark a pivotal shift in cybersecurity. Threat actors are moving from experimenting with AI to making it their…

CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users
25
Nov
2025

CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users

Nov 25, 2025Ravie LakshmananSpyware / Mobile Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday issued an alert…

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions
24
Nov
2025

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Nov 24, 2025Ravie LakshmananVulnerability / Container Security Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight…

Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft
24
Nov
2025

Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft

Nov 24, 2025Ravie LakshmananCloud Security / Vulnerability Multiple security vendors are sounding the alarm about a second wave of attacks…

Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs
24
Nov
2025

Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs

New research from CrowdStrike has revealed that DeepSeek’s artificial intelligence (AI) reasoning model DeepSeek-R1 produces more security vulnerabilities in response…

WSUS Vulnerability ShadowPad Malware
24
Nov
2025

ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access

Nov 24, 2025Ravie LakshmananMalware / Vulnerability A recently patched security flaw in Microsoft Windows Server Update Services (WSUS) has been…

China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
22
Nov
2025

China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services

Nov 22, 2025Ravie LakshmananCyber Espionage / Cloud Security The China-linked advanced persistent threat (APT) group known as APT31 has been…

CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability
22
Nov
2025

CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability

Nov 22, 2025Ravie LakshmananZero-Day / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical…

Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
22
Nov
2025

Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks

Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a…

Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation
21
Nov
2025

Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation

Nov 21, 2025Ravie LakshmananVulnerability / Threat Mitigation Grafana has released security updates to address a maximum severity security flaw that…