Category: TheHackerNews

AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns
15
Sep
2025

AI-Powered Villager Pen Testing Tool Hits 11,000 PyPI Downloads Amid Abuse Concerns

A new artificial intelligence (AI)-powered penetration testing tool linked to a China-based company has attracted nearly 11,000 downloads on the…

Chinese Malware Attacks
15
Sep
2025

HiddenGh0st, Winos and kkRAT Exploit SEO, GitHub Pages in Chinese Malware Attacks

Chinese-speaking users are the target of a search engine optimization (SEO) poisoning campaign that uses fake software sites to distribute…

FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
13
Sep
2025

FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks

The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert to release indicators of compromise (IoCs) associated with…

Apple Warns French Users of Fourth Spyware Campaign in 2025, CERT-FR Confirms
12
Sep
2025

Apple Warns French Users of Fourth Spyware Campaign in 2025, CERT-FR Confirms

Sep 12, 2025Ravie Lakshmanan Apple has notified users in France of a spyware campaign targeting their devices, according to the…

Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks
12
Sep
2025

Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks

Sep 12, 2025Ravie LakshmananVulnerability / Mobile Security Samsung has released its monthly security updates for Android, including a fix for…

Critical CVE-2025-5086 in DELMIA Apriso Actively Exploited, CISA Issues Warning
12
Sep
2025

Critical CVE-2025-5086 in DELMIA Apriso Actively Exploited, CISA Issues Warning

Sep 12, 2025Ravie LakshmananVulnerability / Cyber Espionage The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical…

New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit
12
Sep
2025

New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit

Cybersecurity researchers have discovered a new ransomware strain dubbed HybridPetya that resembles the notorious Petya/NotPetya malware, while also incorporating the…

Why Runtime Visibility Must Take Center Stage
12
Sep
2025

Why Runtime Visibility Must Take Center Stage

The security landscape for cloud-native applications is undergoing a profound transformation. Containers, Kubernetes, and serverless technologies are now the default…

Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories
12
Sep
2025

Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories

A security weakness has been disclosed in the artificial intelligence (AI)-powered code editor Cursor that could trigger code execution when…

Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence
11
Sep
2025

Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence

U.S. Senator Ron Wyden has called on the Federal Trade Commission (FTC) to probe Microsoft and hold it responsible for…

Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity
11
Sep
2025

Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity

Sep 11, 2025Ravie LakshmananArtificial Intelligence / Mobile Security Google on Tuesday announced that its new Google Pixel 10 phones support…

SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers
11
Sep
2025

SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers

Threat actors affiliated with the Akira ransomware group have continued to target SonicWall devices for initial access. Cybersecurity firm Rapid7…