Category: TheHackerNews

Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL
03
Oct
2025

Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL

Oct 03, 2025Ravie LakshmananMalware / Online Security Brazilian users have emerged as the target of a new self-propagating malware that…

Enterprise Security
03
Oct
2025

How Passwork 7 Addresses Complexity of Enterprise Security

Passwork is positioned as an on-premises unified platform for both password and secrets management, aiming to address the increasing complexity…

New "Cavalry Werewolf" Attack Hits Russian Agencies with FoalShell and StallionRAT
03
Oct
2025

New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT

Oct 03, 2025Ravie LakshmananCybersecurity / Malware A threat actor that’s known to share overlaps with a hacking group called YoroTrooper…

CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild
03
Oct
2025

CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild

Oct 03, 2025Ravie LakshmananVulnerability / IoT Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity…

Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware
02
Oct
2025

Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware

Oct 02, 2025Ravie LakshmananMalware / Cyber Espionage The threat actor known as Confucius has been attributed to a new phishing…

Malicious PyPI Package
02
Oct
2025

Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown

Oct 02, 2025Ravie LakshmananPython / Malware Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository…

Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware
02
Oct
2025

Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware

Oct 02, 2025Ravie LakshmananRansomware / Threat Intelligence Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are…

7 Key Workflows for Maximum Impact
02
Oct
2025

7 Key Workflows for Maximum Impact

Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is time…

How to Close Threat Detection Gaps: Your SOC's Action Plan
02
Oct
2025

How to Close Threat Detection Gaps: Your SOC’s Action Plan

Running a SOC often feels like drowning in alerts. Every morning, dashboards light up with thousands of signals; some urgent,…

Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro
02
Oct
2025

Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro

Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like Signal and ToTok to…

New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer
01
Oct
2025

New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer

Oct 01, 2025Ravie LakshmananEncryption / Hardware Security In yet another piece of research, academics from Georgia Institute of Technology and…

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps
01
Oct
2025

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps

Oct 01, 2025Ravie LakshmananVulnerability / API Security A high-severity security flaw has been disclosed in the One Identity OneLogin Identity…