Category: TheHackerNews

Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms
23
Oct
2025

Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms

Oct 23, 2025Ravie LakshmananVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical…

Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw
23
Oct
2025

Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw

Oct 23, 2025Ravie LakshmananData Breach / Vulnerability E-commerce security company Sansec has warned that threat actors have begun to exploit…

Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
22
Oct
2025

Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files

Cybersecurity researchers have disclosed details of a coordinated spear-phishing campaign dubbed PhantomCaptcha targeting organizations associated with Ukraine’s war relief efforts…

Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign
22
Oct
2025

Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign

Oct 22, 2025Ravie LakshmananMalware / Cyber Espionage The Iranian nation-state group known as MuddyWater has been attributed to a new…

Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys
22
Oct
2025

Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys

Oct 22, 2025Ravie LakshmananCryptocurrency / Software Integrity Cybersecurity researchers have uncovered a new supply chain attack targeting the NuGet package…

Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft's July Patch
22
Oct
2025

Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch

Oct 22, 2025Ravie LakshmananCyber Espionage / Vulnerability Threat actors with ties to China exploited the ToolShell security vulnerability in Microsoft…

Bridging the Remediation Gap: Introducing Pentera Resolve
22
Oct
2025

Bridging the Remediation Gap: Introducing Pentera Resolve

From Detection to Resolution: Why the Gap Persists A critical vulnerability is identified in an exposed cloud asset. Within hours,…

Why You Should Swap Passwords for Passphrases
22
Oct
2025

Why You Should Swap Passwords for Passphrases

Oct 22, 2025The Hacker NewsData Breach / Enterprise Security The advice didn’t change for decades: use complex passwords with uppercase,…

Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware
22
Oct
2025

Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware

Oct 22, 2025Ravie LakshmananCyber Espionage / Network Security Government, financial, and industrial organizations located in Asia, Africa, and Latin America…

TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution
22
Oct
2025

TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution

Oct 22, 2025Ravie LakshmananVulnerability / Data Protection Cybersecurity researchers have disclosed details of a high-severity flaw impacting the popular async-tar…

TP-Link Patches Four Omada Gateway Flaws
22
Oct
2025

TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution

Oct 22, 2025Ravie LakshmananVulnerability / Network Security TP-Link has released security updates to address four security flaws impacting Omada gateway…

Botnet Campaign
21
Oct
2025

PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign

Oct 21, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have shed light on the inner workings of a botnet malware called…