Category: TheHackerNews

Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks
09
Sep
2025

Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks

Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft’s Direct Send feature to form a “highly…

RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities
09
Sep
2025

RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities

Sep 09, 2025Ravie LakshmananMobile Security / Threat Intelligence A new Android malware called RatOn evolved from a basic tool capable…

TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs
09
Sep
2025

TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs

Cybersecurity researchers have discovered a variant of a recently disclosed campaign that abuses the TOR network for cryptojacking attacks targeting…

[Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them
09
Sep
2025

[Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them

Sep 09, 2025The Hacker NewsArtificial Intelligence / Threat Detection One click is all it takes. An engineer spins up an…

Rising AI and Phishing Risks
09
Sep
2025

New Malware Campaigns Highlight Rising AI and Phishing Risks

Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malware-turned-remote access trojan called MostereRAT. The…

How Leading CISOs are Getting Budget Approval
09
Sep
2025

How Leading CISOs are Getting Budget Approval

It’s budget season. Once again, security is being questioned, scrutinized, or deprioritized. If you’re a CISO or security leader, you’ve…

20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack
09
Sep
2025

20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack

Sep 09, 2025Ravie LakshmananCryptocurrency / Software Security Multiple npm packages have been compromised as part of a software supply chain…

Salt Typhoon Cyber Espionage
09
Sep
2025

45 Previously Unreported Domains Expose Longstanding Salt Typhoon Cyber Espionage

Sep 09, 2025Ravie LakshmananCyber Espionage / Telecom Security Threat hunters have discovered a set of previously unreported domains, some going…

GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies
08
Sep
2025

GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies

Sep 08, 2025Ravie LakshmananSupply Chain Attack / API Security Salesloft has revealed that the data breach linked to its Drift…

GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms
08
Sep
2025

GPUGate Malware Uses Google Ads and Fake GitHub Commits to Target IT Firms

Sep 08, 2025Ravie LakshmananMalvertising / Encryption Cybersecurity researchers have detailed a new sophisticated malware campaign that leverages paid ads on…

You Didn't Get Phished — You Onboarded the Attacker
08
Sep
2025

You Didn’t Get Phished — You Onboarded the Attacker

When Attackers Get Hired: Today’s New Identity Crisis What if the star engineer you just hired isn’t actually an employee,…

Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign
06
Sep
2025

Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaign

A threat actor possibly of Russian origin has been attributed to a new set of attacks targeting the energy sector…