Category: TheHackerNews
Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft’s Direct Send feature to form a “highly…
Sep 09, 2025Ravie LakshmananMobile Security / Threat Intelligence A new Android malware called RatOn evolved from a basic tool capable…
Cybersecurity researchers have discovered a variant of a recently disclosed campaign that abuses the TOR network for cryptojacking attacks targeting…
Sep 09, 2025The Hacker NewsArtificial Intelligence / Threat Detection One click is all it takes. An engineer spins up an…
Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malware-turned-remote access trojan called MostereRAT. The…
It’s budget season. Once again, security is being questioned, scrutinized, or deprioritized. If you’re a CISO or security leader, you’ve…
Sep 09, 2025Ravie LakshmananCryptocurrency / Software Security Multiple npm packages have been compromised as part of a software supply chain…
Sep 09, 2025Ravie LakshmananCyber Espionage / Telecom Security Threat hunters have discovered a set of previously unreported domains, some going…
Sep 08, 2025Ravie LakshmananSupply Chain Attack / API Security Salesloft has revealed that the data breach linked to its Drift…
Sep 08, 2025Ravie LakshmananMalvertising / Encryption Cybersecurity researchers have detailed a new sophisticated malware campaign that leverages paid ads on…
When Attackers Get Hired: Today’s New Identity Crisis What if the star engineer you just hired isn’t actually an employee,…
A threat actor possibly of Russian origin has been attributed to a new set of attacks targeting the energy sector…



![[Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them [Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them](https://cybernoz.com/wp-content/uploads/2025/09/Webinar-Shadow-AI-Agents-Multiply-Fast-—-Learn-How-to.jpg)







