Category: TheHackerNews

Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation
10
Oct
2025

Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation

Oct 10, 2025Ravie LakshmananVulnerability / Network Security Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical…

What Sets Top-Tier Platforms Apart?
10
Oct
2025

What Sets Top-Tier Platforms Apart?

The SOC of 2026 will no longer be a human-only battlefield. As organizations scale and threats evolve in sophistication and…

Gladinet and TrioFox Vulnerability
10
Oct
2025

Active Exploitation Detected in Gladinet and TrioFox Vulnerability

Oct 10, 2025Ravie LakshmananVulnerability / Zero-Day Cybersecurity company Huntress said it has observed active in-the-wild exploitation of an unpatched security…

CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw
10
Oct
2025

CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw

Oct 10, 2025Ravie LakshmananVulnerability / Threat Intelligence Dozens of organizations may have been impacted following the zero-day exploitation of a…

The Evolution of UTA0388's Espionage Malware
09
Oct
2025

The Evolution of UTA0388’s Espionage Malware

Oct 09, 2025Ravie LakshmananCyber Espionage / Artificial Intelligence A China-aligned threat actor codenamed UTA0388 has been attributed to a series…

New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps
09
Oct
2025

New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps

Oct 09, 2025Ravie LakshmananMobile Security / Malware A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia…

Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks
09
Oct
2025

Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks

Oct 09, 2025Ravie LakshmananCloud Security / Network Security SonicWall on Wednesday disclosed that an unauthorized party accessed firewall configuration backup…

SaaS Breaches Start with Tokens
09
Oct
2025

SaaS Breaches Start with Tokens

Token theft is a leading cause of SaaS breaches. Discover why OAuth and API tokens are often overlooked and how…

AI Becomes Russia's New Cyber Weapon in War on Ukraine
09
Oct
2025

AI Becomes Russia’s New Cyber Weapon in War on Ukraine

Oct 09, 2025Ravie LakshmananArtificial Intelligence / Malware Russian hackers’ adoption of artificial intelligence (AI) in cyber attacks against Ukraine has…

Bypass Authentication in WordPress
09
Oct
2025

Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme

Oct 09, 2025Ravie LakshmananVulnerability / Website Security Threat actors are actively exploiting a critical security flaw impacting the Service Finder…

Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks
08
Oct
2025

Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks

Cybersecurity researchers are calling attention to a nefarious campaign targeting WordPress sites to make malicious JavaScript injections that are designed…

Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave
08
Oct
2025

Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave

Oct 08, 2025Ravie LakshmananMalware / Threat Intelligence Threat actors with suspected ties to China have turned a legitimate open-source monitoring…