Category: TheHackerNews

How Continuous Exposure Management Transforms Security Operations
03
Nov
2025

How Continuous Exposure Management Transforms Security Operations

Nov 03, 2025The Hacker NewsSOC Operations / Exposure Management Security Operations Centers (SOC) today are overwhelmed. Analysts handle thousands of…

Android
03
Nov
2025

Researchers Uncover BankBot-YNRK and DeliveryRAT Android Trojans Stealing Financial Data

Cybersecurity researchers have shed light on two different Android trojans called BankBot-YNRK and DeliveryRAT that are capable of harvesting sensitive…

New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea
03
Nov
2025

New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea

Nov 03, 2025Ravie LakshmananCybersecurity / Malware The North Korea-linked threat actor known as Kimsuky has distributed a previously undocumented backdoor…

ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability
01
Nov
2025

ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability

Nov 01, 2025Ravie LakshmananArtificial Intelligence / Vulnerability The Australian Signals Directorate (ASD) has issued a bulletin about ongoing cyber attacks…

GPT-5 Agent That Finds and Fixes Code Flaws Automatically
31
Oct
2025

GPT-5 Agent That Finds and Fixes Code Flaws Automatically

Oct 31, 2025Ravie LakshmananArtificial Intelligence / Code Security OpenAI has announced the launch of an “agentic security researcher” that’s powered…

Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
31
Oct
2025

Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack

Oct 31, 2025Ravie LakshmananMalware / Browser Security A suspected nation-state threat actor has been linked to the distribution of a…

China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
31
Oct
2025

China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems

Oct 31, 2025Ravie LakshmananEndpoint Security / Cyber Espionage The exploitation of a recently disclosed critical security flaw in Motex Lanscope…

China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
31
Oct
2025

China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats

Oct 31, 2025Ravie LakshmananMalware / Threat Intelligence A China-affiliated threat actor known as UNC6384 has been linked to a fresh…

MSP Cybersecurity Readiness Guide
31
Oct
2025

The MSP Cybersecurity Readiness Guide: Turning Security into Growth

Oct 31, 2025The Hacker NewsBusiness Continuity / Risk Management MSPs are facing rising client expectations for strong cybersecurity and compliance…

CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
31
Oct
2025

CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers

Oct 31, 2025Ravie LakshmananVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and National Security Agency (NSA),…

Open VSX Tokens
31
Oct
2025

Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery

Oct 31, 2025Ravie LakshmananMalware / Secure Coding Eclipse Foundation, which maintains the open-source Open VSX project, said it has taken…

CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
31
Oct
2025

CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks

Oct 31, 2025Ravie LakshmananVulnerability / Cyber Attack The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity…