Category: TheHackerNews

China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
22
Nov
2025

China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services

Nov 22, 2025Ravie LakshmananCyber Espionage / Cloud Security The China-linked advanced persistent threat (APT) group known as APT31 has been…

CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability
22
Nov
2025

CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability

Nov 22, 2025Ravie LakshmananZero-Day / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical…

Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks
22
Nov
2025

Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks

Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a…

Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation
21
Nov
2025

Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation

Nov 21, 2025Ravie LakshmananVulnerability / Threat Mitigation Grafana has released security updates to address a maximum severity security flaw that…

Google Brings AirDrop Compatibility to Android's Quick Share Using Rust-Hardened Security
21
Nov
2025

Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Security

Nov 21, 2025Ravie LakshmananData Protection / Technology In a surprise move, Google on Thursday announced that it has updated Quick…

Years-Long Espionage Hitting Taiwan
21
Nov
2025

APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains

A China-nexus threat actor known as APT24 has been observed using a previously undocumented malware dubbed BADAUDIO to establish persistent…

Samsung for Mobile Security
21
Nov
2025

Why IT Admins Choose Samsung for Mobile Security

Nov 21, 2025The Hacker NewsMobile Security / Data Protection Ever wonder how some IT teams keep corporate data safe without…

SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny
21
Nov
2025

SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny

Nov 21, 2025Ravie LakshmananCompliance / Cyber Attack The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds…

Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity
21
Nov
2025

Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity

Nov 21, 2025Ravie LakshmananData Breach / SaaS Security Salesforce has warned of detected “unusual activity” related to Gainsight-published applications connected…

Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows
20
Nov
2025

Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows

Nov 20, 2025Ravie LakshmananBotnet / Malware Cybersecurity researchers have warned of an actively expanding botnet dubbed Tsundere that’s targeting Windows…

ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet
20
Nov
2025

ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet

Nov 20, 2025Ravie LakshmananVulnerability / Cloud Computing Oligo Security has warned of ongoing attacks exploiting a two-year-old security flaw in…

New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices
20
Nov
2025

New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices

Nov 20, 2025Ravie LakshmananMalware / Mobile Security Cybersecurity researchers have disclosed details of a new Android banking trojan called Sturnus…