Category: TheHackerNews

Figma MCP Vulnerability
08
Oct
2025

Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now

Oct 08, 2025Ravie LakshmananVulnerability / Software Security Cybersecurity researchers have disclosed details of a now-patched vulnerability in the popular figma-developer-mcp…

Step Into the Password Graveyard… If You Dare (and Join the Live Session)
08
Oct
2025

Step Into the Password Graveyard… If You Dare (and Join the Live Session)

Oct 08, 2025The Hacker NewsPassword Security / Cyber Attacks Every year, weak passwords lead to millions in losses — and…

OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
08
Oct
2025

OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks

OpenAI on Tuesday said it disrupted three activity clusters for misusing its ChatGPT artificial intelligence (AI) tool to facilitate malware…

BatShadow Group Uses New Go-Based 'Vampire Bot' Malware to Hunt Job Seekers
07
Oct
2025

BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers

Oct 07, 2025Ravie LakshmananMalware / Threat Intelligence A Vietnamese threat actor named BatShadow has been attributed to a new campaign…

Google's New AI Doesn't Just Find Vulnerabilities — It Rewrites Code to Patch Them
07
Oct
2025

Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Oct 07, 2025Ravie LakshmananArtificial Intelligence / Software Security Google’s DeepMind division on Monday announced an artificial intelligence (AI)-powered agent called…

XWorm 6.0
07
Oct
2025

XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities

Cybersecurity researchers have charted the evolution of XWorm malware, turning it into a versatile tool for supporting a wide range…

AI Is Already the #1 Data Exfiltration Channel in the Enterprise
07
Oct
2025

AI Is Already the #1 Data Exfiltration Channel in the Enterprise

For years, security leaders have treated artificial intelligence as an “emerging” technology, something to keep an eye on but not…

Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware
07
Oct
2025

Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware

Oct 07, 2025Ravie LakshmananVulnerability / Cloud Security Microsoft on Monday attributed a threat actor it tracks as Storm-1175 to the…

CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely
07
Oct
2025

CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely

Oct 07, 2025Ravie LakshmananVulnerability / Cloud Security Redis has disclosed details of a maximum-severity security flaw in its in-memory database…

Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks
07
Oct
2025

Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks

Oct 07, 2025Ravie LakshmananCyber Attack / Ransomware CrowdStrike on Monday said it’s attributing the exploitation of a recently disclosed security…

New Report Links Research Firms BIETA and CIII to China's MSS Cyber Operations
06
Oct
2025

New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations

Oct 06, 2025Ravie LakshmananNetwork Security / Cyber Espionage A Chinese company named the Beijing Institute of Electronics Technology and Application…

Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers
06
Oct
2025

Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers

Oct 06, 2025Ravie LakshmananMalware / Data Breach Cybersecurity researchers have shed light on a Chinese-speaking cybercrime group codenamed UAT-8099 that…