Category: TheHackerNews

ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots
27
Aug
2025

ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots

A threat activity cluster known as ShadowSilk has been attributed to a fresh set of attacks targeting government entities within…

The 5 Golden Rules of Safe AI Adoption
27
Aug
2025

The 5 Golden Rules of Safe AI Adoption

Aug 27, 2025The Hacker NewsEnterprise Security / Data Protection Employees are experimenting with AI at record speed. They are drafting…

Blind Eagle's Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra
27
Aug
2025

Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra

Cybersecurity researchers have discovered five distinct activity clusters linked to a persistent threat actor known as Blind Eagle between May…

Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data
27
Aug
2025

Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data

Aug 27, 2025Ravie LakshmananCloud Security / Threat Intelligence A widespread data theft campaign has allowed hackers to breach sales automation…

New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station
26
Aug
2025

New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station

Aug 26, 2025Ravie LakshmananVulnerability / Mobile Security A team of academics has devised a novel attack that can be used…

Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775
26
Aug
2025

Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775

Aug 26, 2025Ravie LakshmananVulnerability / Remote Code Execution Citrix has released fixes to address three security flaws in NetScaler ADC…

U.S. Supply Chain Manufacturers
26
Aug
2025

MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers

Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that’s targeting supply chain-critical manufacturing companies with an in-memory…

Exploits WordPress Sites to Spread Ransomware
26
Aug
2025

ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners

A new large-scale campaign has been observed exploiting over 100 compromised WordPress sites to direct site visitors to fake CAPTCHA…

HOOK Android Trojan
26
Aug
2025

HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands

Aug 26, 2025Ravie Lakshmanan Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features…

CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git
26
Aug
2025

CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git

Aug 26, 2025Ravie LakshmananVulnerability / Data Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security…

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps
26
Aug
2025

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

Aug 26, 2025Ravie LakshmananMobile Security / Data Privacy Google has announced plans to begin verifying the identity of all developers…

Container Escape Vulnerability
25
Aug
2025

Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3

Aug 25, 2025Ravie LakshmananContainer Security / Vulnerability Docker has released fixes to address a critical security flaw affecting the Docker…