Category: TheHackerNews

UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
25
Aug
2025

UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats

Aug 25, 2025Ravie LakshmananMalware / Cyber Espionage A China-nexus threat actor known as UNC6384 has been attributed to a set…

Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads
25
Aug
2025

Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads

Cybersecurity researchers have flagged a new phishing campaign that’s using fake voicemails and purchase orders to deliver a malware loader…

Insights from 160 Million Attack Simulations
25
Aug
2025

Insights from 160 Million Attack Simulations

Security Information and Event Management (SIEM) systems act as the primary tools for detecting suspicious activity in enterprise networks, helping…

Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing
25
Aug
2025

Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing

Aug 25, 2025Ravie LakshmananMalware / Cyber Attack The advanced persistent threat (APT) actor known as Transparent Tribe has been observed…

SSH Brute-Force Tool
24
Aug
2025

Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot

Aug 24, 2025Ravie LakshmananMalware / Supply Chain Security Cybersecurity researchers have discovered a malicious Go module that presents itself as…

GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets
23
Aug
2025

GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets

Cybersecurity researchers are calling attention to multiple campaigns that leverage known security vulnerabilities and expose Redis servers to various malicious…

Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
22
Aug
2025

Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection

Cybersecurity researchers have shed light on a novel attack chain that employs phishing emails to deliver an open-source backdoor called…

INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown
22
Aug
2025

INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown

Aug 22, 2025Ravie LakshmananOnline Fraud / Financial Crime INTERPOL on Friday announced that authorities from 18 countries across Africa have…

Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage
22
Aug
2025

Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage

Cybersecurity researchers are calling attention to malicious activity orchestrated by a China-nexus cyber espionage group known as Murky Panda that…

Automation Is Redefining Pentest Delivery
22
Aug
2025

Automation Is Redefining Pentest Delivery

Aug 22, 2025The Hacker NewsPenetration Testing / Security Operations Pentesting remains one of the most effective ways to identify real-world…

22
Aug
2025

Automation Is Redefining Pentest Delivery

Aug 22, 2025The Hacker NewsPenetration Testing / Security Operations Pentesting remains one of the most effective ways to identify real-world…

22
Aug
2025

Automation Is Redefining Pentest Delivery

Aug 22, 2025The Hacker NewsPenetration Testing / Security Operations Pentesting remains one of the most effective ways to identify real-world…