Category: TheHackerNews

New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit
12
Sep
2025

New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit

Cybersecurity researchers have discovered a new ransomware strain dubbed HybridPetya that resembles the notorious Petya/NotPetya malware, while also incorporating the…

Why Runtime Visibility Must Take Center Stage
12
Sep
2025

Why Runtime Visibility Must Take Center Stage

The security landscape for cloud-native applications is undergoing a profound transformation. Containers, Kubernetes, and serverless technologies are now the default…

Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories
12
Sep
2025

Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories

A security weakness has been disclosed in the artificial intelligence (AI)-powered code editor Cursor that could trigger code execution when…

Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence
11
Sep
2025

Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence

U.S. Senator Ron Wyden has called on the Federal Trade Commission (FTC) to probe Microsoft and hold it responsible for…

Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity
11
Sep
2025

Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity

Sep 11, 2025Ravie LakshmananArtificial Intelligence / Mobile Security Google on Tuesday announced that its new Google Pixel 10 phones support…

SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers
11
Sep
2025

SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers

Threat actors affiliated with the Akira ransomware group have continued to target SonicWall devices for initial access. Cybersecurity firm Rapid7…

Helping CISOs Speak the Language of Business
11
Sep
2025

Helping CISOs Speak the Language of Business

Sep 11, 2025The Hacker NewsContinuous Threat Exposure Management CISOs know their field. They understand the threat landscape. They understand how…

Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts
11
Sep
2025

Fake Madgicx Plus and SocialMetrics Extensions Are Hijacking Meta Business Accounts

Sep 11, 2025Ravie LakshmananMalvertising / Browser Security Cybersecurity researchers have disclosed two new campaigns that are serving fake browser extensions…

AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto
11
Sep
2025

AsyncRAT Exploits ConnectWise ScreenConnect to Steal Credentials and Crypto

Sep 11, 2025Ravie LakshmananMalware / Credential Theft Cybersecurity researchers have disclosed details of a new campaign that leverages ConnectWise ScreenConnect,…

Chinese APT
10
Sep
2025

Chinese APT Deploys EggStreme Fileless Malware to Breach Philippine Military Systems

Sep 10, 2025Ravie LakshmananCybersecurity / Malware An advanced persistent threat (APT) group from China has been attributed to the compromise…

CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems
10
Sep
2025

CHILLYHELL macOS Backdoor and ZynorRAT RAT Threaten macOS, Windows, and Linux Systems

Cybersecurity researchers have discovered two new malware families, including a modular Apple macOS backdoor called CHILLYHELL and a Go-based remote…

Apple iPhone Air and iPhone 17 Feature A19 Chips With Spyware-Resistant Memory Safety
10
Sep
2025

Apple iPhone Air and iPhone 17 Feature A19 Chips With Spyware-Resistant Memory Safety

Sep 10, 2025Ravie LakshmananSpyware / Vulnerability Apple on Tuesday revealed a new security feature called Memory Integrity Enforcement (MIE) that’s…