Category: TheHackerNews

Malicious PyPI Package
02
Oct
2025

Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown

Oct 02, 2025Ravie LakshmananPython / Malware Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository…

Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware
02
Oct
2025

Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware

Oct 02, 2025Ravie LakshmananRansomware / Threat Intelligence Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are…

7 Key Workflows for Maximum Impact
02
Oct
2025

7 Key Workflows for Maximum Impact

Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is time…

How to Close Threat Detection Gaps: Your SOC's Action Plan
02
Oct
2025

How to Close Threat Detection Gaps: Your SOC’s Action Plan

Running a SOC often feels like drowning in alerts. Every morning, dashboards light up with thousands of signals; some urgent,…

Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro
02
Oct
2025

Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro

Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like Signal and ToTok to…

New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer
01
Oct
2025

New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer

Oct 01, 2025Ravie LakshmananEncryption / Hardware Security In yet another piece of research, academics from Georgia Institute of Technology and…

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps
01
Oct
2025

OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps

Oct 01, 2025Ravie LakshmananVulnerability / API Security A high-severity security flaw has been disclosed in the One Identity OneLogin Identity…

Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover
01
Oct
2025

Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover

Oct 01, 2025Ravie LakshmananAI Security / Cloud Security A severe security flaw has been disclosed in the Red Hat OpenShift…

Leading Security Teams Blend AI + Human Workflows
01
Oct
2025

How Leading Security Teams Blend AI + Human Workflows (Free Webinar)

Oct 01, 2025The Hacker NewsAutomation / IT Operations AI is changing automation—but not always for the better. That’s why we’re…

Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising
01
Oct
2025

Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising

Oct 01, 2025The Hacker NewsAttack Surface / Artificial Intelligence Bitdefender’s 2025 Cybersecurity Assessment Report paints a sobering picture of today’s…

Hackers Exploit Milesight Routers to Send Phishing SMS to European Users
01
Oct
2025

Hackers Exploit Milesight Routers to Send Phishing SMS to European Users

Oct 01, 2025Ravie LakshmananVulnerability / Malware Unknown threat actors are abusing Milesight industrial cellular routers to send SMS messages as…

Android Banking Trojan
01
Oct
2025

New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones

A previously undocumented Android banking trojan called Klopatra has compromised over 3,000 devices, with a majority of the infections reported…