Category: TheHackerNews

RapperBot Botnet
20
Aug
2025

DOJ Charges 22-Year-Old for Running RapperBot Botnet Behind 370,000 DDoS Attacks

Aug 20, 2025Ravie LakshmananBotnet / Cybercrime A 22-year-old man from the U.S. state of Oregon has been charged with allegedly…

Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems
19
Aug
2025

Apache ActiveMQ Flaw Exploited to Deploy DripDropper Malware on Cloud Linux Systems

Aug 19, 2025Ravie LakshmananLinux / Malware Threat actors are exploiting a nearly two-year-old security flaw in Apache ActiveMQ to gain…

Steganography and Gh0st RAT Code
19
Aug
2025

New GodRAT Trojan Targets Trading Firms Using Steganography and Gh0st RAT Code

Aug 19, 2025Ravie LakshmananMalware / Cyber Attack Financial institutions like trading and brokerage firms are the target of a new…

Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution
19
Aug
2025

Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution

Aug 19, 2025Ravie LakshmananVulnerability / Cyber Espionage A new exploit combining two critical, now-patched security flaws in SAP NetWeaver has…

Why Your Security Culture is Critical to Mitigating Cyber Risk
19
Aug
2025

Why Your Security Culture is Critical to Mitigating Cyber Risk

After two decades of developing increasingly mature security architectures, organizations are running up against a hard truth: tools and technologies…

U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback
19
Aug
2025

U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback

Aug 19, 2025Ravie LakshmananEncryption / Cloud Security The U.K. government has apparently abandoned its plans to force Apple to weaken…

Expired-Domain Emails
19
Aug
2025

PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks

Aug 19, 2025Ravie LakshmananSupply Chain Security The maintainers of the Python Package Index (PyPI) repository have announced that the package…

Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures
18
Aug
2025

Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures

Aug 18, 2025Ravie LakshmananMalware / Enterprise Security The threat actors behind the Noodlophile malware are leveraging spear-phishing emails and updated…

Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware
18
Aug
2025

Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware

Aug 18, 2025Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers have lifted the lid on the threat actors’ exploitation of a…

Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks
18
Aug
2025

Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks

Cybersecurity researchers have discovered a malicious package in the Python Package Index (PyPI) repository that introduces malicious behavior through a…

Wazuh for Regulatory Compliance
18
Aug
2025

Wazuh for Regulatory Compliance

Aug 18, 2025The Hacker NewsData Breach / Regulatory Compliance Organizations handling various forms of sensitive data or personally identifiable information…

ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure
16
Aug
2025

ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure

Aug 16, 2025Ravie LakshmananAndroid / Malware Cybersecurity researchers have detailed the inner workings of an Android banking trojan called ERMAC…