Category: TheHackerNews

27
Oct
2025

ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands

The newly released OpenAI Atlas web browser has been found to be susceptible to a prompt injection attack where its…

Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation
24
Oct
2025

Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation

Oct 24, 2025Ravie LakshmananData Breach / Cybercrime The threat actors behind a large-scale, ongoing smishing campaign have been attributed to…

Critical WSUS Vulnerability
24
Oct
2025

Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation

Oct 24, 2025Ravie LakshmananVulnerability / Network Security Microsoft on Thursday released out-of-band security updates to patch a critical-severity Windows Server…

DeskRAT Malware Campaign
24
Oct
2025

APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign

Oct 24, 2025Ravie LakshmananCyber Espionage / Malware A Pakistan-nexus threat actor has been observed targeting Indian government entities as part…

Why Executives and Practitioners See Risk Differently
24
Oct
2025

Why Executives and Practitioners See Risk Differently

Oct 24, 2025The Hacker NewsCyber Resilience / Data Protection Does your organization suffer from a cybersecurity perception gap? Findings from…

3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation
24
Oct
2025

3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation

Oct 24, 2025Ravie LakshmananMalware / Hacking News A malicious network of YouTube accounts has been observed publishing and promoting videos…

Supply Chain Attack
24
Oct
2025

Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack

Oct 24, 2025Ravie LakshmananDevOps / Malware Cybersecurity researchers have discovered a self-propagating worm that spreads via Visual Studio Code (VS…

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets
23
Oct
2025

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets

Oct 23, 2025Ravie LakshmananCyber Espionage / Threat Intelligence Threat actors with ties to North Korea have been attributed to a…

Secure AI at Scale and Speed — Learn the Framework in this Free Webinar
23
Oct
2025

Secure AI at Scale and Speed — Learn the Framework in this Free Webinar

Oct 23, 2025The Hacker NewsArtificial Intelligence / Data Protection AI is everywhere—and your company wants in. Faster products, smarter systems,…

Why Organizations Are Abandoning Static Secrets for Managed Identities
23
Oct
2025

Why Organizations Are Abandoning Static Secrets for Managed Identities

Oct 23, 2025The Hacker NewsDevOps / Data Protection As machine identities explode across cloud environments, enterprises report dramatic productivity gains…

"Jingle Thief" Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards
23
Oct
2025

“Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

Cybersecurity researchers have shed light on a cybercriminal group called Jingle Thief that has been observed targeting cloud environments associated…

Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms
23
Oct
2025

Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms

Oct 23, 2025Ravie LakshmananVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical…