Category: TheHackerNews

Privacy in the Age of Agentic AI
15
Aug
2025

Privacy in the Age of Agentic AI

We used to think of privacy as a perimeter problem: about walls and locks, permissions, and policies. But in a…

U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions
15
Aug
2025

U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) on Thursday renewed sanctions against Russian cryptocurrency exchange…

Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution
15
Aug
2025

Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution

Aug 15, 2025Ravie LakshmananVulnerability / Network Security Cisco has released security updates to address a maximum-severity security flaw in Secure…

New HTTP/2 'MadeYouReset' Vulnerability
14
Aug
2025

New HTTP/2 ‘MadeYouReset’ Vulnerability Enables Large-Scale DoS Attacks

Aug 14, 2025Ravie LakshmananServer Security / Vulnerability Multiple HTTP/2 implementations have been found susceptible to a new attack technique called…

CrossC2 Expands Cobalt Strike
14
Aug
2025

Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS

Aug 14, 2025Ravie LakshmananThreat Intelligence / Linux Japan’s CERT coordination center (JPCERT/CC) on Thursday revealed it observed incidents that involved…

New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits
14
Aug
2025

New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits

Cybersecurity researchers have disclosed a new Android trojan called PhantomCard that abuses near-field communication (NFC) to conduct relay attacks for…

Have You Turned Off Your Virtual Oven?
14
Aug
2025

Have You Turned Off Your Virtual Oven?

You check that the windows are shut before leaving home. Return to the kitchen to verify that the oven and…

Attack Surface Reduction
14
Aug
2025

Simple Steps for Attack Surface Reduction

Aug 14, 2025The Hacker NewsEndpoint Security / Application Security Story teaser text: Cybersecurity leaders face mounting pressure to stop attacks…

Google Requires Crypto App Licenses
14
Aug
2025

Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses

Aug 14, 2025Ravie LakshmananCryptocurrency / Financial Crime Google said it’s implementing a new policy requiring developers of cryptocurrency exchanges and…

Known Exploited Vulnerabilities Catalog
14
Aug
2025

CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog

Aug 14, 2025Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security…

New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
13
Aug
2025

New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks

Aug 13, 2025Ravie LakshmananMalvertising / Cryptocurrency Cybersecurity researchers have discovered a new malvertising campaign that’s designed to infect victims with…

Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws
13
Aug
2025

Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws

Aug 13, 2025Ravie LakshmananVulnerability / Software Security Zoom and Xerox have addressed critical security flaws in Zoom Clients for Windows…