Category: TheHackerNews

AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims
08
Aug
2025

AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims

Cybersecurity researchers are drawing attention to a new campaign that’s using legitimate generative artificial intelligence (AI)-powered website building tools like…

RubyGems, PyPI Hit by Malicious Packages
08
Aug
2025

RubyGems, PyPI Hit by Malicious Packages Stealing Credentials, Crypto, Forcing Security Changes

A fresh set of 60 malicious packages has been uncovered targeting the RubyGems ecosystem by posing as seemingly innocuous automation…

What Attackers Are Doing With Them
08
Aug
2025

What Attackers Are Doing With Them

When an organization’s credentials are leaked, the immediate consequences are rarely visible—but the long-term impact is far-reaching. Far from the…

Malicious Firefox Wallet Extensions
08
Aug
2025

GreedyBear Steals $1M in Crypto Using 150+ Malicious Firefox Wallet Extensions

A newly discovered campaign dubbed GreedyBear has leveraged over 150 malicious extensions to the Firefox marketplace that are designed to…

SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others
07
Aug
2025

SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others

Aug 07, 2025Ravie LakshmananMalware / Threat Intelligence The threat actors behind the SocGholish malware have been observed leveraging Traffic Distribution…

SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day
07
Aug
2025

SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day

Aug 07, 2025Ravie LakshmananNetwork Security / Vulnerability SonicWall has revealed that the recent spike in activity targeting its Gen 7…

6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits
07
Aug
2025

6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits

Aug 07, 2025Ravie LakshmananVulnerability / Threat Intelligence Cybersecurity researchers have disclosed multiple security flaws in video surveillance products from Axis…

Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes
07
Aug
2025

Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes

Aug 07, 2025Ravie LakshmananMalware / Threat Intelligence Cybersecurity researchers have discovered a set of 11 malicious Go packages that are…

What 2025 Is Teaching Us About Cloud Defense
07
Aug
2025

What 2025 Is Teaching Us About Cloud Defense

Now that we are well into 2025, cloud attacks are evolving faster than ever and artificial intelligence (AI) is both…

Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups
07
Aug
2025

Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups

Aug 07, 2025Ravie LakshmananVulnerability / Threat Detection Microsoft has released an advisory for a high-severity security flaw affecting on-premise versions…

How to Stop Python Supply Chain Attacks—and the Expert Tools You Need
07
Aug
2025

How to Stop Python Supply Chain Attacks—and the Expert Tools You Need

Aug 07, 2025The Hacker NewsDevSecOps / Supply Chain Security Python is everywhere in modern software. From machine learning models to…

Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft
07
Aug
2025

Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft

Aug 06, 2025Ravie LakshmananDevOps / Container Security Cybersecurity researchers have demonstrated an “end-to-end privilege escalation chain” in Amazon Elastic Container…