Category: TheHackerNews

HTA-Delivered C# Malware
06
Aug
2025

CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures

Aug 06, 2025Ravie LakshmananCyber Espionage / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks…

06
Aug
2025

http://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks carried out by a threat actor called…

D-Link Vulnerabilities
06
Aug
2025

CISA Adds 3 D-Link Vulnerabilities to KEV Catalog Amid Active Exploitation Evidence

Aug 06, 2025Ravie LakshmananVulnerability / Firmware Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added three old…

AI Is Transforming Cybersecurity Adversarial Testing
06
Aug
2025

AI Is Transforming Cybersecurity Adversarial Testing

When Technology Resets the Playing Field In 2015 I founded a cybersecurity testing software company with the belief that automated…

ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections
05
Aug
2025

ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections

Aug 05, 2025Ravie LakshmananSocial Engineering / Malware A combination of propagation methods, narrative sophistication, and evasion techniques enabled the social…

Cursor AI Code Editor Vulnerability
05
Aug
2025

Cursor AI Code Editor Vulnerability Enables RCE via Malicious MCP File Swaps Post Approval

Aug 05, 2025Ravie LakshmananAI Security / MCP Protocol Cybersecurity researchers have disclosed a high-severity security flaw in the artificial intelligence…

Google's August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild
05
Aug
2025

Google’s August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild

Aug 05, 2025Ravie LakshmananVulnerability / Mobile Security Google has released security updates to address multiple security flaws in Android, including…

The Costly Confusion Behind Security Risks
05
Aug
2025

The Costly Confusion Behind Security Risks

In SaaS security conversations, “misconfiguration” and “vulnerability” are often used interchangeably. But they’re not the same thing. And misunderstanding that…

How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents
05
Aug
2025

How Top CISOs Save Their SOCs from Alert Chaos to Never Miss Real Incidents

Why do SOC teams still drown in alerts even after spending big on security tools? False positives pile up, stealthy…

AI-Driven Scam
05
Aug
2025

15,000 Fake TikTok Shop Domains Deliver Malware, Steal Crypto via AI-Driven Scam Campaign

Aug 05, 2025Ravie LakshmananMalware / Mobile Security Cybersecurity researchers have lifted the veil on a widespread malicious campaign that’s targeting…

SonicWall SSL VPN Zero-Day
05
Aug
2025

SonicWall Investigating Potential SSL VPN Zero-Day After 20+ Targeted Attacks Reported

Aug 05, 2025Ravie LakshmananZero-Day / Network Security SonicWall said it’s actively investigating reports to determine if there is a new…

NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers
04
Aug
2025

NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers

Aug 04, 2025Ravie LakshmananAI Security / Vulnerability A newly disclosed set of security flaws in NVIDIA’s Triton Inference Server for…