Category: TheHackerNews

Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally
04
Aug
2025

Vietnamese Hackers Use PXA Stealer, Hit 4,000 IPs and Steal 200,000 Passwords Globally

Aug 04, 2025Ravie LakshmananMalware / Browser Security Cybersecurity researchers are calling attention to a new wave of campaigns distributing a…

Man-in-the-Middle Attack Prevention Guide
04
Aug
2025

Man-in-the-Middle Attack Prevention Guide

Some of the most devastating cyberattacks don’t rely on brute force, but instead succeed through stealth. These quiet intrusions often…

Wild West of Shadow IT
04
Aug
2025

The Wild West of Shadow IT

Everyone’s an IT decision-maker now. The employees in your organization can install a plugin with just one click, and they…

PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads
04
Aug
2025

PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads

Cybersecurity researchers have discovered a nascent Android remote access trojan (RAT) called PlayPraetor that has infected more than 11,000 devices,…

CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign
02
Aug
2025

CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign

Telecommunications organizations in Southeast Asia have been targeted by a state-sponsored threat actor known as CL-STA-0969 to facilitate remote control…

Linux Malware
02
Aug
2025

New ‘Plague’ PAM Backdoor Exposes Critical Linux Systems to Silent Credential Theft

Aug 02, 2025Ravie LakshmananThreat Detection / SSH Security Cybersecurity researchers have flagged a previously undocumented Linux backdoor dubbed Plague that…

Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
02
Aug
2025

Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices

Aug 02, 2025Ravie LakshmananVulnerability / Zero Day SonicWall SSL VPN devices have become the target of Akira ransomware attacks as…

Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
01
Aug
2025

Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection

Cybersecurity researchers have disclosed a now-patched, high-severity security flaw in Cursor, a popular artificial intelligence (AI) code editor, that could…

01
Aug
2025

Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection

Cybersecurity researchers have disclosed a now-patched, high-severity security flaw in Cursor, a popular artificial intelligence (AI) code editor, that could…

Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts
01
Aug
2025

Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Cybersecurity researchers have detailed a new cluster of activity where threat actors are impersonating enterprises with fake Microsoft OAuth applications…

AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown
01
Aug
2025

AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown

Aug 01, 2025Ravie LakshmananMalware / Artificial Intelligence Cybersecurity researchers have flagged a malicious npm package that was generated using artificial…

Why Your AI Security Tools Are Only as Strong as the Data You Feed Them
01
Aug
2025

Why Your AI Security Tools Are Only as Strong as the Data You Feed Them

Just as triathletes know that peak performance requires more than expensive gear, cybersecurity teams are discovering that AI success depends…