Category: TheHackerNews

Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775
26
Aug
2025

Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775

Aug 26, 2025Ravie LakshmananVulnerability / Remote Code Execution Citrix has released fixes to address three security flaws in NetScaler ADC…

U.S. Supply Chain Manufacturers
26
Aug
2025

MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers

Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that’s targeting supply chain-critical manufacturing companies with an in-memory…

Exploits WordPress Sites to Spread Ransomware
26
Aug
2025

ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners

A new large-scale campaign has been observed exploiting over 100 compromised WordPress sites to direct site visitors to fake CAPTCHA…

HOOK Android Trojan
26
Aug
2025

HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands

Aug 26, 2025Ravie Lakshmanan Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features…

CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git
26
Aug
2025

CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git

Aug 26, 2025Ravie LakshmananVulnerability / Data Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security…

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps
26
Aug
2025

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

Aug 26, 2025Ravie LakshmananMobile Security / Data Privacy Google has announced plans to begin verifying the identity of all developers…

Container Escape Vulnerability
25
Aug
2025

Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3

Aug 25, 2025Ravie LakshmananContainer Security / Vulnerability Docker has released fixes to address a critical security flaw affecting the Docker…

UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
25
Aug
2025

UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats

Aug 25, 2025Ravie LakshmananMalware / Cyber Espionage A China-nexus threat actor known as UNC6384 has been attributed to a set…

Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads
25
Aug
2025

Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads

Cybersecurity researchers have flagged a new phishing campaign that’s using fake voicemails and purchase orders to deliver a malware loader…

Insights from 160 Million Attack Simulations
25
Aug
2025

Insights from 160 Million Attack Simulations

Security Information and Event Management (SIEM) systems act as the primary tools for detecting suspicious activity in enterprise networks, helping…

Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing
25
Aug
2025

Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing

Aug 25, 2025Ravie LakshmananMalware / Cyber Attack The advanced persistent threat (APT) actor known as Transparent Tribe has been observed…

SSH Brute-Force Tool
24
Aug
2025

Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot

Aug 24, 2025Ravie LakshmananMalware / Supply Chain Security Cybersecurity researchers have discovered a malicious Go module that presents itself as…