Category: TheHackerNews

Google to Shut Down Dark Web Monitoring Tool in February 2026
16
Dec
2025

Google to Shut Down Dark Web Monitoring Tool in February 2026

Dec 16, 2025Ravie LakshmananDark Web / Online Safety Google has announced that it’s discontinuing its dark web report tool in…

Featured Chrome Browser Extension
15
Dec
2025

Featured Chrome Browser Extension Caught Intercepting Millions of Users’ AI Chats

A Google Chrome extension with a “Featured” badge and six million users has been observed silently gathering every prompt entered…

FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE
15
Dec
2025

FreePBX Patches Critical SQLi, File-Upload, and AUTHTYPE Bypass Flaws Enabling RCE

Dec 15, 2025Ravie LakshmananVulnerability / Software Security Multiple security vulnerabilities have been disclosed in the open-source private branch exchange (PBX)…

A Browser Extension Risk Guide After the ShadyPanda Campaign
15
Dec
2025

A Browser Extension Risk Guide After the ShadyPanda Campaign

In early December 2025, security researchers exposed a cybercrime campaign that had quietly hijacked popular Chrome and Edge browser extensions…

Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector
15
Dec
2025

Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector

Dec 15, 2025Ravie LakshmananMalware / Cybercrime Cybersecurity researchers have disclosed details of an active phishing campaign that’s targeting a wide…

VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption
15
Dec
2025

VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption

Dec 15, 2025Ravie LakshmananRansomware / Cybercrime The pro-Russian hacktivist group known as CyberVolk (aka GLORIAMIST) has resurfaced with a new…

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks
13
Dec
2025

CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks

Dec 13, 2025Ravie LakshmananNetwork Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a high-severity…

Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild
13
Dec
2025

Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the Wild

Dec 13, 2025Ravie LakshmananZero-Day / Vulnerability Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and…

Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads
12
Dec
2025

Fake OSINT and GPT Utility GitHub Repos Spread PyStoreRAT Malware Payloads

Cybersecurity researchers are calling attention to a new campaign that’s leveraging GitHub-hosted Python repositories to distribute a previously undocumented JavaScript-based…

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
12
Dec
2025

New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale

Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are capable of facilitating…

Securing GenAI in the Browser
12
Dec
2025

Policy, Isolation, and Data Controls That Actually Work

The browser has become the main interface to GenAI for most enterprises: from web-based LLMs and copilots, to GenAI‑powered extensions…

React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation
12
Dec
2025

React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation

Dec 12, 2025Ravie LakshmananVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged federal agencies to…