Category: TheHackerNews

CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat
20
Nov
2025

CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat

Nov 20, 2025The Hacker NewsOnline Fraud / Web Security CTM360 has identified a rapidly expanding WhatsApp account-hacking campaign targeting users…

Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
20
Nov
2025

Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

Nov 20, 2025Ravie LakshmananCyber Warfare / Threat Intelligence Threat actors with ties to Iran engaged in cyber warfare as part…

TamperedChef Malware
20
Nov
2025

TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign

Nov 20, 2025Ravie LakshmananMalvertising / Artificial Intelligence Threat actors are leveraging bogus installers masquerading as popular software to trick users…

Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)
19
Nov
2025

Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)

Nov 19, 2025Ravie LakshmananVulnerability / Threat Intelligence A recently disclosed security flaw impacting 7-Zip has come under active exploitation in…

Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices
19
Nov
2025

Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices

Cybersecurity researchers have disclosed details of a new campaign that leverages a combination of social engineering and WhatsApp hijacking to…

WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide
19
Nov
2025

WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide

Nov 19, 2025Ravie LakshmananVulnerability / Threat Intelligence A newly discovered campaign has compromised tens of thousands of outdated or end-of-life…

How to Use Ringfencing to Prevent the Weaponization of Trusted Software
19
Nov
2025

How to Use Ringfencing to Prevent the Weaponization of Trusted Software

The challenge facing security leaders is monumental: Securing environments where failure is not an option. Reliance on traditional security postures,…

ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts
19
Nov
2025

ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts

Nov 19, 2025Ravie LakshmananAI Security / SaaS Security Malicious actors can exploit default configurations in ServiceNow’s Now Assist generative artificial…

EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates
19
Nov
2025

EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates

Nov 19, 2025Ravie LakshmananCyber Espionage / Malware The threat actor known as PlushDaemon has been observed using a previously undocumented…

FortiWeb CVE-2025-58034 Vulnerability
19
Nov
2025

Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild

Nov 19, 2025Ravie LakshmananVulnerability / Network Security Fortinet has warned of a new security flaw in FortiWeb that it said…

Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar
18
Nov
2025

Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar

The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their…

Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year
18
Nov
2025

Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year

Nov 18, 2025Ravie LakshmananBug Bounty / Data Privacy Meta on Tuesday said it has made available a tool called WhatsApp…