Category: TheHackerNews

Stealit Malware Abuses Node.js Single Executable Feature
10
Oct
2025

Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers

Oct 10, 2025Ravie LakshmananRansomware / Data Theft Cybersecurity researchers have disclosed details of an active malware campaign called Stealit that…

175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign
10
Oct
2025

175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign

Oct 10, 2025Ravie LakshmananCybercrime / Malware Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm…

Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation
10
Oct
2025

Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation

Oct 10, 2025Ravie LakshmananVulnerability / Network Security Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical…

What Sets Top-Tier Platforms Apart?
10
Oct
2025

What Sets Top-Tier Platforms Apart?

The SOC of 2026 will no longer be a human-only battlefield. As organizations scale and threats evolve in sophistication and…

Gladinet and TrioFox Vulnerability
10
Oct
2025

Active Exploitation Detected in Gladinet and TrioFox Vulnerability

Oct 10, 2025Ravie LakshmananVulnerability / Zero-Day Cybersecurity company Huntress said it has observed active in-the-wild exploitation of an unpatched security…

CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw
10
Oct
2025

CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw

Oct 10, 2025Ravie LakshmananVulnerability / Threat Intelligence Dozens of organizations may have been impacted following the zero-day exploitation of a…

The Evolution of UTA0388's Espionage Malware
09
Oct
2025

The Evolution of UTA0388’s Espionage Malware

Oct 09, 2025Ravie LakshmananCyber Espionage / Artificial Intelligence A China-aligned threat actor codenamed UTA0388 has been attributed to a series…

New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps
09
Oct
2025

New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps

Oct 09, 2025Ravie LakshmananMobile Security / Malware A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia…

Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks
09
Oct
2025

Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks

Oct 09, 2025Ravie LakshmananCloud Security / Network Security SonicWall on Wednesday disclosed that an unauthorized party accessed firewall configuration backup…

SaaS Breaches Start with Tokens
09
Oct
2025

SaaS Breaches Start with Tokens

Token theft is a leading cause of SaaS breaches. Discover why OAuth and API tokens are often overlooked and how…

AI Becomes Russia's New Cyber Weapon in War on Ukraine
09
Oct
2025

AI Becomes Russia’s New Cyber Weapon in War on Ukraine

Oct 09, 2025Ravie LakshmananArtificial Intelligence / Malware Russian hackers’ adoption of artificial intelligence (AI) in cyber attacks against Ukraine has…

Bypass Authentication in WordPress
09
Oct
2025

Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme

Oct 09, 2025Ravie LakshmananVulnerability / Website Security Threat actors are actively exploiting a critical security flaw impacting the Service Finder…