Category: TheHackerNews

GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets
23
Aug
2025

GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets

Cybersecurity researchers are calling attention to multiple campaigns that leverage known security vulnerabilities and expose Redis servers to various malicious…

Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
22
Aug
2025

Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection

Cybersecurity researchers have shed light on a novel attack chain that employs phishing emails to deliver an open-source backdoor called…

INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown
22
Aug
2025

INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown

Aug 22, 2025Ravie LakshmananOnline Fraud / Financial Crime INTERPOL on Friday announced that authorities from 18 countries across Africa have…

Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage
22
Aug
2025

Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage

Cybersecurity researchers are calling attention to malicious activity orchestrated by a China-nexus cyber espionage group known as Murky Panda that…

Automation Is Redefining Pentest Delivery
22
Aug
2025

Automation Is Redefining Pentest Delivery

Aug 22, 2025The Hacker NewsPenetration Testing / Security Operations Pentesting remains one of the most effective ways to identify real-world…

22
Aug
2025

Automation Is Redefining Pentest Delivery

Aug 22, 2025The Hacker NewsPenetration Testing / Security Operations Pentesting remains one of the most effective ways to identify real-world…

22
Aug
2025

Automation Is Redefining Pentest Delivery

Aug 22, 2025The Hacker NewsPenetration Testing / Security Operations Pentesting remains one of the most effective ways to identify real-world…

Kill-Switch Malware
22
Aug
2025

Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware

Aug 22, 2025Ravie LakshmananCybercrime / Malware A 55-year-old Chinese national has been sentenced to four years in prison and three…

Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks
21
Aug
2025

Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks

Aug 21, 2025Ravie LakshmananVulnerability / Software Security Commvault has released updates to address four security gaps that could be exploited…

Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger
21
Aug
2025

Hackers Using New QuirkyLoader Malware to Spread Agent Tesla, AsyncRAT and Snake Keylogger

Aug 21, 2025Ravie LakshmananMalware / Email Security Cybersecurity researchers have disclosed details of a new malware loader called QuirkyLoader that’s…

Fake CAPTCHA Pages
21
Aug
2025

Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages

Aug 21, 2025Ravie LakshmananMalware / Cryptocurrency Threat actors have been observed leveraging the deceptive social engineering tactic known as ClickFix…

Key Findings from the Blue Report 2025
21
Aug
2025

Key Findings from the Blue Report 2025

As security professionals, it’s easy to get caught up in a race to counter the latest advanced adversary techniques. Yet…