Category: TheHackerNews

N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto
31
Jul
2025

N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto

Jul 31, 2025Ravie LakshmananCryptocurrency / Malware The North Korea-linked threat actor known as UNC4899 has been attributed to attacks targeting…

What the 2025 Gartner® Magic Quadrant™ Reveals
31
Jul
2025

What the 2025 Gartner® Magic Quadrant Reveals

Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most…

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs
31
Jul
2025

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs

Jul 31, 2025The Hacker NewsSecurity Operations / Threat Detection Security Operations Centers (SOCs) are stretched to their limits. Log volumes…

31
Jul
2025

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs

Jul 31, 2025The Hacker NewsSecurity Operations / Threat Detection Security Operations Centers (SOCs) are stretched to their limits. Log volumes…

UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud
31
Jul
2025

UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud

Jul 31, 2025Ravie Lakshmanan The financially motivated threat actor known as UNC2891 has been observed targeting Automatic Teller Machine (ATM)…

Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install
31
Jul
2025

Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install

Jul 31, 2025Ravie LakshmananVulnerability / Website Security Threat actors are actively exploiting a critical security flaw in “Alone – Charity…

Fake Cryptocurrency Trading Apps
30
Jul
2025

Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

Jul 30, 2025Ravie LakshmananCryptocurrency / Browser Security Cybersecurity researchers are calling attention to an ongoing campaign that distributes fake cryptocurrency…

FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant
30
Jul
2025

FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant

Jul 30, 2025Ravie LakshmananEncryption / Ransomware Cybersecurity experts have released a decryptor for a ransomware strain called FunkSec, allowing victims…

Safari Vulnerability
30
Jul
2025

Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google Chrome

Jul 30, 2025Ravie LakshmananVulnerability / Zero-Day Apple on Tuesday released security updates for its entire software portfolio, including a fix…

Pillar Security AI Security Platform
30
Jul
2025

A Look Inside Pillar’s AI Security Platform

In this article, we will provide a brief overview of Pillar Security’s platform to better understand how they are tackling…

Critical Dahua Camera Flaws
30
Jul
2025

Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits

Jul 30, 2025Ravie LakshmananFirmware Security / Vulnerability Cybersecurity researchers have disclosed now-patched critical security flaws in the firmware of Dahua…

Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage Tools
30
Jul
2025

Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage Tools

Jul 30, 2025Ravie LakshmananEndpoint Security / Cyber Espionage Chinese companies linked to the state-sponsored hacking group known as Silk Typhoon…