Category: TheHackerNews

Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection
01
Aug
2025

Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection

Cybersecurity researchers have disclosed a now-patched, high-severity security flaw in Cursor, a popular artificial intelligence (AI) code editor, that could…

01
Aug
2025

Cursor AI Code Editor Fixed Flaw Allowing Attackers to Run Commands via Prompt Injection

Cybersecurity researchers have disclosed a now-patched, high-severity security flaw in Cursor, a popular artificial intelligence (AI) code editor, that could…

Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts
01
Aug
2025

Attackers Use Fake OAuth Apps with Tycoon Kit to Breach Microsoft 365 Accounts

Cybersecurity researchers have detailed a new cluster of activity where threat actors are impersonating enterprises with fake Microsoft OAuth applications…

AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown
01
Aug
2025

AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown

Aug 01, 2025Ravie LakshmananMalware / Artificial Intelligence Cybersecurity researchers have flagged a malicious npm package that was generated using artificial…

Why Your AI Security Tools Are Only as Strong as the Data You Feed Them
01
Aug
2025

Why Your AI Security Tools Are Only as Strong as the Data You Feed Them

Just as triathletes know that peak performance requires more than expensive gear, cybersecurity teams are discovering that AI success depends…

Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks
01
Aug
2025

Storm-2603 Deploys DNS-Controlled Backdoor in Warlock and LockBit Ransomware Attacks

Aug 01, 2025Ravie LakshmananThreat Intelligence / Ransomware The threat actor linked to the exploitation of the recently disclosed security flaws…

Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies
31
Jul
2025

Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies

Jul 31, 2025Ravie LakshmananCyber Espionage / Network Security The Russian nation-state threat actor known as Secret Blizzard has been observed…

Microsoft 365 Credential Theft Attempts
31
Jul
2025

Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials

Jul 31, 2025Ravie LakshmananPhishing / Threat Intelligence Cybersecurity researchers have disclosed details of a new phishing campaign that conceals malicious…

N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto
31
Jul
2025

N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto

Jul 31, 2025Ravie LakshmananCryptocurrency / Malware The North Korea-linked threat actor known as UNC4899 has been attributed to attacks targeting…

What the 2025 Gartner® Magic Quadrant™ Reveals
31
Jul
2025

What the 2025 Gartner® Magic Quadrant Reveals

Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most…

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs
31
Jul
2025

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs

Jul 31, 2025The Hacker NewsSecurity Operations / Threat Detection Security Operations Centers (SOCs) are stretched to their limits. Log volumes…

31
Jul
2025

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs

Jul 31, 2025The Hacker NewsSecurity Operations / Threat Detection Security Operations Centers (SOCs) are stretched to their limits. Log volumes…