Category: TheHackerNews

Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks
18
Nov
2025

Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks

Nov 18, 2025Ravie LakshmananCyber Espionage / Malware Suspected espionage-driven threat actors from Iran have been observed deploying backdoors like TWOSTROKE…

Researchers Detail Tuoni C2's Role in an Attempted 2025 Real-Estate Cyber Intrusion
18
Nov
2025

Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion

Nov 18, 2025Ravie LakshmananMalware / Social Engineering Cybersecurity researchers have disclosed details of a cyber attack targeting a major U.S.-based…

Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages
18
Nov
2025

Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages

Cybersecurity researchers have discovered a set of seven npm packages published by a single threat actor that leverages a cloaking…

Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities
18
Nov
2025

Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

Identity security fabric (ISF) is a unified architectural framework that brings together disparate identity capabilities. Through ISF, identity governance and…

Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale
18
Nov
2025

Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale

You’ve probably already moved some of your business to the cloud—or you’re planning to. That’s a smart move. It helps…

Microsoft Mitigates Record 5.72 Tbps DDoS Attack Driven by AISURU Botnet
18
Nov
2025

Microsoft Mitigates Record 5.72 Tbps DDoS Attack Driven by AISURU Botnet

Nov 18, 2025Ravie LakshmananIoT Security / Botnet Microsoft on Monday disclosed that it automatically detected and neutralized a distributed denial-of-service…

Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability
18
Nov
2025

Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability

Nov 18, 2025Ravie LakshmananBrowser Security / Vulnerability Google on Monday released security updates for its Chrome browser to address two…

New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT
17
Nov
2025

New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT

Nov 17, 2025Ravie Lakshmanan Cybersecurity researchers have discovered malware campaigns using the now-prevalent ClickFix social engineering tactic to deploy Amatera…

Push linkedin phishing header
17
Nov
2025

5 Reasons Why Attackers Are Phishing Over LinkedIn

Phishing attacks are no longer confined to the email inbox, with 1 in 3 phishing attacks now taking place over…

Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT
17
Nov
2025

Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT

The threat actor known as Dragon Breath has been observed making use of a multi-stage loader codenamed RONINGLOADER to deliver…

Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time
17
Nov
2025

Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time

Nov 17, 2025Ravie LakshmananVulnerability / Mobile Security Google has disclosed that the company’s continued adoption of the Rust programming language…

XWiki Servers
15
Nov
2025

RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet

Nov 15, 2025Ravie LakshmananMalware / Vulnerability The botnet malware known as RondoDox has been observed targeting unpatched XWiki instances against…