Category: TheHackerNews

SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools
07
Jul
2025

SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools

Cybersecurity researchers have disclosed a malicious campaign that leverages search engine optimization (SEO) poisoning techniques to deliver a known malware…

Why Default Passwords Must Go
07
Jul
2025

Why Default Passwords Must Go

Jul 07, 2025The Hacker NewsIoT Security / Cyber Resilience If you didn’t hear about Iranian hackers breaching US water facilities,…

Indian Government, Defense, and Rail Sectors
07
Jul
2025

TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors

A hacking group with ties other than Pakistan has been found targeting Indian government organizations with a modified variant of…

Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS
05
Jul
2025

Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS

Threat actors are weaponizing exposed Java Debug Wire Protocol (JDWP) interfaces to obtain code execution capabilities and deploy cryptocurrency miners…

Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties
05
Jul
2025

Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties

Jul 05, 2025Ravie LakshmananNational Security / Privacy Taiwan’s National Security Bureau (NSB) has warned that China-developed applications like RedNote (aka…

NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors
04
Jul
2025

NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors

Jul 04, 2025Ravie LakshmananZero-Day / Cyber Espionage Cybersecurity researchers have shed light on a previously undocumented threat actor called NightEagle…

Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
04
Jul
2025

Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros

Jul 04, 2025Ravie LakshmananVulnerability / Linux Cybersecurity researchers have disclosed two security flaws in the Sudo command-line utility for Linux…

AI Agents
04
Jul
2025

Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It

Jul 04, 2025The Hacker NewsAI Security / Enterprise Security Generative AI is changing how businesses work, learn, and innovate. But…

Android Users' Cellular Data
04
Jul
2025

Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission

Jul 04, 2025Ravie LakshmananMobile Security / Privacy Google has been ordered by a court in the U.S. state of California…

Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams
03
Jul
2025

Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams

A mobile ad fraud operation dubbed IconAds that consisted of 352 Android apps has been disrupted, according to a new…

Malicious Firefox Extensions
03
Jul
2025

Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets

Jul 03, 2025Ravie LakshmananBrowser Security / Cryptocurrency Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox that…

Chinese Hackers Exploit Ivanti CSA Zero-Days
03
Jul
2025

Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms

Jul 03, 2025Ravie LakshmananThreat Intelligence / Vulnerability The French cybersecurity agency on Tuesday revealed that a number of entities spanning…