Category: TheHackerNews

The Hidden Weaknesses in AI SOC Tools that No One Talks About
03
Jul
2025

The Hidden Weaknesses in AI SOC Tools that No One Talks About

If you’re evaluating AI-powered SOC platforms, you’ve likely seen bold claims: faster triage, smarter remediation, and less noise. But under…

Critical Cisco Vulnerability
03
Jul
2025

Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials

Jul 03, 2025Ravie LakshmananVulnerability / Network Security Cisco has released security updates to address a maximum-severity security flaw in Unified…

North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign
02
Jul
2025

North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign

Threat actors with ties to North Korea have been observed targeting Web3 and cryptocurrency-related businesses with malware written in the…

Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
02
Jul
2025

Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns

Cybersecurity researchers are calling attention to phishing campaigns that impersonate popular brands and trick targets into calling phone numbers operated…

Network Traffic
02
Jul
2025

That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat

Jul 02, 2025The Hacker NewsNetwork Security / Threat Detection With nearly 80% of cyber threats now mimicking legitimate user behavior,…

Russian Bulletproof Hosting
02
Jul
2025

U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware

Jul 02, 2025Ravie LakshmananCybercrime / Dark Web The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) has…

Vercel v0 AI Tool
02
Jul
2025

Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale

Jul 02, 2025Ravie LakshmananAI Security / Phishing Unknown threat actors have been observed weaponizing v0, a generative artificial intelligence (AI)…

Critical Vulnerability in Anthropic's MCP Exposes Developer Machines to Remote Exploits
01
Jul
2025

Critical Vulnerability in Anthropic’s MCP Exposes Developer Machines to Remote Exploits

Cybersecurity researchers have discovered a critical security vulnerability in artificial intelligence (AI) company Anthropic’s Model Context Protocol (MCP) Inspector project…

Hackers Share Tactics and Infrastructure
01
Jul
2025

TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns

Cybersecurity researchers have flagged the tactical similarities between the threat actors behind the RomCom RAT and a cluster that has…

New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status
01
Jul
2025

New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status

Jul 01, 2025Ravie LakshmananDeveloper Security / Software Development A new study of integrated development environments (IDEs) like Microsoft Visual Studio…

A New Maturity Model for Browser Security
01
Jul
2025

A New Maturity Model for Browser Security: Closing the Last-Mile Risk

Despite years of investment in Zero Trust, SSE, and endpoint protection, many enterprises are still leaving one critical layer exposed:…

Google Patches Critical Zero-Day Flaw in Chrome's V8 Engine After Active Exploitation
01
Jul
2025

Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation

Jul 01, 2025Ravie LakshmananVulnerability / Browser Security Google has released security updates to address a vulnerability in its Chrome browser…