Category: TheHackerNews

Attack Surface Reduction
14
Aug
2025

Simple Steps for Attack Surface Reduction

Aug 14, 2025The Hacker NewsEndpoint Security / Application Security Story teaser text: Cybersecurity leaders face mounting pressure to stop attacks…

Google Requires Crypto App Licenses
14
Aug
2025

Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses

Aug 14, 2025Ravie LakshmananCryptocurrency / Financial Crime Google said it’s implementing a new policy requiring developers of cryptocurrency exchanges and…

Known Exploited Vulnerabilities Catalog
14
Aug
2025

CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog

Aug 14, 2025Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security…

New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks
13
Aug
2025

New PS1Bot Malware Campaign Uses Malvertising to Deploy Multi-Stage In-Memory Attacks

Aug 13, 2025Ravie LakshmananMalvertising / Cryptocurrency Cybersecurity researchers have discovered a new malvertising campaign that’s designed to infect victims with…

Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws
13
Aug
2025

Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws

Aug 13, 2025Ravie LakshmananVulnerability / Software Security Zoom and Xerox have addressed critical security flaws in Zoom Clients for Windows…

Key Capabilities Security Leaders Need to Know
13
Aug
2025

Key Capabilities Security Leaders Need to Know

Aug 13, 2025The Hacker NewsArtificial Intelligence / Threat Hunting Security operations have never been a 9-to-5 job. For SOC analysts,…

FortiSIEM Vulnerability (CVE-2025-25256)
13
Aug
2025

Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code

Aug 13, 2025Ravie LakshmananVulnerability / Network Security Fortinet is alerting customers of a critical security flaw in FortiSIEM for which…

What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive
13
Aug
2025

What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive

Aug 13, 2025The Hacker NewsArtificial Intelligence / Identity Security The AI revolution isn’t coming. It’s already here. From copilots that…

August 2025 Patch Tuesday
13
Aug
2025

Microsoft August 2025 Patch Tuesday Fixes Kerberos Zero-Day Among 111 Total New Flaws

Microsoft on Tuesday rolled out fixes for a massive set of 111 security flaws across its software portfolio, including one…

Charon Ransomware
13
Aug
2025

Charon Ransomware Hits Middle East Sectors Using APT-Level Evasion Tactics

Aug 13, 2025Ravie LakshmananEndpoint Security / Cybercrime Cybersecurity researchers have discovered a new campaign that employs a previously undocumented ransomware…

13
Aug
2025

Charon Ransomware Hits Middle East Sectors Using APT-Level Evasion Tactics

Aug 13, 2025Ravie LakshmananEndpoint Security / Cybercrime Cybersecurity researchers have discovered a new campaign that employs a previously undocumented ransomware…

Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks
12
Aug
2025

Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks

Aug 12, 2025Ravie LakshmananMalware / Container Security New research has uncovered Docker images on Docker Hub that contain the infamous…