Category: TheHackerNews

6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits
07
Aug
2025

6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits

Aug 07, 2025Ravie LakshmananVulnerability / Threat Intelligence Cybersecurity researchers have disclosed multiple security flaws in video surveillance products from Axis…

Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes
07
Aug
2025

Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes

Aug 07, 2025Ravie LakshmananMalware / Threat Intelligence Cybersecurity researchers have discovered a set of 11 malicious Go packages that are…

What 2025 Is Teaching Us About Cloud Defense
07
Aug
2025

What 2025 Is Teaching Us About Cloud Defense

Now that we are well into 2025, cloud attacks are evolving faster than ever and artificial intelligence (AI) is both…

Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups
07
Aug
2025

Microsoft Discloses Exchange Server Flaw Enabling Silent Cloud Access in Hybrid Setups

Aug 07, 2025Ravie LakshmananVulnerability / Threat Detection Microsoft has released an advisory for a high-severity security flaw affecting on-premise versions…

How to Stop Python Supply Chain Attacks—and the Expert Tools You Need
07
Aug
2025

How to Stop Python Supply Chain Attacks—and the Expert Tools You Need

Aug 07, 2025The Hacker NewsDevSecOps / Supply Chain Security Python is everywhere in modern software. From machine learning models to…

Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft
07
Aug
2025

Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft

Aug 06, 2025Ravie LakshmananDevOps / Container Security Cybersecurity researchers have demonstrated an “end-to-end privilege escalation chain” in Amazon Elastic Container…

Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams
06
Aug
2025

Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams

The malicious ad tech purveyor known as VexTrio Viper has been observed developing several malicious apps that have been published…

Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems
06
Aug
2025

Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems

Aug 06, 2025Ravie LakshmananVulnerability / Endpoint Security Trend Micro has released mitigations to address critical security flaws in on-premise versions…

Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools
06
Aug
2025

Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools

Aug 06, 2025Ravie LakshmananArtificial Intelligence / Threat Detection Microsoft on Tuesday announced an autonomous artificial intelligence (AI) agent that can…

AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals
06
Aug
2025

AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals

Aug 06, 2025The Hacker NewsCompliance / Security Operations As the volume and sophistication of cyber threats and risks grow, cybersecurity…

HTA-Delivered C# Malware
06
Aug
2025

CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures

Aug 06, 2025Ravie LakshmananCyber Espionage / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks…

06
Aug
2025

http://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks carried out by a threat actor called…