Category: TheHackerNews

Chinese Hackers Target Taiwan's Semiconductor Sector with Cobalt Strike, Custom Backdoors
17
Jul
2025

Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors

The Taiwanese semiconductor industry has become the target of spear-phishing campaigns undertaken by three Chinese state-sponsored threat actors. “Targets of…

Critical ISE Flaw
17
Jul
2025

Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code

Jul 17, 2025Ravie LakshmananVulnerability / Network Security Cisco has disclosed a new maximum-severity security vulnerability impacting Identity Services Engine (ISE)…

Microsoft Teams Spreads Matanbuchus 3.0 Malware
16
Jul
2025

Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms

Jul 16, 2025Ravie LakshmananThreat Intelligence / Vulnerability Cybersecurity researchers have flagged a new variant of a known malware loader called…

Hacking SonicWall SMA 100 Series Devices
16
Jul
2025

UNC6148 Backdoors Fully-Patched SonicWall SMA 100 Series Devices with OVERSTEP Rootkit

A threat activity cluster has been observed targeting fully-patched end-of-life SonicWall Secure Mobile Access (SMA) 100 series appliances as part…

AI Agents Act Like Employees With Root Access—Here's How to Regain Control
16
Jul
2025

AI Agents Act Like Employees With Root Access—Here’s How to Regain Control

Jul 16, 2025The Hacker NewsIdentity Management / AI Security The AI gold rush is on. But without identity-first security, every…

Critical dMSA Flaw in Windows Server 2025
16
Jul
2025

Critical Golden dMSA Attack in Windows Server 2025 Enables Cross-Domain Attacks and Persistent Access

Jul 16, 2025Ravie LakshmananWindows Server / Enterprise Security Cybersecurity researchers have disclosed what they say is a “critical design flaw”…

Learn How to Stop AI-Driven Attacks in Real Time
16
Jul
2025

Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time

Jul 16, 2025The Hacker NewsAI Security / Fraud Detection Social engineering attacks have entered a new era—and they’re coming fast,…

Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild
16
Jul
2025

Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild

Jul 16, 2025Ravie LakshmananBrowser Security / Zero-Day Google on Tuesday rolled out fixes for six security issues in its Chrome…

New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code
16
Jul
2025

New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code

Cybersecurity researchers have discovered a new, sophisticated variant of a known Android malware referred to as Konfety that leverages the…

16
Jul
2025

New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code

Cybersecurity researchers have discovered a new, sophisticated variant of a known Android malware referred to as Konfety that leverages the…

Google AI "Big Sleep" Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act
16
Jul
2025

Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act

Jul 16, 2025Ravie LakshmananAI Security / Vulnerability Google on Tuesday revealed that its large language model (LLM)-assisted vulnerability discovery framework…

Hyper-Volumetric DDoS Attacks
15
Jul
2025

Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors

Jul 15, 2025Ravie LakshmananBotnet / Network Security Cloudflare on Tuesday said it mitigated 7.3 million distributed denial-of-service (DDoS) attacks in…