Category: TheHackerNews

6 Steps to 24/7 In-House SOC Success
20
Jun
2025

6 Steps to 24/7 In-House SOC Success

Hackers never sleep, so why should enterprise defenses? Threat actors prefer to target businesses during off-hours. That’s when they can…

Trojanized GitHub
20
Jun
2025

200+ Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers

Cybersecurity researchers have uncovered a new campaign in which the threat actors have published more than 67 GitHub repositories that…

New Android Malware
19
Jun
2025

New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft

Cybersecurity researchers have exposed the inner workings of an Android malware called AntiDot that has compromised over 3,775 devices as…

Secure Vibe Coding: The Complete New Guide
19
Jun
2025

Secure Vibe Coding: The Complete New Guide

DALL-E for coders? That’s the promise behind vibe coding, a term describing the use of natural language to create software….

Deepfake Zoom Scam
19
Jun
2025

BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware

The North Korea-aligned threat actor known as BlueNoroff has been observed targeting an employee in the Web3 sector with deceptive…

Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
19
Jun
2025

Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session

Jun 19, 2025The Hacker NewsCybersecurity / Threat Hunting Most cyberattacks today don’t start with loud alarms or broken firewalls. They…

Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign
19
Jun
2025

Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Jun 19, 2025Ravie LakshmananEmail Security / Identity Protection Threat actors with suspected ties to Russia have been observed taking advantage…

Meta Adds Passkey Login Support to Facebook for Android and iOS Users
19
Jun
2025

Meta Adds Passkey Login Support to Facebook for Android and iOS Users

Jun 19, 2025Ravie LakshmananMobile Security / Passwordless Meta Platforms on Wednesday announced that it’s adding support for passkeys, the next-generation…

New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions
19
Jun
2025

New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions

Jun 19, 2025Ravie LakshmananLinux / Vulnerability Cybersecurity researchers have uncovered two local privilege escalation (LPE) flaws that could be exploited…

New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains
18
Jun
2025

New Malware Campaign Uses Cloudflare Tunnels to Deliver RATs via Phishing Chains

A new campaign is making use of Cloudflare Tunnel subdomains to host malicious payloads and deliver them via malicious attachments…

Minecraft Players
18
Jun
2025

1,500+ Minecraft Players Infected by Java Malware Masquerading as Game Mods on GitHub

A new multi-stage malware campaign is targeting Minecraft users with a Java-based malware that employs a distribution-as-service (DaaS) offering called…

Multi-Stage Malware Campaign
18
Jun
2025

Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign

Cybersecurity researchers have exposed a previously unknown threat actor known as Water Curse that relies on weaponized GitHub repositories to…