Category: TheHackerNews

iOS Zero-Day
11
Feb
2025

Apple Patches Actively Exploited iOS Zero-Day CVE-2025-24200 in Emergency Update

Feb 11, 2025Ravie LakshmananZero-Day / Mobile Security Apple on Monday released out-of-band security updates to address a security flaw in…

Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores
10
Feb
2025

Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores

Feb 10, 2025Ravie LakshmananMalware / Payment Security Threat actors have been observed leveraging Google Tag Manager (GTM) to deliver credit…

Okta Security Configurations
10
Feb
2025

Don’t Overlook These 6 Critical Okta Security Configurations

Feb 10, 2025The Hacker NewsIdentity Security / Data Protection Given Okta’s role as a critical part of identity infrastructure, strengthening…

BadIIS Malware
10
Feb
2025

DragonRank Exploits IIS Servers with BadIIS Malware for SEO Fraud and Gambling Redirects

Feb 10, 2025Ravie LakshmananMalware / Web Security Threat actors have been observed targeting Internet Information Services (IIS) servers in Asia…

Zimbra
10
Feb
2025

Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities

Feb 10, 2025Ravie LakshmananVulnerability / Data Protection Zimbra has released software updates to address critical security flaws in its Collaboration…

VeraCore Zero-Day
10
Feb
2025

XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells

Feb 10, 2025Ravie LakshmananVulnerability / Malware Threat actors have been observed exploiting multiple security flaws in various software products, including…

Malicious ML Models
08
Feb
2025

Malicious ML Models Found on Hugging Face Exploit “Broken” Pickle Files to Evade Detection

Feb 08, 2025Ravie LakshmananArtificial Intelligence / Supply Chain Security Cybersecurity researchers have uncovered two malicious machine learning (ML) models on…

DeepSeek App Transmits Sensitive User and Device Data Without Encryption
07
Feb
2025

DeepSeek App Transmits Sensitive User and Device Data Without Encryption

Feb 07, 2025Ravie LakshmananMobile Security / Artificial Intelligence A new audit of DeepSeek’s mobile app for the Apple iOS operating…

Trimble Cityworks Vulnerability
07
Feb
2025

CISA Warns of Active Exploits Targeting Trimble Cityworks Vulnerability

Feb 07, 2025The Hacker NewsVulnerability / Malware The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has warned that a security…

Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling Code Injection Attacks
07
Feb
2025

Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling Code Injection Attacks

Feb 07, 2025Ravie LakshmananCloud Security / Web Security Microsoft is warning of an insecure practice wherein software developers are incorporating…

AI-Powered Social Engineering
07
Feb
2025

AI-Powered Social Engineering: Reinvented Threats

The foundations for social engineering attacks – manipulating humans – might not have changed much over the years. It’s the…

Digital Banking Fraud
07
Feb
2025

India’s RBI Introduces Exclusive “bank.in” Domain to Combat Digital Banking Fraud

Feb 07, 2025Ravie LakshmananFinancial Security / Regulatory Compliance India’s central bank, the Reserve Bank of India (RBI), said it’s introducing…