Category: TheHackerNews

EncryptHub Exploits MSC EvilTwin Vulnerability
16
Aug
2025

Russian Group EncryptHub Exploits MSC EvilTwin Vulnerability to Deploy Fickle Stealer Malware

Aug 16, 2025Ravie LakshmananMalware / Vulnerability The threat actor known as EncryptHub is continuing to exploit a now-patched security flaw…

Open-Source Hacking Tools
15
Aug
2025

Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools

Aug 15, 2025Ravie LakshmananMalware / Open Source A Chinese-speaking advanced persistent threat (APT) actor has been observed targeting web infrastructure…

Privacy in the Age of Agentic AI
15
Aug
2025

Privacy in the Age of Agentic AI

We used to think of privacy as a perimeter problem: about walls and locks, permissions, and policies. But in a…

U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions
15
Aug
2025

U.S. Sanctions Garantex and Grinex Over $100M in Ransomware-Linked Illicit Crypto Transactions

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) on Thursday renewed sanctions against Russian cryptocurrency exchange…

Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution
15
Aug
2025

Cisco Warns of CVSS 10.0 FMC RADIUS Flaw Allowing Remote Code Execution

Aug 15, 2025Ravie LakshmananVulnerability / Network Security Cisco has released security updates to address a maximum-severity security flaw in Secure…

New HTTP/2 'MadeYouReset' Vulnerability
14
Aug
2025

New HTTP/2 ‘MadeYouReset’ Vulnerability Enables Large-Scale DoS Attacks

Aug 14, 2025Ravie LakshmananServer Security / Vulnerability Multiple HTTP/2 implementations have been found susceptible to a new attack technique called…

CrossC2 Expands Cobalt Strike
14
Aug
2025

Hackers Found Using CrossC2 to Expand Cobalt Strike Beacon’s Reach to Linux and macOS

Aug 14, 2025Ravie LakshmananThreat Intelligence / Linux Japan’s CERT coordination center (JPCERT/CC) on Thursday revealed it observed incidents that involved…

New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits
14
Aug
2025

New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits

Cybersecurity researchers have disclosed a new Android trojan called PhantomCard that abuses near-field communication (NFC) to conduct relay attacks for…

Have You Turned Off Your Virtual Oven?
14
Aug
2025

Have You Turned Off Your Virtual Oven?

You check that the windows are shut before leaving home. Return to the kitchen to verify that the oven and…

Attack Surface Reduction
14
Aug
2025

Simple Steps for Attack Surface Reduction

Aug 14, 2025The Hacker NewsEndpoint Security / Application Security Story teaser text: Cybersecurity leaders face mounting pressure to stop attacks…

Google Requires Crypto App Licenses
14
Aug
2025

Google Requires Crypto App Licenses in 15 Regions as FBI Warns of $9.9M Scam Losses

Aug 14, 2025Ravie LakshmananCryptocurrency / Financial Crime Google said it’s implementing a new policy requiring developers of cryptocurrency exchanges and…

Known Exploited Vulnerabilities Catalog
14
Aug
2025

CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog

Aug 14, 2025Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security…