Category: TheHackerNews

Czech Republic Blames China-Linked APT31 Hackers for 2022 Cyberattack
28
May
2025

Czech Republic Blames China-Linked APT31 Hackers for 2022 Cyberattack

May 28, 2025Ravie LakshmananCybersecurity / Cyber Espionage The Czech Republic on Wednesday formally accused a threat actor associated with the…

Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore
28
May
2025

Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore

May 28, 2025Ravie LakshmananRansomware / Data Breach An Iranian national has pleaded guilty in the U.S. over his involvement in…

Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File
28
May
2025

Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File

May 28, 2025Ravie LakshmananData Privacy / Vulnerability Cybersecurity researchers have discovered a security flaw in Microsoft’s OneDrive File Picker that,…

A 24-Hour Timeline of a Modern Stealer Campaign
28
May
2025

A 24-Hour Timeline of a Modern Stealer Campaign

May 28, 2025The Hacker NewsIdentity Theft / Enterprise Security Stealer malware no longer just steals passwords. In 2025, it steals…

PumaBot Botnet
28
May
2025

New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto

May 28, 2025Ravie LakshmananIoT Security / Cryptocurrency Embedded Linux-based Internet of Things (IoT) devices have become the target of a…

Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware
28
May
2025

Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware

May 28, 2025Ravie LakshmananCryptojacking / Vulnerability A financially motivated threat actor has been observed exploiting a recently disclosed remote code…

251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch
28
May
2025

251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch

May 28, 2025Ravie LakshmananNetwork Security / Vulnerability Cybersecurity researchers have disclosed details of a coordinated cloud-based scanning activity that targeted…

Browser-in-the-Middle
28
May
2025

How ‘Browser-in-the-Middle’ Attacks Steal Sessions in Seconds

May 28, 2025The Hacker NewsBrowser Security / Credential Theft Would you expect an end user to log on to a…

Cybercriminals Clone Antivirus
28
May
2025

Cybercriminals Clone Antivirus Site to Spread Venom RAT and Steal Crypto Wallets

May 27, 2025Ravie LakshmananMalware / Cybersecurity Cybersecurity researchers have disclosed a new malicious campaign that uses a fake website advertising…

Apple App Store Threats
28
May
2025

Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats

May 28, 2025Ravie LakshmananMobile Security / Software Security Apple on Tuesday revealed that it prevented over $9 billion in fraudulent…

Self-Spreading Docker Malware
27
May
2025

New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency

May 27, 2025Ravie LakshmananCloud Security / Threat Intelligence Misconfigured Docker API instances have become the target of a new malware…

AI Agents and the Non‑Human Identity
27
May
2025

How to Deploy AI More Securely at Scale

Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub Copilot’s code completions to chatbots that mine internal knowledge…