Category: TheHackerNews

New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code
16
Jul
2025

New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code

Cybersecurity researchers have discovered a new, sophisticated variant of a known Android malware referred to as Konfety that leverages the…

16
Jul
2025

New Konfety Malware Variant Evades Detection by Manipulating APKs and Dynamic Code

Cybersecurity researchers have discovered a new, sophisticated variant of a known Android malware referred to as Konfety that leverages the…

Google AI "Big Sleep" Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act
16
Jul
2025

Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act

Jul 16, 2025Ravie LakshmananAI Security / Vulnerability Google on Tuesday revealed that its large language model (LLM)-assisted vulnerability discovery framework…

Hyper-Volumetric DDoS Attacks
15
Jul
2025

Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors

Jul 15, 2025Ravie LakshmananBotnet / Network Security Cloudflare on Tuesday said it mitigated 7.3 million distributed denial-of-service (DDoS) attacks in…

Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools
15
Jul
2025

Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools

Cybersecurity researchers have shed light on a new ransomware-as-a-service (RaaS) operation called GLOBAL GROUP that has targeted a wide range…

AsyncRAT's Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe
15
Jul
2025

AsyncRAT’s Open-Source Code Sparks Surge in Dangerous Malware Variants Across the Globe

Cybersecurity researchers have charted the evolution of a widely used remote access trojan called AsyncRAT, which was first released on…

How to Protect the Invisible Identity Access
15
Jul
2025

How to Protect the Invisible Identity Access

Jul 15, 2025The Hacker NewsAutomation / Risk Management AI agents promise to automate everything from financial reconciliations to incident response….

State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments
15
Jul
2025

State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments

Jul 15, 2025Ravie LakshmananCyber Espionage / Threat Intelligence Governmental organizations in Southeast Asia are the target of a new campaign…

npm Registry with XORIndex Malware
15
Jul
2025

North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign

Jul 15, 2025Ravie LakshmananMalware / Web Security The North Korean threat actors linked to the Contagious Interview campaign have been…

New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries
14
Jul
2025

New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries

Jul 14, 2025Ravie LakshmananMalware / Web Security Threat actors behind the Interlock ransomware group have unleashed a new PHP variant…

The Unusual Suspect: Git Repos
14
Jul
2025

The Unusual Suspect: Git Repos

Jul 14, 2025The Hacker NewsSecrets Management / SaaS Security While phishing and ransomware dominate headlines, another critical risk quietly persists…

CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center
14
Jul
2025

CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center

Jul 14, 2025Ravie LakshmananCybercrime / Law Enforcement India’s Central Bureau of Investigation (CBI) has announced that it has taken steps…