Category: TheHackerNews

Linux-Based Lenovo Webcams
09
Aug
2025

Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks

Aug 09, 2025Ravie LakshmananVulnerability / Hardware Security Cybersecurity researchers have disclosed vulnerabilities in select model webcams from Lenovo that could…

GPT-5 Jailbreak and Zero-Click AI Agent Attacks
09
Aug
2025

Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems

Cybersecurity researchers have uncovered a jailbreak technique to bypass ethical guardrails erected by OpenAI in its latest large language model…

CyberArk and HashiCorp Flaws Enable Remote Vault Takeover Without Credentials
09
Aug
2025

CyberArk and HashiCorp Flaws Enable Remote Vault Takeover Without Credentials

Cybersecurity researchers have discovered over a dozen vulnerabilities in enterprise secure vaults from CyberArk and HashiCorp that, if successfully exploited,…

AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims
08
Aug
2025

AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims

Cybersecurity researchers are drawing attention to a new campaign that’s using legitimate generative artificial intelligence (AI)-powered website building tools like…

RubyGems, PyPI Hit by Malicious Packages
08
Aug
2025

RubyGems, PyPI Hit by Malicious Packages Stealing Credentials, Crypto, Forcing Security Changes

A fresh set of 60 malicious packages has been uncovered targeting the RubyGems ecosystem by posing as seemingly innocuous automation…

What Attackers Are Doing With Them
08
Aug
2025

What Attackers Are Doing With Them

When an organization’s credentials are leaked, the immediate consequences are rarely visible—but the long-term impact is far-reaching. Far from the…

Malicious Firefox Wallet Extensions
08
Aug
2025

GreedyBear Steals $1M in Crypto Using 150+ Malicious Firefox Wallet Extensions

A newly discovered campaign dubbed GreedyBear has leveraged over 150 malicious extensions to the Firefox marketplace that are designed to…

SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others
07
Aug
2025

SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others

Aug 07, 2025Ravie LakshmananMalware / Threat Intelligence The threat actors behind the SocGholish malware have been observed leveraging Traffic Distribution…

SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day
07
Aug
2025

SonicWall Confirms Patched Vulnerability Behind Recent VPN Attacks, Not a Zero-Day

Aug 07, 2025Ravie LakshmananNetwork Security / Vulnerability SonicWall has revealed that the recent spike in activity targeting its Gen 7…

6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits
07
Aug
2025

6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits

Aug 07, 2025Ravie LakshmananVulnerability / Threat Intelligence Cybersecurity researchers have disclosed multiple security flaws in video surveillance products from Axis…

Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes
07
Aug
2025

Malicious Go, npm Packages Deliver Cross-Platform Malware, Trigger Remote Data Wipes

Aug 07, 2025Ravie LakshmananMalware / Threat Intelligence Cybersecurity researchers have discovered a set of 11 malicious Go packages that are…

What 2025 Is Teaching Us About Cloud Defense
07
Aug
2025

What 2025 Is Teaching Us About Cloud Defense

Now that we are well into 2025, cloud attacks are evolving faster than ever and artificial intelligence (AI) is both…