Category: TheHackerNews

AMD Transient Scheduler Attacks
10
Jul
2025

AMD Warns of New Transient Scheduler Attacks Impacting a Wide Range of CPUs

Jul 10, 2025Ravie LakshmananVulnerability / Hardware Security Semiconductor company AMD is warning of a new set of vulnerabilities affecting a…

New macOS Malware ZuRu
10
Jul
2025

New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App

Jul 10, 2025Ravie LakshmananEndpoint Security / Vulnerability Cybersecurity researchers have discovered new artifacts associated with an Apple macOS malware called…

Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
10
Jul
2025

Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods

Jul 10, 2025Ravie LakshmananCybercrime / Ransomware The U.K. National Crime Agency (NCA) on Thursday announced that four people have been…

What Security Leaders Need to Know About AI Governance for SaaS
10
Jul
2025

What Security Leaders Need to Know About AI Governance for SaaS

Generative AI is not arriving with a bang, it’s slowly creeping into the software that companies already use on a…

ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs
10
Jul
2025

ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs

A high-severity security flaw has been disclosed in ServiceNow’s platform that, if successfully exploited, could result in data exposure and…

Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets
09
Jul
2025

Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets

Jul 09, 2025Ravie LakshmananCyber Threat / Malware The Initial Access Broker (IAB) known as Gold Melody has been attributed to…

DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware
09
Jul
2025

DoNot APT Expands Operations, Targets European Foreign Ministries with LoptikMod Malware

Jul 09, 2025Ravie LakshmananMalware / Cyber Espionage A threat actor with suspected ties to India has been observed targeting a…

How To Automate Ticket Creation, Device Identification and Threat Triage With Tines
09
Jul
2025

How To Automate Ticket Creation, Device Identification and Threat Triage With Tines

Jul 09, 2025The Hacker NewsSecurity Operations / Automation Run by the team at workflow orchestration and AI platform Tines, the…

U.S. Sanctions North Korean Andariel Hacker Behind Fraudulent IT Worker Scheme
09
Jul
2025

U.S. Sanctions North Korean Andariel Hacker Behind Fraudulent IT Worker Scheme

Jul 09, 2025Ravie LakshmananMalware / Cyber Crime The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) on…

Chinese Hacker Xu Zewei
09
Jul
2025

Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks

Jul 09, 2025Ravie LakshmananCyber Espionage / Threat Intelligence A Chinese national has been arrested in Milan, Italy, for his alleged…

Microsoft Patches 130 Vulnerabilities
09
Jul
2025

Microsoft Patches 130 Vulnerabilities, Including Critical Flaws in SPNEGO and SQL Server

For the first time in 2025, Microsoft’s Patch Tuesday updates did not bundle fixes for exploited security vulnerabilities, but acknowledged…

Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
08
Jul
2025

Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware

Jul 08, 2025Ravie LakshmananMalware / Cybercrime In yet another instance of threat actors repurposing legitimate tools for malicious purposes, it…