Category: TheHackerNews

Key Insights from the 2025 State of Pentesting Report
20
May
2025

Key Insights from the 2025 State of Pentesting Report

May 20, 2025The Hacker NewsPenetration Testing / Risk Management In the newly released 2025 State of Pentesting Report, Pentera surveyed…

Chinese Hackers
20
May
2025

Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization

May 20, 2025Ravie LakshmananMalware / Cyber Espionage Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker…

Go-Based Malware
20
May
2025

Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse

May 20, 2025Ravie LakshmananLinux / Cryptojacking Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign that’s targeting publicly…

Malicious PyPI Packages
20
May
2025

Malicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User Accounts

Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act as checker tools to…

Bumblebee Malware
19
May
2025

RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

May 19, 2025Ravie LakshmananMalware / Supply Chain Attack The official site for RVTools has been hacked to serve a compromised…

Skitnet Malware
19
May
2025

Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access

May 19, 2025Ravie LakshmananRansomware / Malware Several ransomware actors are using a malware called Skitnet as part of their post-exploitation…

Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards
19
May
2025

Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards

May 19, 2025Ravie LakshmananBrowser Security / Vulnerability Mozilla has released security updates to address two critical security flaws in its…

Why CTEM is the Winning Bet for CISOs in 2025
19
May
2025

Why CTEM is the Winning Bet for CISOs in 2025

Continuous Threat Exposure Management (CTEM) has moved from concept to cornerstone, solidifying its role as a strategic enabler for CISOs….

HTTPBot Botnet
16
May
2025

New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors

May 16, 2025Ravie LakshmananUnited States Cybersecurity researchers are calling attention to a new botnet malware called HTTPBot that has been…

Top 10 Best Practices for Effective Data Protection
16
May
2025

Top 10 Best Practices for Effective Data Protection

Data is the lifeblood of productivity, and protecting sensitive data is more critical than ever. With cyber threats evolving rapidly…

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
16
May
2025

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks

May 16, 2025Ravie LakshmananHardware Security / Vulnerability Researchers at ETH Zürich have discovered yet another security flaw that they say…

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
16
May
2025

Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy…