Category: TheHackerNews

Learn a Smarter Way to Defend Modern Applications
16
May
2025

Learn a Smarter Way to Defend Modern Applications

May 16, 2025The Hacker NewsDevSecOps / Threat Detection Modern apps move fast—faster than most security teams can keep up. As…

Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
15
May
2025

Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit

May 15, 2025Ravie LakshmananAI Training / Data Protection Austrian privacy non-profit noyb (none of your business) has sent Meta’s Irish…

Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
15
May
2025

Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails

May 15, 2025Ravie LakshmananCryptocurrency / Threat Intelligence Cryptocurrency exchange Coinbase has disclosed that unknown cyber actors broke into its systems…

Malicious npm Package
15
May
2025

Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper

May 15, 2025Ravie LakshmananMalware / Threat Intelligence Cybersecurity researchers have discovered a malicious package named “os-info-checker-es6” that disguises itself as…

Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers
15
May
2025

Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

A Russia-linked threat actor has been attributed to a cyber espionage operation targeting webmail servers such as Roundcube, Horde, MDaemon,…

Pen Testing for Compliance Only? It's Time to Change Your Approach
15
May
2025

Pen Testing for Compliance Only? It’s Time to Change Your Approach

May 15, 2025The Hacker NewsCompliance / Penetration Testing Imagine this: Your organization completed its annual penetration test in January, earning…

5 BCDR Essentials for Effective Ransomware Defense
15
May
2025

5 BCDR Essentials for Effective Ransomware Defense

Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat capable of crippling organizations of any size. Cybercriminals…

New Chrome Vulnerability
15
May
2025

New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy

May 15, 2025Ravie LakshmananBrowser Security / Web Security Google on Wednesday released updates to address four security issues in its…

BianLian and RansomExx Exploit SAP NetWeaver Flaw
14
May
2025

BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan

May 14, 2025Ravie LakshmananRansomware / Vulnerability At least two different cybercrime groups BianLian and RansomExx are said to have exploited…

Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit
14
May
2025

Samsung Patches CVE-2025-4632 Used to Deploy Mirai Botnet via MagicINFO 9 Exploit

May 14, 2025Ravie LakshmananVulnerability / Malware Samsung has released software updates to address a critical security flaw in MagicINFO 9…

Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering
14
May
2025

Xinbi Telegram Market Tied to $8.4B in Crypto Crime, Romance Scams, North Korea Laundering

May 14, 2025Ravie LakshmananCybercrime / Cryptocurrency A Chinese-language, Telegram-based marketplace called Xinbi Guarantee has facilitated no less than $8.4 billion…

Phishing Attacks
14
May
2025

CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users

May 14, 2025The Hacker NewsPhishing / Malware A new global phishing threat called “Meta Mirage” has been uncovered, targeting businesses…