Category: TheHackerNews

NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors
04
Jul
2025

NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors

Jul 04, 2025Ravie LakshmananZero-Day / Cyber Espionage Cybersecurity researchers have shed light on a previously undocumented threat actor called NightEagle…

Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
04
Jul
2025

Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros

Jul 04, 2025Ravie LakshmananVulnerability / Linux Cybersecurity researchers have disclosed two security flaws in the Sudo command-line utility for Linux…

AI Agents
04
Jul
2025

Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It

Jul 04, 2025The Hacker NewsAI Security / Enterprise Security Generative AI is changing how businesses work, learn, and innovate. But…

Android Users' Cellular Data
04
Jul
2025

Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission

Jul 04, 2025Ravie LakshmananMobile Security / Privacy Google has been ordered by a court in the U.S. state of California…

Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams
03
Jul
2025

Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams

A mobile ad fraud operation dubbed IconAds that consisted of 352 Android apps has been disrupted, according to a new…

Malicious Firefox Extensions
03
Jul
2025

Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets

Jul 03, 2025Ravie LakshmananBrowser Security / Cryptocurrency Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox that…

Chinese Hackers Exploit Ivanti CSA Zero-Days
03
Jul
2025

Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms

Jul 03, 2025Ravie LakshmananThreat Intelligence / Vulnerability The French cybersecurity agency on Tuesday revealed that a number of entities spanning…

The Hidden Weaknesses in AI SOC Tools that No One Talks About
03
Jul
2025

The Hidden Weaknesses in AI SOC Tools that No One Talks About

If you’re evaluating AI-powered SOC platforms, you’ve likely seen bold claims: faster triage, smarter remediation, and less noise. But under…

Critical Cisco Vulnerability
03
Jul
2025

Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials

Jul 03, 2025Ravie LakshmananVulnerability / Network Security Cisco has released security updates to address a maximum-severity security flaw in Unified…

North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign
02
Jul
2025

North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign

Threat actors with ties to North Korea have been observed targeting Web3 and cryptocurrency-related businesses with malware written in the…

Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
02
Jul
2025

Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns

Cybersecurity researchers are calling attention to phishing campaigns that impersonate popular brands and trick targets into calling phone numbers operated…

Network Traffic
02
Jul
2025

That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat

Jul 02, 2025The Hacker NewsNetwork Security / Threat Detection With nearly 80% of cyber threats now mimicking legitimate user behavior,…