Category: TheHackerNews

Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies
31
Jul
2025

Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies

Jul 31, 2025Ravie LakshmananCyber Espionage / Network Security The Russian nation-state threat actor known as Secret Blizzard has been observed…

Microsoft 365 Credential Theft Attempts
31
Jul
2025

Experts Detect Multi-Layer Redirect Tactic Used to Steal Microsoft 365 Login Credentials

Jul 31, 2025Ravie LakshmananPhishing / Threat Intelligence Cybersecurity researchers have disclosed details of a new phishing campaign that conceals malicious…

N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto
31
Jul
2025

N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto

Jul 31, 2025Ravie LakshmananCryptocurrency / Malware The North Korea-linked threat actor known as UNC4899 has been attributed to attacks targeting…

What the 2025 Gartner® Magic Quadrant™ Reveals
31
Jul
2025

What the 2025 Gartner® Magic Quadrant Reveals

Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most…

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs
31
Jul
2025

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs

Jul 31, 2025The Hacker NewsSecurity Operations / Threat Detection Security Operations Centers (SOCs) are stretched to their limits. Log volumes…

31
Jul
2025

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs

Jul 31, 2025The Hacker NewsSecurity Operations / Threat Detection Security Operations Centers (SOCs) are stretched to their limits. Log volumes…

UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud
31
Jul
2025

UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud

Jul 31, 2025Ravie Lakshmanan The financially motivated threat actor known as UNC2891 has been observed targeting Automatic Teller Machine (ATM)…

Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install
31
Jul
2025

Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install

Jul 31, 2025Ravie LakshmananVulnerability / Website Security Threat actors are actively exploiting a critical security flaw in “Alone – Charity…

Fake Cryptocurrency Trading Apps
30
Jul
2025

Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

Jul 30, 2025Ravie LakshmananCryptocurrency / Browser Security Cybersecurity researchers are calling attention to an ongoing campaign that distributes fake cryptocurrency…

FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant
30
Jul
2025

FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant

Jul 30, 2025Ravie LakshmananEncryption / Ransomware Cybersecurity experts have released a decryptor for a ransomware strain called FunkSec, allowing victims…

Safari Vulnerability
30
Jul
2025

Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google Chrome

Jul 30, 2025Ravie LakshmananVulnerability / Zero-Day Apple on Tuesday released security updates for its entire software portfolio, including a fix…

Pillar Security AI Security Platform
30
Jul
2025

A Look Inside Pillar’s AI Security Platform

In this article, we will provide a brief overview of Pillar Security’s platform to better understand how they are tackling…