Category: TheHackerNews

Leveraging Credentials As Unique Identifiers
30
Jun
2025

A Pragmatic Approach To NHI Inventories 

Identity-based attacks are on the rise. Attacks in which malicious actors assume the identity of an entity to easily gain…

FBI Warns of Scattered Spider's Expanding Attacks on Airlines Using Social Engineering
28
Jun
2025

FBI Warns of Scattered Spider’s Expanding Attacks on Airlines Using Social Engineering

The U.S. Federal Bureau of Investigation (FBI) has revealed that it has observed the notorious cybercrime group Scattered Spider broadening…

Facebook's New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns
28
Jun
2025

Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns

Jun 28, 2025Ravie LakshmananPrivacy / Data Protection Facebook, the social network platform owned by Meta, is asking for users to…

GIFTEDCROOK Malware
28
Jun
2025

From Browser Stealer to Intelligence-Gathering Tool

Jun 28, 2025Ravie LakshmananMalware / Cyber Warfare The threat actor behind the GIFTEDCROOK malware has made significant updates to turn…

Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign
27
Jun
2025

Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaign

Jun 27, 2025Ravie LakshmananThreat Hunting / Vulnerability Threat hunters have discovered a network of more than 1,000 compromised small office…

PUBLOAD and Pubshell Malware Used in Mustang Panda's Tibet-Specific Attack
27
Jun
2025

PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attack

Jun 27, 2025Ravie LakshmananVulnerability / Cyber Espionage A China-linked threat actor known as Mustang Panda has been attributed to a…

Chinese Group Silver Fox Uses Fake Websites
27
Jun
2025

Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkit

Jun 27, 2025Ravie LakshmananMalware / Cyber Attack A new campaign has been observed leveraging fake websites advertising popular software such…

Agentic AI SOC Analysts
27
Jun
2025

Business Case for Agentic AI SOC Analysts

Security operations centers (SOCs) are under pressure from both sides: threats are growing more complex and frequent, while security budgets…

MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted
27
Jun
2025

MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targeted

Jun 27, 2025Ravie LakshmananNetwork Security / Vulnerability Threat intelligence firm GreyNoise is warning of a “notable surge” in scanning activity…

Microsoft ClickOnce and Golang Backdoors
27
Jun
2025

OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors

Cybersecurity researchers have detailed a new campaign dubbed OneClik that leverages Microsoft’s ClickOnce software deployment technology and bespoke Golang backdoors…

Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks
26
Jun
2025

Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks

Jun 26, 2025Ravie LakshmananOpen Source / Vulnerability Cybersecurity researchers have disclosed a critical vulnerability in the Open VSX Registry (“open-vsx[.]org”)…

New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacks
26
Jun
2025

New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacks

Jun 26, 2025Ravie LakshmananCyber Attack / Malware Analysis The ClickFix social engineering tactic as an initial access vector using fake…