Category: TheHackerNews

SonicWall NetExtender Trojan and ConnectWise Exploits
25
Jun
2025

SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks

Jun 25, 2025Ravie LakshmananVPN Security / Malware Unknown threat actors have been distributing a trojanized version of SonicWall’s SSL VPN…

NPM Supply Chain Attack
25
Jun
2025

North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages

Jun 25, 2025Ravie LakshmananMalware / Open Source Cybersecurity researchers have uncovered a fresh batch of malicious npm packages linked to…

Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options
25
Jun
2025

Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Options

Jun 25, 2025Ravie LakshmananEndpoint Security / IT Management Microsoft on Tuesday announced that it’s extending Windows 10 Extended Security Updates…

New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public
24
Jun
2025

New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public

Jun 24, 2025Ravie LakshmananSocial Media / Privacy The United States Embassy in India has announced that applicants for F, M,…

Microsoft Exchange Servers
24
Jun
2025

Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers

Jun 24, 2025Ravie LakshmananVulnerability / Malware Unidentified threat actors have been observed targeting publicly exposed Microsoft Exchange servers to inject…

Cryptominer Campaigns
24
Jun
2025

Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogue

Jun 24, 2025Ravie LakshmananMalware / Cryptocurrency Cybersecurity researchers have detailed two novel methods that can be used to disrupt cryptocurrency…

The CTEM Conversation We All Need
24
Jun
2025

The CTEM Conversation We All Need

Jun 24, 2025Ravie LakshmananThreat Exposure Management I had the honor of hosting the first episode of the Xposure Podcast live…

Docker APIs to Mine Cryptocurrency
24
Jun
2025

Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network

Jun 24, 2025Ravie LakshmananCloud Security / Cryptojacking Misconfigured Docker instances are the target of a campaign that employs the Tor…

BEARDSHELL Malware and COVENANT
24
Jun
2025

APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine

Jun 24, 2025Ravie LakshmananMalware / Threat Intelligence The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new…

U.S. House Bans WhatsApp
24
Jun
2025

U.S. House Bans WhatsApp on Official Devices Over Security and Data Protection Issues

Jun 24, 2025Ravie LakshmananData Protection / Mobile Security The U.S. House of Representatives has formally banned congressional staff members from…

China-linked Salt Typhoon
24
Jun
2025

China-linked Salt Typhoon Exploits Critical Cisco Vulnerability to Target Canadian Telecom

Jun 24, 2025Ravie LakshmananCyber Espionage / Chinese Hackers The Canadian Centre for Cyber Security and the U.S. Federal Bureau of…

Pro-Iranian Hackers
23
Jun
2025

DHS Warns Pro-Iranian Hackers Likely to Target U.S. Networks After Iranian Nuclear Strikes

Jun 23, 2025Ravie LakshmananHacktivism / Cyber Warfare The United States government has warned of cyber attacks mounted by pro-Iranian groups…