Category: TheHackerNews

WhatsApp Launches Private Processing
29
Apr
2025

WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy

Apr 29, 2025Ravie LakshmananArtificial Intelligence / Data Protection Popular messaging app WhatsApp on Tuesday unveiled a new technology called Private…

Chinese Espionage Campaign
29
Apr
2025

SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients

Cybersecurity company SentinelOne has revealed that a China-nexus threat cluster dubbed PurpleHaze conducted reconnaissance attempts against its infrastructure and some…

Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products
29
Apr
2025

Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products

Apr 29, 2025Ravie LakshmananEnterprise Security / Vulnerability Google has revealed that it observed 75 zero-day vulnerabilities exploited in the wild…

Securing Microsoft Copilot with Reco
29
Apr
2025

Securing Microsoft Copilot with Reco

Find out how Reco keeps Microsoft 365 Copilot safe by spotting risky prompts, protecting data, managing user access, and identifying…

Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool
29
Apr
2025

Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool

Apr 29, 2025Ravie LakshmananCybersecurity / Malware In a new campaign detected in March 2025, senior members of the World Uyghur…

Broadcom and Commvault Flaws
29
Apr
2025

CISA Adds Actively Exploited Broadcom and Commvault Flaws to KEV Database

Apr 29, 2025Ravie LakshmananVulnerability / Web Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two high-severity…

Breaking Down 5 Real Vulns
28
Apr
2025

Breaking Down 5 Real Vulns

Not every security vulnerability is high risk on its own – but in the hands of an advanced attacker, even…

Rootkits and Cloud-Based Data T
28
Apr
2025

Earth Kurma Targets Southeast Asia With Rootkits and Cloud-Based Data Theft Tools

Government and telecommunications sectors in Southeast Asia have become the target of a “sophisticated” campaign undertaken by a new advanced…

WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site Backdoors
28
Apr
2025

WooCommerce Users Targeted by Fake Patch Phishing Campaign Deploying Site Backdoors

Apr 28, 2025Ravie LakshmananWebsite Security / Malware Cybersecurity researchers are warning about a large-scale phishing campaign targeting WooCommerce users with…

Hackers Exploit Critical Craft CMS Flaws
28
Apr
2025

Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised

Apr 28, 2025Ravie LakshmananWeb Application Security / Vulnerability Threat actors have been observed exploiting two newly disclosed critical security flaws…

Clouds with AzureChecker
27
Apr
2025

Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers

Apr 27, 2025Ravie LakshmananKubernetes / Cloud Security Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted…

CACTUS Ransomware
26
Apr
2025

ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion

Apr 26, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker…