Category: TheHackerNews

DslogdRAT Malware
25
Apr
2025

DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks

Apr 25, 2025Ravie LakshmananVulnerability / Network Security Cybersecurity researchers are warning about a new malware called DslogdRAT that’s installed following…

Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers
25
Apr
2025

Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers

Apr 25, 2025Ravie LakshmananVulnerability / Data Breach Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server…

Cross EX, Innorix Zero-Day
24
Apr
2025

Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Flaws and ThreatNeedle Malware

Apr 24, 2025Ravie LakshmananMalware / Threat Intelligence At least six organizations in South Korea have been targeted by the prolific…

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools
24
Apr
2025

Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

Apr 24, 2025Ravie LakshmananEndpoint Security / Linux Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a…

159 CVEs
24
Apr
2025

159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure

Apr 24, 2025Ravie LakshmananVulnerability / Threat Intelligence As many as 159 CVE identifiers have been flagged as exploited in the…

Darcula Adds GenAI to Phishing Toolkit
24
Apr
2025

Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals

Apr 24, 2025Ravie LakshmananPhishing / Cybercrime The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform have released new updates to…

Commvault Command Center Flaw
24
Apr
2025

Critical Commvault Command Center Flaw Enables Attackers to Execute Code Remotely

Apr 24, 2025Ravie LakshmananData Breach / Vulnerability A critical security flaw has been disclosed in the Commvault Command Center that…

Automating Zero Trust in Healthcare
24
Apr
2025

From Risk Scoring to Dynamic Policy Enforcement Without Network Redesign

The Evolving Healthcare Cybersecurity Landscape Healthcare organizations face unprecedented cybersecurity challenges in 2025. With operational technology (OT) environments increasingly targeted…

Blocks Chat Exports and Auto-Downloads
24
Apr
2025

WhatsApp Adds Advanced Chat Privacy to Blocks Chat Exports and Auto-Downloads

Apr 24, 2025Ravie LakshmananData Protection / Artificial Intelligence WhatsApp has introduced an extra layer of privacy called Advanced Chat Privacy…

TRON Phishing Attack
23
Apr
2025

DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack

Apr 23, 2025Ravie LakshmananMalware / Cryptocurrency Multiple threat activity clusters with ties to North Korea (aka Democratic People’s Republic of…

MURKYTOUR Malware via Fake Job Campaign
23
Apr
2025

Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign

The Iran-nexus threat actor known as UNC2428 has been observed delivering a backdoor known as MURKYTOUR as part of a…

Android Spyware
23
Apr
2025

Android Spyware Disguised as Alpine Quest App Targets Russian Military Devices

Apr 23, 2025Ravie LakshmananSpyware / Mobile Security Cybersecurity researchers have revealed that Russian military personnel are the target of a…