Category: TheHackerNews

Russian Hackers Exploit Microsoft OAuth
23
Apr
2025

Russian Hackers Exploit Microsoft OAuth to Target Ukraine Allies via Signal and WhatsApp

Multiple suspected Russia-linked threat actors are “aggressively” targeting individuals and organizations with ties to Ukraine and human rights with an…

Three Reasons Why the Browser is Best for Stopping Phishing Attacks
23
Apr
2025

Three Reasons Why the Browser is Best for Stopping Phishing Attacks

Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based techniques over software…

Ripple's xrpl.js npm Package Backdoored
23
Apr
2025

Ripple’s xrpl.js npm Package Backdoored to Steal Private Keys in Major Supply Chain Attack

Apr 23, 2025Ravie LakshmananBlockchain / Cryptocurrency The Ripple cryptocurrency npm JavaScript library named xrpl.js has been compromised by unknown threat…

Google Adds IP Protection to Incognito
23
Apr
2025

Google Drops Cookie Prompt in Chrome, Adds IP Protection to Incognito

Apr 23, 2025Ravie LakshmananPrivacy / Artificial Intelligence Google on Tuesday revealed that it will no longer offer a standalone prompt…

Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals
22
Apr
2025

Docker Malware Exploits Teneo Web3 Node to Earn Crypto via Fake Heartbeat Signals

Apr 22, 2025Ravie LakshmananIoT Security / Malware Cybersecurity researchers have detailed a malware campaign that’s targeting Docker environments with a…

GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages
22
Apr
2025

GCP Cloud Composer Bug Let Attackers Elevate Access via Malicious PyPI Packages

Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that could have enabled an attacker to elevate…

Phishers Exploit Google Sites and DKIM Replay
22
Apr
2025

Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials

In what has been described as an “extremely sophisticated phishing attack,” threat actors have leveraged an uncommon approach that allowed…

5 Major Concerns With Employees Using The Browser
22
Apr
2025

5 Major Concerns With Employees Using The Browser

As SaaS and cloud-native work reshape the enterprise, the web browser has emerged as the new endpoint. However, unlike endpoints,…

Microsoft Secures MSA Signing
22
Apr
2025

Microsoft Secures MSA Signing with Azure Confidential VMs Following Storm-0558 Breach

Apr 22, 2025Ravie LakshmananIdentity Management / Cloud Security Microsoft on Monday announced that it has moved the Microsoft Account (MSA)…

Browser Stealers and Sideloaded Malware
22
Apr
2025

Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware

Apr 22, 2025Ravie LakshmananCyber Espionage / Threat Intelligence The China-linked cyber espionage group tracked as Lotus Panda has been attributed…

BlueKeep RDP Vulnerability
21
Apr
2025

Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan

Apr 21, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have flagged a new malicious campaign related to the North Korean state-sponsored…

SuperCard X Android Malware
21
Apr
2025

SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks

Apr 21, 2025Ravie LakshmananTechnology / Mobile Security A new Android malware-as-a-service (MaaS) platform named SuperCard X can facilitate near-field communication…