Category: TheHackerNews

Device Management
21
Apr
2025

5 Reasons Device Management Isn’t Device Trust​

The problem is simple: all breaches start with initial access, and initial access comes down to two primary attack vectors…

Russian Bulletproof Host Proton66
21
Apr
2025

Hackers Abuse Russian Bulletproof Host Proton66 for Global Attacks and Malware Delivery

Apr 21, 2025Ravie LakshmananVulnerability / Threat Intelligence Cybersecurity researchers have disclosed a surge in “mass scanning, credential brute-forcing, and exploitation…

GRAPELOADER Malware Targeting European Diplomats
20
Apr
2025

APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures

The Russian state-sponsored threat actor known as APT29 has been linked to an advanced phishing campaign that’s targeting diplomatic entities…

Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems
19
Apr
2025

Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems

Apr 19, 2025Ravie LakshmananLinux / Malware Cybersecurity researchers have uncovered three malicious packages in the npm registry that masquerade as…

AiCloud Routers
19
Apr
2025

ASUS Confirms Critical Flaw in AiCloud Routers; Users Urged to Update Firmware

Apr 19, 2025Ravie LakshmananNetwork Security / Vulnerability ASUS has disclosed a critical security flaw impacting routers with AiCloud enabled that…

Chinese Smishing Kit
18
Apr
2025

Chinese Smishing Kit Powers Widespread Toll Fraud Campaign Targeting U.S. Users in 8 States

Cybersecurity researchers are warning of a “widespread and ongoing” SMS phishing campaign that’s been targeting toll road users in the…

Multi-Stage Malware Attack
18
Apr
2025

Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader

A new multi-stage attack has been observed delivering malware families like Agent Tesla variants, Remcos RAT, and XLoader. “Attackers increasingly…

Learn How to Prevent the Next Silent Breach
18
Apr
2025

[Webinar] AI Is Already Inside Your SaaS Stack — Learn How to Prevent the Next Silent Breach

Apr 18, 2025The Hacker NewsSaaS Security / Shadow IT Your employees didn’t mean to expose sensitive data. They just wanted…

New XorDDoS Controller, Infrastructure
18
Apr
2025

Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoT

Apr 18, 2025Ravie LakshmananIoT Security / Malware Cybersecurity researchers are warning of continued risks posed by a distributed denial-of-service (DDoS)…

NTLM Credentials
18
Apr
2025

CVE-2025-24054 Under Active Attack—Steals NTLM Credentials on File Download

Apr 18, 2025Ravie LakshmananWindows Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a medium-severity…

Mustang Panda Targets Myanmar
17
Apr
2025

Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates

The China-linked threat actor known as Mustang Panda has been attributed to a cyber attack targeting an unspecified organization in…

State-Sponsored Hackers
17
Apr
2025

State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns

Multiple state-sponsored hacking groups from Iran, North Korea, and Russia have been found leveraging the increasingly popular ClickFix social engineering…