Category: TheHackerNews

FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware
10
Jun
2025

FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware

Jun 10, 2025Ravie LakshmananPhishing / Cybercrime The financially motivated threat actor known as FIN6 has been observed leveraging fake resumes…

Fake Gaming Sites Targets Chrome, Firefox Users
10
Jun
2025

Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users

Cybersecurity researchers have shed light on a previously undocumented Rust-based information stealer called Myth Stealer that’s being propagated via fraudulent…

Non-Human Identity Management
10
Jun
2025

Why Non-Human Identity Management is the Next Cybersecurity Frontier

Modern enterprise networks are highly complex environments that rely on hundreds of apps and infrastructure services. These systems need to…

Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account
10
Jun
2025

Researcher Found Flaw to Discover Phone Numbers Linked to Any Google Account

Jun 10, 2025Ravie LakshmananVulnerability / API Security Google has stepped in to address a security flaw that could have made…

Rare Werewolf APT
10
Jun
2025

Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises

Jun 10, 2025Ravie LakshmananCryptocurrency / Malware The threat actor known as Rare Werewolf (formerly Rare Wolf) has been linked to…

CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog
10
Jun
2025

CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two critical security flaws impacting Erlang/Open Telecom Platform (OTP)…

Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group
09
Jun
2025

Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group

Jun 09, 2025Ravie LakshmananGovernment Security / Cyber Espionage The reconnaissance activity targeting American cybersecurity company SentinelOne was part of a…

Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks
09
Jun
2025

Two Distinct Botnets Exploit Wazuh Server Vulnerability to Launch Mirai-Based Attacks

A now-patched critical security flaw in the Wazur Server is being exploited by threat actors to drop two different Mirai…

Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise
09
Jun
2025

Think Your IdP or CASB Covers Shadow IT? These 5 Risks Prove Otherwise

Jun 09, 2025The Hacker News You don’t need a rogue employee to suffer a breach. All it takes is a…

OpenAI Bans ChatGPT Accounts
09
Jun
2025

OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups

OpenAI has revealed that it banned a set of ChatGPT accounts that were likely operated by Russian-speaking threat actors and…

New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally
08
Jun
2025

New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally

Cybersecurity researchers have flagged a supply chain attack targeting over a dozen packages associated with GlueStack to deliver malware. The…

Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025
08
Jun
2025

Malicious Browser Extensions Infect 722 Users Across Latin America Since Early 2025

Jun 08, 2025Ravie LakshmananMalware / Browser Security Cybersecurity researchers have shed light on a new campaign targeting Brazilian users since…