Category: TheHackerNews

Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
04
Dec
2025

Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China

The threat actor known as Silver Fox has been spotted orchestrating a false flag operation to mimic a Russian threat…

5 Threats That Reshaped Web Security This Year [2025]
04
Dec
2025

5 Threats That Reshaped Web Security This Year [2025]

As 2025 draws to a close, security professionals face a sobering realization: the traditional playbook for web security has become…

GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
04
Dec
2025

GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Cybercriminals associated with a financially motivated group known as GoldFactory have been observed staging a fresh round of attacks targeting…

Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
04
Dec
2025

Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts

Dec 04, 2025Ravie LakshmananDDoS Attacks / Network Security Cloudflare on Wednesday said it detected and mitigated the largest ever distributed…

Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution
03
Dec
2025

Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution

Dec 03, 2025Ravie LakshmananVulnerability / Cloud Security A maximum-severity security flaw has been disclosed in React Server Components (RSC) that,…

WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts
03
Dec
2025

WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts

Dec 03, 2025Ravie LakshmananVulnerability / Website Security A critical security flaw impacting a WordPress plugin known as King Addons for…

Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation
03
Dec
2025

Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation

Dec 03, 2025Ravie LakshmananVulnerability / Endpoint Security Microsoft has silently plugged a security flaw that has been exploited by several…

Banking Trojan Spread via WhatsApp
03
Dec
2025

Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud

The threat actor known as Water Saci is actively evolving its tactics, switching to a sophisticated, highly layered infection chain…

Discover the AI Tools Fueling the Next Cybercrime Wave — Watch the Webinar
03
Dec
2025

Discover the AI Tools Fueling the Next Cybercrime Wave — Watch the Webinar

Dec 03, 2025The Hacker NewsCybercrime / Artificial Intelligence Remember when phishing emails were easy to spot? Bad grammar, weird formatting,…

Turning Disruptive Technology into a Strategic Advantage
03
Dec
2025

Turning Disruptive Technology into a Strategic Advantage

Most people know the story of Paul Bunyan. A giant lumberjack, a trusted axe, and a challenge from a machine…

Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems
03
Dec
2025

Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems

Dec 03, 2025Ravie LakshmananMalware / Web3 Security Cybersecurity researchers have discovered a malicious Rust package that’s capable of targeting Windows,…

Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code
03
Dec
2025

Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code

Dec 03, 2025Ravie LakshmananMachine Learning / Vulnerability Three critical security flaws have been disclosed in an open-source utility called Picklescan…