Category: TheHackerNews

RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN
24
Feb
2026

RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN

A vulnerability in GitHub Codespaces could have been exploited by bad actors to seize control of repositories by injecting malicious…

UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware
24
Feb
2026

UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware

Ravie LakshmananFeb 24, 2026Cyber Espionage / Malware A Russia-aligned threat actor has been observed targeting a European financial institution as…

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
24
Feb
2026

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

Ravie LakshmananFeb 24, 2026Threat Intelligence / Healthcare The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed…

Identity Prioritization isn't a Backlog Problem
24
Feb
2026

Identity Prioritization isn’t a Backlog Problem

Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control…

LuciDoor and MarsSnake Backdoors
24
Feb
2026

UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors

The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift…

Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model
24
Feb
2026

Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model

Ravie LakshmananFeb 24, 2026Artificial Intelligence / Anthropic Anthropic on Monday said it identified “industrial-scale campaigns” mounted by three artificial intelligence…

APT28 Targeted European Entities Using Webhook-Based Macro Malware
24
Feb
2026

APT28 Targeted European Entities Using Webhook-Based Macro Malware

Ravie LakshmananFeb 23, 2026Malware / Threat Intelligence The Russia-linked state-sponsored threat actor tracked as APT28 has been attributed to a…

Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb
23
Feb
2026

Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb

Cybersecurity researchers have disclosed details of a new cryptojacking campaign that uses pirated software bundles as lures to deploy a…

How Exposed Endpoints Increase Risk Across LLM Infrastructure
23
Feb
2026

How Exposed Endpoints Increase Risk Across LLM Infrastructure

The Hacker NewsFeb 23, 2026Artificial Intelligence / Zero Trust As more organizations run their own Large Language Models (LLMs), they…

Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens
23
Feb
2026

Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens

Cybersecurity researchers have disclosed what they say is an active “Shai-Hulud-like” supply chain worm campaign that has leveraged a cluster…

MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP
23
Feb
2026

MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP

Ravie LakshmananFeb 23, 2026Threat Intelligence / Artificial Intelligence The Iranian hacking group known as MuddyWater (aka Earth Vetala, Mango Sandstorm,…

AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
21
Feb
2026

AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries

A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise…