Category: TheHackerNews

VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX
06
Jan
2026

VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX

Jan 06, 2026Ravie LakshmananThreat Intelligence / Cloud Security Popular artificial intelligence (AI)-powered Microsoft Visual Studio Code (VS Code) forks such…

Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat
06
Jan
2026

Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat

Jan 06, 2026Ravie LakshmananMalware / Endpoint Security Source: Securonix Cybersecurity researchers have disclosed details of a new campaign dubbed PHALT#BLYX…

What is Identity Dark Matter?
06
Jan
2026

What is Identity Dark Matter?

Jan 06, 2026The Hacker NewsSaaS Security / Enterprise Security The Invisible Half of the Identity Universe Identity used to live…

New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands
06
Jan
2026

New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands

Jan 06, 2026Ravie LakshmananVulnerability / DevOps A new critical security vulnerability has been disclosed in n8n, an open-source workflow automation…

Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government
05
Jan
2026

Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government

Jan 05, 2026Ravie LakshmananCyber Espionage / Windows Security The Russia-aligned threat actor known as UAC-0184 has been observed targeting Ukrainian…

Kimwolf Android Botnet Infects Over 2 Million Devices via Exposed ADB and Proxy Networks
05
Jan
2026

Kimwolf Android Botnet Infects Over 2 Million Devices via Exposed ADB and Proxy Networks

Jan 05, 2026Ravie LakshmananIoT Security / Mobile Security The botnet known as Kimwolf has infected more than 2 million Android…

The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations 
05
Jan
2026

The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations 

Jan 05, 2026The Hacker NewsData Protection / Artificial Intelligence Featuring: Cybersecurity is being reshaped by forces that extend beyond individual…

Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act
05
Jan
2026

Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act

Jan 05, 2026Ravie LakshmananCryptocurrency / Financial Crime Ilya Lichtenstein, who was sentenced to prison last year for money laundering charges…

New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code
05
Jan
2026

New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code

Jan 05, 2026Ravie LakshmananThreat Intelligence / Windows Security Cybersecurity researchers have disclosed details of a new Python-based information stealer called…

Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia
02
Jan
2026

Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia

The threat actor known as Transparent Tribe has been attributed to a fresh set of attacks targeting Indian governmental, academic,…

The ROI Problem in Attack Surface Management
02
Jan
2026

The ROI Problem in Attack Surface Management

Attack Surface Management (ASM) tools promise reduced risk. What they usually deliver is more information. Security teams deploy ASM, asset…

Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign
02
Jan
2026

Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign

Jan 02, 2026Ravie LakshmananCloud Security / Email Security Cybersecurity researchers have disclosed details of a phishing campaign that involves the…