Category: TheHackerNews

Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub
02
Jun
2025

Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub

Cybersecurity researchers have discovered a new cryptojacking campaign that’s targeting publicly accessible DevOps web servers such as those associated with…

Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU
02
Jun
2025

Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU

Jun 02, 2025Ravie LakshmananSpyware / Vulnerability Qualcomm has shipped security updates to address three zero-day vulnerabilities that it said have…

The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats
02
Jun
2025

The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats

The evolution of cyber threats has forced organizations across all industries to rethink their security strategies. As attackers become more…

Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions
02
Jun
2025

Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions

Cybersecurity researchers have warned of a new spear-phishing campaign that uses a legitimate remote access tool called Netbird to target…

U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation
31
May
2025

U.S. DoJ Seizes 4 Domains Supporting Cybercrime Crypting Services in Global Operation

May 31, 2025Ravie LakshmananMalware / Cyber Crime A multinational law enforcement operation has resulted in the takedown of an online…

Linux Flaws
31
May
2025

New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

May 31, 2025Ravie LakshmananVulnerability / Linux Two information disclosure flaws have been identified in apport and systemd-coredump, the core dump…

Meta Disrupts Influence Ops
30
May
2025

Meta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake Personas

Meta on Thursday revealed that it disrupted three covert influence operations originating from Iran, China, and Romania during the first…

ConnectWise Investigates ScreenConnect Breach
30
May
2025

ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach

May 30, 2025Ravie LakshmananVulnerability / Data Breach ConnectWise, the developer of remote access and support software ScreenConnect, has disclosed that…

Romance Baiting Scams Tied to Crypto Fraud
30
May
2025

U.S. Sanctions Funnull for $200M Romance Baiting Scams Tied to Crypto Fraud

May 30, 2025Ravie LakshmananCryptocurrency / Cybercrime The U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) has levied sanctions…

A Healthcare CISO's Journey to Enabling Modern Care
30
May
2025

A Healthcare CISO’s Journey to Enabling Modern Care

Breaking Out of the Security Mosh Pit When Jason Elrod, CISO of MultiCare Health System, describes legacy healthcare IT environments,…

ClickFix CAPTCHA
30
May
2025

New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data

A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix social engineering tactic…

China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil
30
May
2025

China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

May 30, 2025Ravie LakshmananVulnerability / Threat Intelligence The China-linked threat actor behind the recent in-the-wild exploitation of a critical security…