Category: TheHackerNews

Browser-in-the-Middle
28
May
2025

How ‘Browser-in-the-Middle’ Attacks Steal Sessions in Seconds

May 28, 2025The Hacker NewsBrowser Security / Credential Theft Would you expect an end user to log on to a…

Cybercriminals Clone Antivirus
28
May
2025

Cybercriminals Clone Antivirus Site to Spread Venom RAT and Steal Crypto Wallets

May 27, 2025Ravie LakshmananMalware / Cybersecurity Cybersecurity researchers have disclosed a new malicious campaign that uses a fake website advertising…

Apple App Store Threats
28
May
2025

Apple Blocks $9 Billion in Fraud Over 5 Years Amid Rising App Store Threats

May 28, 2025Ravie LakshmananMobile Security / Software Security Apple on Tuesday revealed that it prevented over $9 billion in fraudulent…

Self-Spreading Docker Malware
27
May
2025

New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency

May 27, 2025Ravie LakshmananCloud Security / Threat Intelligence Misconfigured Docker API instances have become the target of a new malware…

AI Agents and the Non‑Human Identity
27
May
2025

How to Deploy AI More Securely at Scale

Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub Copilot’s code completions to chatbots that mine internal knowledge…

Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages
27
May
2025

Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages

May 27, 2025Ravie Lakshmanan Cloud Security / Malware Microsoft has shed light on a previously undocumented cluster of threat activity…

Payroll Portals on Google
27
May
2025

Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers

Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques to target employee…

Stealth Phishing Campaign
27
May
2025

FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign

May 27, 2025Ravie LakshmananData Breach / Social Engineering The U.S. Federal Bureau of Investigation (FBI) has warned of social engineering…

Weaponized Word Documents
27
May
2025

Russia-Linked Hackers Target Tajikistan Government with Weaponized Word Documents

May 27, 2025Ravie LakshmananMalware / Threat Intelligence The Russia-aligned threat actor known as TAG-110 has been observed conducting a spear-phishing…

Malicious npm and VS Code Packages
26
May
2025

Over 70 Malicious npm and VS Code Packages Found Stealing Data and Crypto

As many as 60 malicious npm packages have been discovered in the package registry with malicious functionality to harvest hostnames,…

CISO's Guide To Web Privacy Validation And Why It's Important
26
May
2025

CISO’s Guide To Web Privacy Validation And Why It’s Important

May 26, 2025The Hacker NewsData Privacy / Web Security Are your web privacy controls protecting your users, or just a…

Winos 4.0 Malware
25
May
2025

Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware

May 25, 2025Ravie LakshmananThreat Intelligence / Software Security Cybersecurity researchers have disclosed a malware campaign that uses fake software installers…