Category: TheHackerNews

Lumma Stealer Malware Network
22
May
2025

FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections

A sprawling operation undertaken by global law enforcement agencies and a consortium of private sector firms has disrupted the online…

Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics
21
May
2025

Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics

Russian cyber threat actors have been attributed to a state-sponsored campaign targeting Western logistics entities and technology companies since 2022….

PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms
21
May
2025

PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms

May 21, 2025Ravie LakshmananMalware / Windows Security Russian organizations have become the target of a phishing campaign that distributes malware…

Securing CI/CD workflows with Wazuh
21
May
2025

Securing CI/CD workflows with Wazuh

Continuous Integration and Continuous Delivery/Deployment (CI/CD) refers to practices that automate how code is developed and released to different environments….

Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims
21
May
2025

Fake Kling AI Facebook Ads Deliver RAT Malware to Over 22 Million Potential Victims

May 21, 2025Ravie LakshmananMalware / Artificial Intelligence Counterfeit Facebook pages and sponsored ads on the social media platform are being…

How to Detect Phishing Attacks Faster: Tycoon2FA Example
21
May
2025

How to Detect Phishing Attacks Faster: Tycoon2FA Example

It takes just one email to compromise an entire system. A single well-crafted message can bypass filters, trick employees, and…

Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps
21
May
2025

Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps

May 21, 2025Ravie LakshmananMobile Security / Browser Security Cybersecurity researchers have discovered a new campaign that employs malicious JavaScript injections…

Auto-Change Compromised Passwords
21
May
2025

Google Chrome Can Now Auto-Change Compromised Passwords Using Its Built-In Manager

May 21, 2025Ravie LakshmananData Breach / Account Security Google has announced a new feature in its Chrome browser that lets…

Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
20
May
2025

Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery

May 20, 2025Ravie LakshmananMalware / Cloud Security A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud…

100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
20
May
2025

100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads

May 20, 2025Ravie LakshmananCredential Theft / Browser Security An unknown threat actor has been attributed to creating several malicious Chrome…

AWS Default IAM Roles
20
May
2025

AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the…

South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware
20
May
2025

South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware

May 20, 2025Ravie LakshmananMalware / Cyber Espionage High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have emerged as the…