Category: TheHackerNews

Ads on WhatsApp
17
Jun
2025

Meta Starts Showing Ads on WhatsApp After 6-Year Delay From 2018 Announcement

Jun 17, 2025Ravie LakshmananPrivacy / Data Protection Meta Platforms on Monday announced that it’s bringing advertising to WhatsApp, but emphasized…

U.S. Seizes $7.74M in Crypto Tied to North Korea's Global Fake IT Worker Network
16
Jun
2025

U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network

The U.S. Department of Justice (DoJ) said it has filed a civil forfeiture complaint in federal court that targets over…

Anubis Ransomware Encrypts and Wipes Files, Making Recovery Impossible Even After Payment
16
Jun
2025

Anubis Ransomware Encrypts and Wipes Files, Making Recovery Impossible Even After Payment

Jun 16, 2025Ravie LakshmananMalware / Ransomware An emerging ransomware strain has been discovered incorporating capabilities to encrypt files as well…

Transforming Your Cybersecurity Practice Into An MRR Machine
16
Jun
2025

Transforming Your Cybersecurity Practice Into An MRR Machine

Introduction The cybersecurity landscape is evolving rapidly, and so are the cyber needs of organizations worldwide. While businesses face mounting…

Malicious PyPI Package
16
Jun
2025

Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Data

Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that’s capable of harvesting sensitive developer-related…

AsyncRAT and Skuld Stealer
14
Jun
2025

Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets

A new malware campaign is exploiting a weakness in Discord’s invitation system to deliver an information stealer called Skuld and…

JSFireTruck JavaScript Malware
13
Jun
2025

Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month

Jun 13, 2025Ravie LakshmananWeb Security / Network Security Cybersecurity researchers are calling attention to a “large-scale campaign” that has been…

Monitoring Alerts to Measuring Risk
13
Jun
2025

Shifting from Monitoring Alerts to Measuring Risk

Introduction: Security at a Tipping Point Security Operations Centers (SOCs) were built for a different era, one defined by perimeter-based…

Ransomware Gangs Exploit Unpatched SimpleHelp Flaws
13
Jun
2025

Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday disclosed that ransomware actors are targeting unpatched SimpleHelp Remote Monitoring…

Apple Zero-Click Flaw in Messages
13
Jun
2025

Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware

Apple has disclosed that a now-patched security flaw present in its Messages app was actively exploited in the wild to…

How VexTrio and Affiliates Run a Global Scam Network
12
Jun
2025

How VexTrio and Affiliates Run a Global Scam Network

Jun 12, 2025Ravie LakshmananThreat Intelligence / Malware The threat actors behind the VexTrio Viper Traffic Distribution Service (TDS) have been…

New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
12
Jun
2025

New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes

Cybersecurity researchers have discovered a novel attack technique called TokenBreak that can be used to bypass a large language model’s…