Category: TheHackerNews

Why Exposed Credentials Remain Unfixed—and How to Change That
12
May
2025

Why Exposed Credentials Remain Unfixed—and How to Change That

Detecting leaked credentials is only half the battle. The real challenge—and often the neglected half of the equation—is what happens…

Fake AI Tools Used to Spread Malware
12
May
2025

Fake AI Tools Used to Spread Noodlophile Malware, Targeting 62,000+ via Facebook Lures

May 12, 2025Ravie LakshmananMalware / Artificial Intelligence Threat actors have been observed leveraging fake artificial intelligence (AI)-powered tools as a…

Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data
10
May
2025

Germany Shuts Down eXch Over $1.9B Laundering, Seizes €34M in Crypto and 8TB of Data

May 10, 2025Ravie LakshmananCryptocurrency / Cybercrime Germany’s Federal Criminal Police Office (aka Bundeskriminalamt or BKA) has seized the online infrastructure…

Google
10
May
2025

Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection

May 10, 2025Ravie LakshmananBiometric Data / Privacy Google has agreed to pay the U.S. state of Texas nearly $1.4 billion…

OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
09
May
2025

OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities

The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of a cross-platform malware…

BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S.
09
May
2025

BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S.

A joint law enforcement operation undertaken by Dutch and U.S. authorities has dismantled a criminal proxy network that’s powered by…

Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
09
May
2025

Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials

May 09, 2025Ravie LakshmananSupply Chain Attack / Malware Cybersecurity researchers have flagged three malicious npm packages that are designed to…

Building AI Agents Securely
09
May
2025

Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business

May 09, 2025The Hacker NewsArtificial Intelligence / Software Security AI agents are changing the way businesses work. They can answer…

Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
09
May
2025

Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials

May 09, 2025Ravie LakshmananMalware / Email Security Cybersecurity researchers are warning of a new campaign that’s targeting Portuguese-speaking users in…

Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
09
May
2025

Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android

May 09, 2025Ravie LakshmananArtificial Intelligence / Online Fraud Google on Thursday announced it’s rolling out new artificial intelligence (AI)-powered countermeasures…

Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
09
May
2025

Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell

May 09, 2025Ravie LakshmananVulnerability / Industrial Security A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently…

38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
08
May
2025

38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases

Cybersecurity researchers have exposed what they say is an “industrial-scale, global cryptocurrency phishing operation” engineered to steal digital assets from…