Category: TheHackerNews

100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
20
May
2025

100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads

May 20, 2025Ravie LakshmananCredential Theft / Browser Security An unknown threat actor has been attributed to creating several malicious Chrome…

AWS Default IAM Roles
20
May
2025

AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation

Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that could open the…

South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware
20
May
2025

South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware

May 20, 2025Ravie LakshmananMalware / Cyber Espionage High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have emerged as the…

Key Insights from the 2025 State of Pentesting Report
20
May
2025

Key Insights from the 2025 State of Pentesting Report

May 20, 2025The Hacker NewsPenetration Testing / Risk Management In the newly released 2025 State of Pentesting Report, Pentera surveyed…

Chinese Hackers
20
May
2025

Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization

May 20, 2025Ravie LakshmananMalware / Cyber Espionage Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker…

Go-Based Malware
20
May
2025

Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse

May 20, 2025Ravie LakshmananLinux / Cryptojacking Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign that’s targeting publicly…

Malicious PyPI Packages
20
May
2025

Malicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User Accounts

Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act as checker tools to…

Bumblebee Malware
19
May
2025

RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer

May 19, 2025Ravie LakshmananMalware / Supply Chain Attack The official site for RVTools has been hacked to serve a compromised…

Skitnet Malware
19
May
2025

Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access

May 19, 2025Ravie LakshmananRansomware / Malware Several ransomware actors are using a malware called Skitnet as part of their post-exploitation…

Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards
19
May
2025

Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin with $100K in Rewards

May 19, 2025Ravie LakshmananBrowser Security / Vulnerability Mozilla has released security updates to address two critical security flaws in its…

Why CTEM is the Winning Bet for CISOs in 2025
19
May
2025

Why CTEM is the Winning Bet for CISOs in 2025

Continuous Threat Exposure Management (CTEM) has moved from concept to cornerstone, solidifying its role as a strategic enabler for CISOs….

HTTPBot Botnet
16
May
2025

New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors

May 16, 2025Ravie LakshmananUnited States Cybersecurity researchers are calling attention to a new botnet malware called HTTPBot that has been…