Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year
13
Aug
2025

Several Docker Images Contain Infamous XZ Backdoor Planted for More Than a Year

The cybersecurity community continues to grapple with the lingering effects of the XZ Utils backdoor, a sophisticated supply chain attack…

Microsoft Office Vulnerabilities Allow Attackers to Execute Remote Code
13
Aug
2025

Microsoft Office Vulnerabilities Allow Attackers to Execute Remote Code

Microsoft has disclosed three critical security vulnerabilities in its Office suite that could enable attackers to execute malicious code remotely…

Fake Minecraft Installer Spreads NjRat Spyware to Steal Data
13
Aug
2025

Fake Minecraft Installer Spreads NjRat Spyware to Steal Data

Fake Minecraft clone Eaglercraft 1.12 Offline spreads NjRat spyware stealing passwords, spying via webcam and microphone, warns Point Wild security…

Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data
13
Aug
2025

Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data

A sophisticated cybercriminal operation disguised as a Ukrainian Web3 development team has been targeting job seekers through weaponized NPM packages,…

Microsoft Exchange Server Flaws Allow Network-Based Spoofing and Data Tampering
13
Aug
2025

Microsoft Exchange Server Flaws Allow Network-Based Spoofing and Data Tampering

Microsoft has disclosed critical security vulnerabilities in Exchange Server that could enable attackers to conduct network-based spoofing attacks and tamper…

Tips for Transcribing Video with Technical Jargon
13
Aug
2025

Tips for Transcribing Video with Technical Jargon

When it comes to transcribing videos, technical jargon can pose several challenges. However, with the right approach, you can make…

What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive
13
Aug
2025

What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive

Aug 13, 2025The Hacker NewsArtificial Intelligence / Identity Security The AI revolution isn’t coming. It’s already here. From copilots that…

Windows Remote Desktop Services Vulnerability Let Attacker Deny Services Over Network
13
Aug
2025

Windows Remote Desktop Services Vulnerability Let Attacker Deny Services Over Network

Microsoft released security patches addressing a significant vulnerability in Windows Remote Desktop Services that could allow unauthorized attackers to launch…

13
Aug
2025

Fortinet warns about FortiSIEM vulnerability with in-the-wild exploit code (CVE-2025-25256)

Fortinet has released patches for a critical OS command injection vulnerability (CVE-2025-25256) in FortiSIEM, after practical exploit code surfaced in…

Charon Ransomware targets Middle East with APT attack methods
13
Aug
2025

Charon Ransomware targets Middle East with APT attack methods

Charon Ransomware targets Middle East with APT attack methods Pierluigi Paganini August 13, 2025 New Charon ransomware targets Middle East…

Before bounties: know your assets
13
Aug
2025

Before bounties: know your assets

If you are unaware of what’s running in your environment, you can’t patch, monitor, or secure it. The simple fact…

13
Aug
2025

Ukrainian Web3team Weaponizing NPM Package to Attack Job Seekers and Steal Sensitive Data

A sophisticated cybercriminal operation disguised as a Ukrainian Web3 development team has been targeting job seekers through weaponized NPM packages,…