Ransomware: What the LockBit 3.0 data leak reveals
09
May
2025

Ransomware: What the LockBit 3.0 data leak reveals

On 7 May 2024, the presumed identity of the operator of the LockBit 3.0 franchise, also known as LockBitSupp, was…

Cryptocurrency
09
May
2025

Germany takes down eXch cryptocurrency exchange, seizes servers

The Federal police in Germany (BKA) seized the server infrastructure and shut down the ‘eXch’ cryptocurrency exchange platform for alleged money…

New Mamona Ransomware Targets Windows Systems Using Abused Ping Command
09
May
2025

New Mamona Ransomware Targets Windows Systems Using Abused Ping Command

Cybersecurity researchers are raising the alarm about a newly discovered commodity ransomware strain dubbed Mamona, which is rapidly spreading across Windows…

Interview: Amanda Stent, head of AI strategy and research, Bloomberg
09
May
2025

Interview: Amanda Stent, head of AI strategy and research, Bloomberg

Amanda Stent was researching natural language processing (NLP) at a time when there were only around 20 people in the…

Chinese Hackers Exploit SAP RCE Vulnerability to Deploy Supershell Backdoors
09
May
2025

Chinese Hackers Exploit SAP RCE Vulnerability to Deploy Supershell Backdoors

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-31324, in SAP NetWeaver Visual Composer 7.x is being actively exploited…

Hackers Target IT Admins by Poisoning SEO to Push Malware to Top Search Results
09
May
2025

Hackers Target IT Admins by Poisoning SEO to Push Malware to Top Search Results

Cybercriminals are increasingly targeting IT administrators through sophisticated Search Engine Optimization (SEO) poisoning techniques. By leveraging SEO tactics typically used…

Fake AI platforms deliver malware diguised as video content
09
May
2025

Fake AI platforms deliver malware diguised as video content

A clever malware campaign delivering the novel Noodlophile malware is targeting creators and small businesses looking to enhance their productivity…

Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
09
May
2025

Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials

May 09, 2025Ravie LakshmananSupply Chain Attack / Malware Cybersecurity researchers have flagged three malicious npm packages that are designed to…

How GenAI-driven knowledge management can enhance customer experience
09
May
2025

How GenAI-driven knowledge management can enhance customer experience

Companies are sitting on a wealth of valuable data that could be used to share relevant information with employees to…

Hackers Exploit PDF Invoices to Target Windows, Linux, and macOS Systems
09
May
2025

Hackers Exploit PDF Invoices to Target Windows, Linux, and macOS Systems

A recent discovery by the FortiMail Incident Response team has revealed a highly sophisticated email campaign targeting organizations in Spain,…

The Biggest Cyber Threat Is Attacking The AI Stack
09
May
2025

The Biggest Cyber Threat Is Attacking The AI Stack

Cybercrime Magazine caught up with Dr. Taher Elgamal, Partner at Evolution Equity Partners, at the recent RSA Conference 2025 in San Francisco. The tech…

Building AI Agents Securely
09
May
2025

Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business

May 09, 2025The Hacker NewsArtificial Intelligence / Software Security AI agents are changing the way businesses work. They can answer…