Cisco Issues Emergency Fix for Critical Root Credential Flaw in Unified CM
04
Jul
2025

Cisco Issues Emergency Fix for Critical Root Credential Flaw in Unified CM

Cisco, a leading networking hardware company, has issued an urgent security alert and released updates to address a severe vulnerability…

Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
04
Jul
2025

Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros

Jul 04, 2025Ravie LakshmananVulnerability / Linux Cybersecurity researchers have disclosed two security flaws in the Sudo command-line utility for Linux…

Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
04
Jul
2025

Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks

A critical security vulnerability has been discovered in HIKVISION’s applyCT component, part of the HikCentral Integrated Security Management Platform, that…

Critical HIKVISION applyCT Flaw Allows Remote Code Execution
04
Jul
2025

Critical HIKVISION applyCT Flaw Allows Remote Code Execution

A newly disclosed vulnerability, tracked as CVE-2025-34067, has been identified in HIKVISION’s widely deployed security management platform, applyCT (also known as…

Hunters International Ransomware Gang Rebrands as World Leaks
04
Jul
2025

Hunters International Ransomware Gang Rebrands as World Leaks

Hunters International ransomware gang closes after 55 confirmed and 199 unconfirmed cyberattacks. Read about its rebrand to World Leaks and…

AI Agents
04
Jul
2025

Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It

Jul 04, 2025The Hacker NewsAI Security / Enterprise Security Generative AI is changing how businesses work, learn, and innovate. But…

How government cyber cuts will affect you and your business
04
Jul
2025

How government cyber cuts will affect you and your business

Deep cuts in cybersecurity spending risk creating ripple effects that will put many organizations at a higher risk of falling…

New Sophisticated Attack Bypasses Content Security Policy Using HTML-Injection Technique
04
Jul
2025

New Sophisticated Attack Bypasses Content Security Policy Using HTML-Injection Technique

A sophisticated technique to bypass Content Security Policy (CSP) protections using a combination of HTML injection and browser cache manipulation. …

Massive Android Ad Fraud 'IconAds' Uses Google Play to Target and Exploit Users
04
Jul
2025

Massive Android Ad Fraud ‘IconAds’ Uses Google Play to Target and Exploit Users

HUMAN’s Satori Threat Intelligence and Research Team has dismantled a sprawling ad fraud operation named IconAds, which infiltrated the Google…

New "123 | Stealer" Advertised on Underground Hacking Forums for $120 Per Month
04
Jul
2025

New “123 | Stealer” Advertised on Underground Hacking Forums for $120 Per Month

A new credential-stealing malware dubbed “123 | Stealer” has surfaced on underground cybercrime forums, being marketed by threat actor “koneko”…

Researchers Defeat Content Security Policy Protections via HTML Injection
04
Jul
2025

Researchers Defeat Content Security Policy Protections via HTML Injection

In a breakthrough that challenges the perceived safety of nonce-based Content Security Policy (CSP), security researchers have demonstrated a practical…

Android Users' Cellular Data
04
Jul
2025

Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission

Jul 04, 2025Ravie LakshmananMobile Security / Privacy Google has been ordered by a court in the U.S. state of California…