The Hacker News

FBI and Europol Disrupt Lumma Stealer Malware Network L...

A sprawling operation undertaken by global law enforcement agencies and a consor...

Russian Hackers Exploit Email and VPN Vulnerabilities t...

Russian cyber threat actors have been attributed to a state-sponsored campaign t...

PureRAT Malware Spikes 4x in 2025, Deploying PureLogs t...

Russian organizations have become the target of a phishing campaign that distrib...

Fake Kling AI Facebook Ads Deliver RAT Malware to Over ...

Counterfeit Facebook pages and sponsored ads on the social media platform are be...

Securing CI/CD workflows with Wazuh

Continuous Integration and Continuous Delivery/Deployment (CI/CD) refers to prac...

How to Detect Phishing Attacks Faster: Tycoon2FA Example

It takes just one email to compromise an entire system. A single well-crafted me...

Researchers Expose PWA JavaScript Attack That Redirects...

Cybersecurity researchers have discovered a new campaign that employs malicious ...

Google Chrome Can Now Auto-Change Compromised Passwords...

Google has announced a new feature in its Chrome browser that lets its built-in ...

Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate...

A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud re...

100+ Fake Chrome Extensions Found Hijacking Sessions, S...

An unknown threat actor has been attributed to creating several malicious Chrome...

South Asian Ministries Hit by SideWinder APT Using Old ...

High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have e...

AWS Default IAM Roles Found to Enable Lateral Movement ...

Cybersecurity researchers have discovered risky default identity and access mana...

The Crowded Battle: Key Insights from the 2025 State of...

In the newly released 2025 State of Pentesting Report, Pentera surveyed 500 CISO...

Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year...

Threat hunters have exposed the tactics of a China-aligned threat actor called U...

Go-Based Malware Deploys XMRig Miner on Linux Hosts via...

Cybersecurity researchers are calling attention to a new Linux cryptojacking cam...

Malicious PyPI Packages Exploit Instagram and TikTok AP...

Cybersecurity researchers have uncovered malicious packages uploaded to the Pyth...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.