The Hacker News

RVTools Official Site Hacked to Deliver Bumblebee Malwa...

The official site for RVTools has been hacked to serve a compromised installer f...

Ransomware Gangs Use Skitnet Malware for Stealthy Data ...

Several ransomware actors are using a malware called Skitnet as part of their po...

Why CTEM is the Winning Bet for CISOs in 2025

Continuous Threat Exposure Management (CTEM) has moved from concept to cornersto...

Firefox Patches 2 Zero-Days Exploited at Pwn2Own Berlin...

Mozilla has released security updates to address two critical security flaws in ...

⚡ Weekly Recap: Zero-Day Exploits, Insider Threats, AP...

Cybersecurity leaders aren’t just dealing with attacks—they’re also protecting t...

Google Pays $1.375 Billion to Texas Over Unauthorized T...

Google has agreed to pay the U.S. state of Texas nearly $1.4 billion to settle t...

Germany Shuts Down eXch Over $1.9B Laundering, Seizes €...

Germany's Federal Criminal Police Office (aka Bundeskriminalamt or BKA) has seiz...

BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Syst...

A joint law enforcement operation undertaken by Dutch and U.S. authorities has d...

OtterCookie v4 Adds VM Detection and Chrome, MetaMask C...

The North Korean threat actors behind the Contagious Interview campaign have bee...

Initial Access Brokers Target Brazil Execs via NF-e Spa...

Cybersecurity researchers are warning of a new campaign that's targeting Portugu...

Deploying AI Agents? Learn to Secure Them Before Hacker...

AI agents are changing the way businesses work. They can answer questions, autom...

Beyond Vulnerability Management – Can You CVE What I CVE?

The Vulnerability Treadmill The reactive nature of vulnerability management, com...

Malicious npm Packages Infect 3,200+ Cursor Users With ...

Cybersecurity researchers have flagged three malicious npm packages that are des...

Google Rolls Out On-Device AI Protections to Detect Sca...

Google on Thursday announced it's rolling out new artificial intelligence (AI)-p...

Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, De...

A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploitin...

38,000+ FreeDrain Subdomains Found Exploiting SEO to St...

Cybersecurity researchers have exposed what they say is an "industrial-scale, gl...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.