The Hacker News

Security Tools Alone Don't Protect You — Control Effect...

61% of security leaders reported suffering a breach due to failed or misconfigur...

SonicWall Patches 3 Flaws in SMA 100 Devices Allowing A...

SonicWall has released patches to address three security flaws affecting SMA 100...

Qilin Ransomware Ranked Highest in April 2025 with 72 D...

Threat actors with ties to the Qilin ransomware family have leveraged malware kn...

MirrorFace Targets Japan and Taiwan with ROAMINGMOUSE a...

The nation-state threat actor known as MirrorFace has been observed deploying ma...

Russian Hackers Using ClickFix Fake CAPTCHA to Deploy N...

The Russia-linked threat actor known as COLDRIVER has been observed distributing...

Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That...

Cisco has released software fixes to address a maximum-severity security flaw in...

Europol Shuts Down Six DDoS-for-Hire Services Used in G...

Europol has announced the takedown of distributed denial of service (DDoS)-for-h...

New HTTPBot Botnet Launches 200+ Precision DDoS Attacks...

Cybersecurity researchers are calling attention to a new botnet malware called H...

Top 10 Best Practices for Effective Data Protection

Data is the lifeblood of productivity, and protecting sensitive data is more cri...

Researchers Expose New Intel CPU Flaws Enabling Memory ...

Researchers at ETH Zürich have discovered yet another security flaw that they sa...

Fileless Remcos RAT Delivered via LNK Files and MSHTA i...

Cybersecurity researchers have shed light on a new malware campaign that makes u...

[Webinar] From Code to Cloud to SOC: Learn a Smarter Wa...

Modern apps move fast—faster than most security teams can keep up. As businesses...

Meta to Train AI on E.U. User Data From May 27 Without ...

Austrian privacy non-profit noyb (none of your business) has sent Meta's Irish h...

Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M ...

Cryptocurrency exchange Coinbase has disclosed that unknown cyber actors broke i...

Pen Testing for Compliance Only? It's Time to Change Yo...

Imagine this: Your organization completed its annual penetration test in January...

5 BCDR Essentials for Effective Ransomware Defense

Ransomware has evolved into a deceptive, highly coordinated and dangerously soph...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.