Category: Hacker News

Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution
WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts
Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud
Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation
Discover the AI Tools Fueling the Next Cybercrime Wave — Watch the Webinar
Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems
Chopping AI Down to Size: Turning Disruptive Technology into a Strategic Advantage
Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks
SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities
Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild
India Orders Phone Makers to Pre-Install Sanchar Saathi App to Tackle Telecom Fraud
ShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs Into Spyware
⚡ Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More
Webinar: The “Agentic” Trojan Horse: Why the New AI Browsers War is a Nightmare for Security Teams
New Albiriox MaaS Malware Targets 400+ Apps for On-Device Fraud and Screen Control
Tomiris Shifts to Public-Service Implants for Stealthier C2 in Attacks on Government Targets
CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV
North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware
Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages
Why Organizations Are Turning to RPAM
MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants
Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update
ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
Gainsight Expands Impacted Customer List Following Salesforce Security Alert
Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows
ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet
CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat
New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices
Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign
ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves
Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)
Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices
WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide
Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software
ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts
EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates
Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild
Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar
Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year
Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks
Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion
Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale
Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities