Category: Hacker News

Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide
New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs
Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT
North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware
Identity Security: Your First and Last Line of Defense
Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices
Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign
North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts
Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites
LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets
Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC Platform
Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in “Zero Disco’ Attacks
Beware the Hidden Costs of Pen Testing
ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More
CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack
Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months
F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion
Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks
How Attackers Bypass Synced Passkeys
Two New Windows Zero-Days Exploited in the Wild — One Affects Every Version Ever Shipped
Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control
Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access
New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login
Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year
RMPocalypse: Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing
New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions
What AI Reveals About Web Applications— and Why It Matters
Moving Beyond Awareness: How Threat Hunting Builds Readiness
npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels
Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain
⚡ Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More
Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk
Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors
Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor
Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns
New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs
New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login
Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts
Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks
Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers
Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries
From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation
175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign
The AI SOC Stack of 2026: What Sets Top-Tier Platforms Apart?
From LFI to RCE: Active Exploitation Detected in Gladinet and TrioFox Vulnerability
CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw
From HealthKick to GOVERSHELL: The Evolution of UTA0388’s Espionage Malware
New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps
ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More
Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks