Category: Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks
SecAlerts Cuts Through the Noise with a Smarter, Faster Way to Track Vulnerabilities
Google Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild
India Orders Phone Makers to Pre-Install Sanchar Saathi App to Tackle Telecom Fraud
ShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs Into Spyware
⚡ Weekly Recap: Hot CVEs, npm Worm Returns, Firefox RCE, M365 Email Raid & More
Webinar: The “Agentic” Trojan Horse: Why the New AI Browsers War is a Nightmare for Security Teams
New Albiriox MaaS Malware Targets 400+ Apps for On-Device Fraud and Screen Control
Tomiris Shifts to Public-Service Implants for Stealthier C2 in Attacks on Government Targets
CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV
North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware
Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages
Why Organizations Are Turning to RPAM
MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants
Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update
ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
Gainsight Expands Impacted Customer List Following Salesforce Security Alert
Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows
ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet
CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat
New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices
Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt
TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign
ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves
Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)
Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices
WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide
Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software
EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates
ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts
Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild
Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar
Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year
Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks
Researchers Detail Tuoni C2’s Role in an Attempted 2025 Real-Estate Cyber Intrusion
Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale
Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities
Seven npm Packages Use Adspect Cloaking to Trick Victims Into Crypto Scam Pages
Microsoft Mitigates Record 5.72 Tbps DDoS Attack Driven by AISURU Botnet
Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability
New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT
⚡ Weekly Recap: Fortinet Exploited, China’s AI Hacks, PhaaS Empire Falls & More
5 Reasons Why Attackers Are Phishing Over LinkedIn
Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT
Rust Adoption Drives Android Memory Safety Bugs Below 20% for First Time
RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies
North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels