Category: Hacker News

Microsoft Issues Emergency Patch for Actively Exploited Critical WSUS Vulnerability
APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign
The Cybersecurity Perception Gap: Why Executives and Practitioners See Risk Differently
3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation
Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack
North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets
Secure AI at Scale and Speed — Learn the Framework in this Free Webinar
ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More
Why Organizations Are Abandoning Static Secrets for Managed Identities
“Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards
Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms
Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw
Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign
Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys
Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch
Bridging the Remediation Gap: Introducing Pentera Resolve
Why You Should Swap Passwords for Passphrases
Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware
TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution
TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution
PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign
Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams
Securing AI to Benefit from AI
Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network
Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers
Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets
⚡ Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More
Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches
131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign
MSS Claims NSA Used 42 Cyber Tools in Multi-Stage Attack on Beijing Time Systems
Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide
New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs
Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT
North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware
Identity Security: Your First and Last Line of Defense
Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices
Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign
North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts
Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites
LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets
Architectures, Risks, and Adoption: How to Assess and Choose the Right AI-SOC Platform
Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in “Zero Disco’ Attacks
Beware the Hidden Costs of Pen Testing
ThreatsDay Bulletin: $15B Crypto Bust, Satellite Spying, Billion-Dollar Smishing, Android RATs & More
CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack
Chinese Threat Group ‘Jewelbug’ Quietly Infiltrated Russian IT Network for Months
F5 Breach Exposes BIG-IP Source Code — Nation-State Hackers Behind Massive Intrusion
Over 100 VS Code Extensions Exposed Developers to Hidden Supply Chain Risks
How Attackers Bypass Synced Passkeys