Category: Hacker News

Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control
Hackers Target ICTBroadcast Servers via Cookie Exploit to Gain Remote Shell Access
New SAP NetWeaver Bug Lets Attackers Take Over Servers Without Login
Chinese Hackers Exploit ArcGIS Server as Backdoor for Over a Year
RMPocalypse: Single 8-Byte Write Shatters AMD’s SEV-SNP Confidential Computing
New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions
What AI Reveals About Web Applications— and Why It Matters
Moving Beyond Awareness: How Threat Hunting Builds Readiness
npm, PyPI, and RubyGems Packages Found Sending Developer Data to Discord Channels
Researchers Expose TA585’s MonsterV2 Malware Capabilities and Attack Chain
⚡ Weekly Recap: WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More
Why Unmonitored JavaScript Is Your Biggest Holiday Security Risk
Researchers Warn RondoDox Botnet is Weaponizing Over 50 Flaws Across 30+ Vendors
Microsoft Locks Down IE Mode After Hackers Turned Legacy Feature Into Backdoor
Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns
New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs
New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login
Experts Warn of Widespread SonicWall VPN Compromise Impacting Over 100 Accounts
Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks
Stealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers
Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries
From Detection to Patch: Fortra Reveals Full Timeline of CVE-2025-10035 Exploitation
175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign
The AI SOC Stack of 2026: What Sets Top-Tier Platforms Apart?
From LFI to RCE: Active Exploitation Detected in Gladinet and TrioFox Vulnerability
CL0P-Linked Hackers Breach Dozens of Organizations Through Oracle Software Flaw
From HealthKick to GOVERSHELL: The Evolution of UTA0388’s Espionage Malware
New ClayRat Spyware Targets Android Users via Fake WhatsApp and TikTok Apps
ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More
Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks
SaaS Breaches Start with Tokens – What Security Teams Must Watch
From Phishing to Malware: AI Becomes Russia’s New Cyber Weapon in War on Ukraine
Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme
Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks
Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave
LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem
Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now
Step Into the Password Graveyard… If You Dare (and Join the Live Session)
OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them
New Research: AI Is Already the #1 Data Exfiltration Channel in the Enterprise
XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities
13-Year Redis Flaw Exposed: CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely
Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware
Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks
New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations
5 Critical Questions For Adopting an AI Security Solution
Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers
⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More