Category: Hacker News

SaaS Breaches Start with Tokens – What Security Teams Must Watch
From Phishing to Malware: AI Becomes Russia’s New Cyber Weapon in War on Ukraine
Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme
Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks
Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave
LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem
Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now
Step Into the Password Graveyard… If You Dare (and Join the Live Session)
OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks
BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them
New Research: AI Is Already the #1 Data Exfiltration Channel in the Enterprise
XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilities
13-Year Redis Flaw Exposed: CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely
Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware
Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacks
New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operations
5 Critical Questions For Adopting an AI Security Solution
Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Servers
⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More
Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files
Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacks
CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief
Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day
Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer
Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads
Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL
Product Walkthrough: How Passwork 7 Addresses Complexity of Enterprise Security
New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT
CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild
Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware
Alert: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown
Automating Pentest Delivery: 7 Key Workflows for Maximum Impact
ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More
Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware
How to Close Threat Detection Gaps: Your SOC’s Action Plan
Warning: Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro
New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer
OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps
How Leading Security Teams Blend AI + Human Workflows (Free Webinar)
Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover
2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising
Hackers Exploit Milesight Routers to Send Phishing SMS to European Users
New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones
Ukraine Warns of CABINETRAT Backdoor + XLL Add-ins Spread via Signal ZIPs
$50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections
Phantom Taurus: New China-Linked Hacker Group Hits Governments With Stealth Malware
Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits
Microsoft Expands Sentinel Into Agentic Security Platform With Unified Data Lake
Stop Alert Chaos: Context Is the Key to Effective Incident Response