Category: Hacker News

Manual Processes Are Putting National Security at Risk
Defense Contractor Employee Jailed for Selling 8 Zero-Days to Russian Broker
SolarWinds Patches 4 Critical Serv-U 15.5 Flaws Allowing Root Code Execution
CISA Confirms Active Exploitation of FileZen CVE-2026-25108 Vulnerability
RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN
UAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problem
UnsolicitedBooker Targets Central Asian Telecoms With LuciDoor and MarsSnake Backdoors
Anthropic Says Chinese AI Firms Used 16 Million Claude Queries to Copy Model
APT28 Targeted European Entities Using Webhook-Based Macro Malware
Wormable XMRig Campaign Uses BYOVD Exploit and Time-Based Logic Bomb
⚡ Weekly Recap: Double-Tap Skimmers, PromptSpy AI, 30Tbps DDoS, Docker Malware & More
Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens
How Exposed Endpoints Increase Risk Across LLM Infrastructure
MuddyWater Targets MENA Organizations with GhostFetch, CHAR, and HTTP_VIP
AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
EC-Council Expands AI Certification Portfolio to Strengthen U.S. AI Workforce Readiness and Security
Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning
CISA Adds Two Actively Exploited Roundcube Flaws to KEV Catalog
BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration
Cline CLI 2.3.0 Supply Chain Attack Installed OpenClaw on Developer Systems
ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT RAT
Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026
Ukrainian National Sentenced to 5 Years in North Korea IT Worker Fraud Case
FBI Reports 1,900 ATM Jackpotting Incidents Since 2020, $20M Lost in 2025
Three Former Google Engineers Indicted Over Trade Secret Transfers to Iran
Microsoft Patches CVE-2026-26119 Privilege Escalation in Windows Admin Center
PromptSpy Android Malware Abuses Gemini AI to Automate Recent-Apps Persistence
INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown
ThreatsDay Bulletin: OpenSSL RCE, Foxit 0-Days, Copilot Leak, AI Password Flaws & 20+ Stories
From Exposure to Exploitation: How AI Collapses Your Response Window
Fake IPTV Apps Spread Massiv Android Malware Targeting Mobile Banking Users
CRESCENTHARVEST Campaign Targets Iran Protest Supporters With RAT Malware
Grandstream GXP1600 VoIP Phones Exposed to Unauthenticated Remote Code Execution
Citizen Lab Finds Cellebrite Tool Used on Kenyan Activist’s Phone in Police Custody
Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs
Cybersecurity Tech Predictions for 2026: Operating in a World of Permanent Instability
Dell RecoverPoint for VMs Zero-Day CVE-2026-22769 Exploited Since Mid-2024
3 Ways to Start Your Intelligent Workflow Program
CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update
Notepad++ Fixes Hijacked Update Mechanism Used to Deliver Targeted Malware
Researchers Show Copilot and Grok Can Be Abused as Malware C2 Proxies
Keenadu Firmware Backdoor Infects Android Tablets via Signed OTA Updates
SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer
My Day Getting My Hands Dirty with an NDR System
Webinar: How Modern SOC Teams Use AI and Context to Investigate Cloud Breaches Faster
Microsoft Finds “Summarize with AI” Prompts Manipulating Chatbot Recommendations
Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta
Study Uncovers 25 Password Recovery Attacks in Major Cloud Password Managers