Category: Hacker News

Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances
The State of Trusted Open Source
OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls
CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited
Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches
Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control
The Future of Cybersecurity Includes Non-Human Employees
Veeam Patches Critical RCE Vulnerability with CVSS 9.0 in Backup & Replication
Webinar: Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators
n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions
Microsoft Warns Misconfigured Email Routing Can Enable Internal Domain Phishing
Ongoing Attacks Exploiting Critical RCE Vulnerability in Legacy D-Link DSL Routers
Unpatched Firmware Flaw Exposes TOTOLINK EX200 to Full Remote Device Takeover
Two Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users
Fake Booking Emails Redirect Hotel Staff to Fake BSoD Pages Delivering DCRat
What is Identity Dark Matter?
VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX
Critical AdonisJS Bodyparser Flaw (CVSS 9.2) Enables Arbitrary File Write on Servers
New n8n Vulnerability (9.9 CVSS) Lets Authenticated Users Execute System Commands
Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government
Kimwolf Android Botnet Infects Over 2 Million Devices via Exposed ADB and Proxy Networks
âš¡ Weekly Recap: IoT Exploits, Wallet Breaches, Rogue Extensions, AI Abuse & More
The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations 
Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act
New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code
Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia
The ROI Problem in Attack Surface Management
Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign
How To Browse Faster and Get More Done Using Adapt Browser
ThreatsDay Bulletin: GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories
RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers
Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack
DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide
Researchers Spot Modified Shai-Hulud Worm Testing Payload on npm Registry
IBM Warns of Critical API Connect Bug Allowing Remote Authentication Bypass
U.S. Treasury Lifts Sanctions on Three Individuals Linked to Intellexa and Predator Spyware
CSA Issues Alert on Critical SmarterMail Bug Allowing Remote Code Execution
How to Integrate AI into Modern SOC Workflows
Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware
Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor
âš¡ Weekly Recap: MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More
27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials
Traditional Security Frameworks Leave Organizations Exposed to AI-Specific Attack Vectors
MongoDB Vulnerability CVE-2025-14847 Under Active Exploitation Worldwide
New MongoDB Flaw Lets Unauthenticated Attackers Read Uninitialized Memory
Trust Wallet Chrome Extension Breach Caused $7 Million Crypto Loss via Malicious Code
China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware
Critical LangChain Core Vulnerability Exposes Secrets via Serialization Injection
ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories
LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds