Category: Hacker News

New Chaos Variant Targets Misconfigured Cloud Deployments, Adds SOCKS Proxy
APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies
Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)
Anthropic’s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems
N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust
Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs
Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign
Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access
Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign
The Hidden Cost of Recurring Credential Incidents
[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk
New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips
China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware
Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed
Iran-Linked Password-Spraying Campaign Targets 300+ Israeli Microsoft 365 Organizations
DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Attacks Targeting South Korea
⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More
Multi-OS Cyberattacks: How SOCs Close a Critical Risk in 3 Steps
How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers
Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks
$285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation
36 Malicious npm Packages Exploited Redis, PostgreSQL to Deploy Persistent Implants
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers
China-Linked TA416 Targets European Governments with PlugX and OAuth-Based Phishing
Why Third-Party Risk Is the Biggest Gap in Your Clients’ Security Posture
UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack
Drift Loses $285 Million in Durable Nonce Social Engineering Attack Linked to DPRK
New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images
Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials
Cisco Patches 9.8 CVSS IMC and SSM Flaws Allowing Remote System Compromise
ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories
WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware; Italian Firm Faces Action
Researchers Uncover Mining Operation Using ISO Lures to Spread RATs and Crypto Miners
The State of Trusted Open Source Report
Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit
CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails
Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures
New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released
Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass
Block the Prompt, Not the Work: The End of “Doctor No”
3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)
Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069
Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms
Android Developer Verification Rollout Begins Ahead of September Enforcement
TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks
Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts
Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains
The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority