Category: Hacker News

North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers
CTEM’s Core: Prioritization and Validation
Threatsday Bulletin: Rootkit Patch, Federal Breach, OnePlus SMS Leak, TikTok Scandal & More
Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds
Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed
Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software
Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike
UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors
Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models
How One Bad Password Ended a 158-Year-Old Business
New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus
iframe Security Exposed: The Blind Spot Fueling Payment Skimmer Attacks
Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM Credentials
State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability
Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security
Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries
U.S. Secret Service Seizes 300 SIM Servers, 100K Cards Threatening U.S. Officials Near UN
SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw
ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers for DDoS-for-Hire Service
Lean Teams, Higher Stakes: Why CISOs Must Rethink Incident Remediation
GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security
BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells
ComicForm and SectorJ149 Hackers Deploy Formbook Malware in Eurasian Cyberattacks
⚡ Weekly Recap: Chrome 0-Day, AI Hacking Tools, DDR5 Bit-Flips, npm Worm & More
How to Gain Control of AI Agents and Non-Human Identities
Microsoft Patches Critical Entra ID Flaw Enabling Global Admin Impersonation Across Tenants
DPRK Hackers Use ClickFix to Deliver BeaverTail Malware in Crypto Job Scams
LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer
Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell
ShadowLeak Zero-Click Flaw Leaks Gmail Data via OpenAI ChatGPT Deep Research Agent
UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware
SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers
Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability
17,500 Phishing Domains Target 316 Brands Across 74 Countries in Global PhaaS Surge
How To Automate Alert Triage With AI Agents and Confluence SOPs Using Tines
Russian Hackers Gamaredon and Turla Collaborate to Deploy Kazuar Backdoor in Ukraine
U.K. Arrests Two Teen Scattered Spider Hackers Linked to August 2024 TfL Cyber Attack
CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428
SonicWall Urges Password Resets After Cloud Backup Breach Affecting Under 5% of Customers
CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader
SilentSync RAT Delivered via Two Malicious PyPI Packages Targeting Python Developers
How CISOs Can Drive Effective AI Governance
Google Patches Chrome Zero-Day CVE-2025-10585 as Active V8 Exploit Threatens Millions
TA558 Uses AI-Generated Scripts to Deploy Venom RAT in Brazil Hotel Attacks
Chinese TA415 Uses VS Code Remote Tunnels to Spy on U.S. Economic Policy Experts
From Quantum Hacks to AI Defenses – Expert Guide to Building Unbreakable Cyber Resilience
Rethinking AI Data Security: A Buyer’s Guide 
Scattered Spider Resurfaces With Financial Sector Attacks Despite Retirement Claims
DOJ Resentences BreachForums Founder to 3 Years for Cybercrime and Possession of CSAM
RaccoonO365 Phishing Network Shut Down After Microsoft and Cloudflare Disrupt 338 Domains