Category: Hacker News

ThreatsDay Bulletin: AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More
Bitdefender Named a Representative Vendor in the 2025 Gartner® Market Guide for Managed Detection and Response
Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection
SonicWall Confirms State-Sponsored Hackers Behind September Cloud Backup Breach
Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly
Researchers Find ChatGPT Vulnerabilities That Let Attackers Trick AI Into Leaking Data
Securing the Open Android Ecosystem with Samsung Knox
Why SOC Burnout Can Be Avoided: Practical Steps
Mysterious ‘SmudgedSerpent’ Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud
CISA Adds Gladinet and CWP Flaws to KEV Catalog Amid Active Exploitation Evidence
A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Join Forces
Europol and Eurojust Dismantle €600 Million Crypto Fraud Network in Global Sweep
Critical React Native CLI Flaw Exposed Millions of Developers to Remote Attacks
Microsoft Teams Bugs Let Attackers Impersonate Colleagues and Edit Messages Unnoticed
Ransomware Defense Using the Wazuh Open Source Platform
Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectors
Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit
U.S. Prosecutors Indict Cybersecurity Insiders Accused of BlackCat Ransomware Attacks
Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel
Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive
Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks
⚡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More
The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security Operations
Researchers Uncover BankBot-YNRK and DeliveryRAT Android Trojans Stealing Financial Data
New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea
ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability
OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
The MSP Cybersecurity Readiness Guide: Turning Security into Growth
CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month
Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks
New “Brash” Exploit Crashes Chromium Browsers Instantly with a Single Malicious URL
The Death of the Security Checkbox: BAS Is the Power Behind Real Defense
ThreatsDay Bulletin: DNS Poisoning Flaw, Supply-Chain Heist, Rust Malware Trick and New RATs Rising
PhantomRaven Malware Found in 126 npm Packages Stealing GitHub Tokens From Devs
New AI-Targeted Cloaking Attack Tricks AI Crawlers Into Citing Fake Info as Verified Facts
Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices
Preparing for the Digital Battlefield of 2026: Ghost Identities, Poisoned Accounts, & AI Agent Havoc
Russian Hackers Target Ukrainian Organizations Using Stealthy Living-Off-the-Land Tactics
Discover Practical AI Tactics for GRC — Join the Free Expert Webinar
10 npm Packages Caught Stealing Developer Credentials on Windows, macOS, and Linux
Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack
New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves