Category: Hacker News

The Buyer’s Guide to AI Usage Control
Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign
Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows
Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models
DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns
Orchid Security Introduces Continuous Identity Observability for Enterprise Applications
The First 90 Seconds: How Early Decisions Shape Incident Response Investigations
Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers
Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions
CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog
Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata
Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package
[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate
When Cloud Outages Ripple Across the Internet
APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks
Mozilla Adds One-Click Option to Disable Generative AI Features in Firefox
Notepad++ Hosting Breach Attributed to China-Linked Lotus Blossom Hacking Group
Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
Securing the Mid-Market Across the Complete Threat Lifecycle
⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats
Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users
eScan Antivirus Update Servers Compromised to Deliver Multi-Stage Malware
Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists
Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms
Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access
China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware
Badges, Bytes and Blackmail

Badges, Bytes and Blackmail

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score
Ex-Google Engineer Convicted for Stealing 2,000 AI Trade Secrets for China Startup
Two Ivanti EPMM Zero-Day RCE Flaws Actively Exploited, Security Updates Released
Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries
ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories
Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps
3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026
SolarWinds Fixes Four Critical Web Help Desk Flaws With Unauthenticated RCE and Auth Bypass
Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks
Russian ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid
Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware
From Triage to Threat Hunts: How AI Accelerates SecOps
Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks
Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution
Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan
Password Reuse in Disguise: An Often-Missed Risky Workaround
Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088