Category: Hacker News

New Android Trojan ‘Herodotus’ Outsmarts Anti-Fraud Systems by Typing Like a Human
Researchers Expose GhostCall and GhostHire: BlueNoroff’s New Malware Chains
Why Early Threat Detection Is a Must for Long-Term Business Growth
Is Your Google Workspace as Secure as You Think it is?
Chrome Zero-Day Exploited to Deliver Italian Memento Labs’ LeetAgent Spyware
SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats
X Warns Users With Security Keys to Re-Enroll Before November 10 to Avoid Lockouts
New ChatGPT Atlas Browser Exploit Lets Attackers Plant Persistent Hidden Commands
⚡ Weekly Recap: WSUS Exploited, LockBit 5.0 Returns, Telegram Backdoor, F5 Breach Widens
Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack
ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands
Smishing Triad Linked to 194,000 Malicious Domains in Global Phishing Operation
Microsoft Issues Emergency Patch for Actively Exploited Critical WSUS Vulnerability
APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign
The Cybersecurity Perception Gap: Why Executives and Practitioners See Risk Differently
3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation
Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack
North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets
Secure AI at Scale and Speed — Learn the Framework in this Free Webinar
ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More
Why Organizations Are Abandoning Static Secrets for Managed Identities
“Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards
Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms
Over 250 Magento Stores Hit Overnight as Hackers Exploit New Adobe Commerce Flaw
Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign
Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
Fake Nethereum NuGet Package Used Homoglyph Trick to Steal Crypto Wallet Keys
Chinese Threat Actors Exploit ToolShell SharePoint Flaw Weeks After Microsoft’s July Patch
Bridging the Remediation Gap: Introducing Pentera Resolve
Why You Should Swap Passwords for Passphrases
Researchers Identify PassiveNeuron APT Using Neursite and NeuralExecutor Malware
TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution
TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution
PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign
Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams
Securing AI to Benefit from AI
Hackers Used Snappybee Malware and Citrix Flaw to Breach European Telecom Network
Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers
Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets
⚡ Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More
Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches
131 Chrome Extensions Caught Hijacking WhatsApp Web for Massive Spam Campaign
MSS Claims NSA Used 42 Cyber Tools in Multi-Stage Attack on Beijing Time Systems
Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide
New .NET CAPI Backdoor Targets Russian Auto and E-Commerce Firms via Phishing ZIPs
Silver Fox Expands Winos 4.0 Attacks to Japan and Malaysia via HoldingHands RAT
North Korean Hackers Combine BeaverTail and OtterCookie into Advanced JS Malware
Identity Security: Your First and Last Line of Defense
Researchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices
Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign