Category: Hacker News

Attackers Don’t Just Send Phishing Emails. They Weaponize Your SOC’s Workload
Six Android Malware Families Target Pix Payments, Banking Apps, and Crypto Wallets
CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed
Researchers Trick Perplexity’s Comet AI Browser Into Phishing Scam in Under Four Minutes
Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials
Meta Disables 150K Accounts Linked to Southeast Asia Scam Centers in Global Crackdown
Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices
What Boards Must Demand in the Age of AI-Automated Exploitation
Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days
UNC6426 Exploits nx npm Supply-Chain Attack to Gain AWS Admin Access in 72 Hours
Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets
FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet
New “LeakyLooker” Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries
The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction
APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military
How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows
Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool
CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited
Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials
UNC4899 Breached Crypto Firm After Developer AirDropped Trojanized File to Work Device
⚡ Weekly Recap: Qualcomm 0-Day, iOS Exploit Chains, AirSnitch Attack & Vibe-Coded Malware
Chrome Extension Turns Malicious After Ownership Transfer, Enabling Code Injection and Data Theft
Can the Security Platform Finally Deliver for the Mid-Market?
Web Server Exploits and Mimikatz Used in Attacks Targeting Asian Critical Infrastructure
OpenAI Codex Security Scanned 1.2 Million Commits and Found 10,561 High-Severity Issues
Anthropic Finds 22 Firefox Vulnerabilities Using Claude Opus 4.6 AI Model
Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India
Multi-Stage VOID#GEIST Malware Delivering XWorm, AsyncRAT, and Xeno RAT
Iran-Linked MuddyWater Hackers Target U.S. Networks With New Dindoor Backdoor
The MSP Guide to Using AI-Powered Risk Management to Scale Cybersecurity
Hikvision and Rockwell Automation CVSS 9.8 Flaws Added to CISA KEV Catalog
Microsoft Reveals ClickFix Campaign Using Windows Terminal to Deploy Lumma Stealer
China-Linked Hackers Use TernDoor, PeerTime, BruteEntry in South American Telecom Attacks
Cisco Confirms Active Exploitation of Two Catalyst SD-WAN Manager Vulnerabilities
Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
Where Multi-Factor Authentication Stops and Credential Abuse Starts
Dust Specter Targets Iraqi Officials with New SPLITDROP and GHOSTFORM Malware
APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
FBI and Europol Seize LeakBase Forum Used to Trade Stolen Credentials
Europol-Led Operation Takes Down Tycoon 2FA Phishing-as-a-Service Linked to 64,000 Attacks
149 Hacktivist DDoS Attacks Hit 110 Organizations in 16 Countries After Middle East Conflict
Coruna iOS Exploit Kit Uses 23 Exploits Across Five Chains Targeting iOS 13–17.2.1
New RFP Template for AI Usage Control and AI Governance 
Fake Laravel Packages on Packagist Deploy RAT on Windows, macOS, and Linux
APT41-Linked Silver Dragon Targets Governments Using Cobalt Strike and Google Drive C2
CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow