News
U.K. drops January 2025 Apple backdoor mandate after U.S. civil liberties concerns, protecting encrypted iCloud data.
PyPI unverified 1,800 emails since June 2025 to block expired-domain attacks, strengthening open-source supply chain security ...
Noodlophile stealer targets enterprises via copyright phishing since 2024, using Gmail, Dropbox, and Telegram for evasion.
PipeMagic is a plugin-based modular malware that uses a domain hosted on the Microsoft Azure cloud provider to stage the ...
PyPI malware termncolor and colorinal downloaded 884 times exploit DLL side-loading, persistence, and C2 communication.
Russian group Secret Blizzard bypassed MFA in 2025 embassy attacks via TLS root compromise, exposing MFA limits.
The tools designed to accelerate innovation are degrading application security by embedding subtle yet serious vulnerabilities in software. Nearly half of the code snippets generated by five AI models ...
ERMAC was first documented by ThreatFabric in September 2021, detailing its ability to conduct overlay attacks against ...
EncryptHub exploits CVE-2025-26633 with social engineering and rogue MSC files, delivering Fickle Stealer malware.
The Hacker News Webinars Our webinars cover a wide range of cybersecurity topics, including cloud security, network security, incident response, compliance, and more. Each webinar is led by a ...
UAT-7237 exploits unpatched Taiwan servers using SoundBill, Cobalt Strike, and SoftEther VPN for persistent control.
U.S. sanctions Garantex, successor Grinex, after $100M illicit crypto flow fuels ransomware and sanctions evasion.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results