The Hacker News

Why The Modern Google Workspace Needs Unified Security

The Need For Unified Security Google Workspace is where teams collaborate, share...

⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Im...

Cyber threats today don't just evolve—they mutate rapidly, testing the resilienc...

SilentCryptoMiner Infects 2,000 Russian Users via Fake ...

A new mass malware campaign is infecting users with a cryptocurrency miner named...

FIN7, FIN8, and Others Use Ragnar Loader for Persistent...

Threat hunters have shed light on a "sophisticated and evolving malware toolkit"...

Microsoft Warns of Malvertising Campaign Infecting Over...

Microsoft has disclosed details of a large-scale malvertising campaign that's es...

Webinar: Learn How ASPM Transforms Application Security...

Are you tired of dealing with outdated security tools that never seem to give yo...

What PCI DSS v4 Really Means – Lessons from A&F Complia...

Access on-demand webinar here Avoid a $100,000/month Compliance Disaster March 3...

This Malicious PyPI Package Stole Ethereum Private Keys...

Cybersecurity researchers have discovered a malicious Python package on the Pyth...

U.S. Secret Service Seizes Russian Garantex Crypto Exch...

A coalition of international law enforcement agencies has seized the website ass...

Safe{Wallet} Confirms North Korean TraderTraitor Hacker...

Safe{Wallet} has revealed that the cybersecurity incident that led to the Bybit ...

PHP-CGI RCE Flaw Exploited in Attacks on Japan's Tech, ...

Threat actors of unknown provenance have been attributed to a malicious campaign...

Elastic Releases Urgent Fix for Critical Kibana Vulnera...

Elastic has rolled out security updates to address a critical security flaw impa...

EncryptHub Deploys Ransomware and Stealer via Trojanize...

The financially motivated threat actor known as EncryptHub has been observed orc...

Medusa Ransomware Hits 40+ Victims in 2025, Demands $10...

The threat actors behind the Medusa ransomware have claimed nearly 400 victims s...

Outsmarting Cyber Threats with Attack Graphs

Cyber threats are growing more sophisticated, and traditional security approache...

Over 1,000 WordPress Sites Infected with JavaScript Bac...

Over 1,000 websites powered by WordPress have been infected with a third-party J...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.