The Hacker News

Android's New Feature Blocks Fraudsters from Sideloadin...

Google is working on a new security feature for Android that blocks device owner...

New “whoAMI” Attack Exploits AWS AMI Name Confusion for...

Cybersecurity researchers have disclosed a new type of name confusion attack cal...

Lazarus Group Deploys Marstech1 JavaScript Implant in T...

The North Korean threat actor known as the Lazarus Group has been linked to a pr...

AI-Powered Social Engineering: Ancillary Tools and Tech...

Social engineering is advancing fast, at the speed of generative AI. This is off...

Microsoft: Russian-Linked Hackers Using 'Device Code Ph...

Microsoft is calling attention to an emerging threat cluster it calls Storm-2372...

RansomHub Becomes 2024’s Top Ransomware Group, Hitting ...

The threat actors behind the RansomHub ransomware-as-a-service (RaaS) scheme hav...

PostgreSQL Vulnerability Exploited Alongside BeyondTrus...

Threat actors who were behind the exploitation of a zero-day vulnerability in Be...

Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass...

A widespread phishing campaign has been observed leveraging bogus PDF documents ...

North Korean APT43 Uses PowerShell and Dropbox in Targe...

A nation-state threat actor with ties to North Korea has been linked to an ongoi...

Fast Deployments, Secure Code: Watch this Learn to Sync...

Ever felt like your team is stuck in a constant battle? Developers rush to add n...

RA World Ransomware Attack in South Asia Links to Chine...

An RA World ransomware attack in November 2024 targeting an unnamed Asian softwa...

Hackers Exploited PAN-OS Flaw to Deploy Chinese Malware...

An RA World ransomware attack in November 2024 targeting an unnamed Asian softwa...

AI and Security - A New Puzzle to Figure Out

AI is everywhere now, transforming how businesses operate and how users engage w...

Palo Alto Networks Patches Authentication Bypass Exploi...

Palo Alto Networks has addressed a high-severity security flaw in its PAN-OS sof...

FINALDRAFT Malware Exploits Microsoft Graph API for Esp...

Threat hunters have shed light on a new campaign targeting the foreign ministry ...

Microsoft Uncovers Sandworm Subgroup's Global Cyber Att...

A subgroup within the infamous Russian state-sponsored hacking group known as Sa...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.