The Hacker News

Hackers Exploit WordPress mu-Plugins to Inject Spam and...

Threat actors are using the "mu-plugins" directory in WordPress sites to conceal...

⚡ Weekly Recap: Chrome 0-Day, IngressNightmare, Solar ...

Every week, someone somewhere slips up—and threat actors slip in. A misconfigure...

5 Impactful AWS Vulnerabilities You're Responsible For

If you're using AWS, it's easy to assume your cloud security is handled - but th...

Russia-Linked Gamaredon Uses Troop-Related Lures to Dep...

Entities in Ukraine have been targeted as part of a phishing campaign designed t...

RESURGE Malware Exploits Ivanti Flaw with Rootkit and W...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light ...

New Android Trojan Crocodilus Abuses Accessibility to S...

Cybersecurity researchers have discovered a new Android banking malware called C...

New Security Flaws Found in VMware Tools and CrushFTP —...

Broadcom has issued security patches to address a high-severity security flaw in...

BlackLock Ransomware Exposed After Researchers Exploit ...

In what's an instance of hacking the hackers, threat hunters have managed to inf...

Researchers Uncover 46 Critical Flaws in Solar Inverter...

Cybersecurity researchers have disclosed 46 new security flaws in products from ...

CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR...

Cybersecurity researchers are calling attention to a new sophisticated malware c...

Product Walkthrough: How Datto BCDR Delivers Unstoppabl...

Long gone are the days when a simple backup in a data center was enough to keep ...

PJobRAT Malware Campaign Targeted Taiwanese Users via F...

An Android malware family previously observed targeting Indian military personne...

Nine-Year-Old npm Packages Hijacked to Exfiltrate API K...

Cybersecurity researchers have discovered several cryptocurrency packages on the...

Mozilla Patches Critical Firefox Bug Similar to Chrome’...

Mozilla has released updates to address a critical security flaw impacting its F...

New Morphing Meerkat Phishing Kit Mimics 114 Brands Usi...

Cybersecurity researchers have shed light on a new phishing-as-a-service (PhaaS)...

Hackers Repurpose RansomHub's EDRKillShifter in Medusa,...

A new analysis has uncovered connections between affiliates of RansomHub and oth...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.