Category: Hacker News
Navigating the Future: Key IT Vulnerability Manage...
As the cybersecurity landscape continues to evolve, proactive vulnerability management has become a critical priority for managed ...
AsyncRAT Campaign Uses Python Payloads and TryClou...
A malware campaign has been observed delivering a remote access trojan (RAT) named AsyncRAT by making use of Python payloads and T...
CISA Adds Four Actively Exploited Vulnerabilities ...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulne...
Malicious Go Package Exploits Module Mirror Cachin...
Cybersecurity researchers have called attention to a software supply chain attack targeting the Go ecosystem that involves a malic...
Russian Cybercrime Groups Exploiting 7-Zip Flaw to...
A recently patched security vulnerability in the 7-Zip archiver tool was exploited in the wild to deliver the SmokeLoader malware....
North Korean Hackers Deploy FERRET Malware via Fak...
The North Korean threat actors behind the Contagious Interview campaign have been observed delivering a collection of Apple macOS ...
⚡ THN Weekly Recap: Top Cybersecurity Threats, Too...
This week, our news radar shows that every new tech idea comes with its own challenges. A hot AI tool is under close watch, law en...
Silent Lynx Using PowerShell, Golang, and C++ Load...
A previously undocumented threat actor known as Silent Lynx has been linked to cyber attacks targeting various entities in Kyrgyzs...
New Veeam Flaw Allows Arbitrary Code Execution via...
Veeam has released patches to address a critical security flaw impacting its Backup software that could allow an attacker to execu...
Cross-Platform JavaScript Stealer Targets Crypto W...
The North Korea-linked Lazarus Group has been linked to an active campaign that leverages fake LinkedIn job offers in the cryptocu...
Cybercriminals Use Go Resty and Node Fetch in 13 M...
Cybercriminals are increasingly leveraging legitimate HTTP client tools to facilitate account takeover (ATO) attacks on Microsoft ...
Coyote Malware Expands Reach: Now Targets 1,030 Si...
Brazilian Windows users are the target of a campaign that delivers a banking malware known as Coyote. "Once deployed, the Coyote B...
What Is Attack Surface Management?
Attack surfaces are growing faster than security teams can keep up – to stay ahead, you need to know what’s exposed and where atta...
Crazy Evil Gang Targets Crypto with StealC, AMOS, ...
A Russian-speaking cybercrime gang known as Crazy Evil has been linked to over 10 active social media scams that leverage a wide r...
Watch Out For These 8 Cloud Security Shifts in 202...
As cloud security evolves in 2025 and beyond, organizations must adapt to both new and evolving realities, including the increasin...
Taiwan Bans DeepSeek AI Over National Security Con...
Taiwan has become the latest country to ban government agencies from using Chinese startup DeepSeek's Artificial Intelligence (AI)...
AMD SEV-SNP Vulnerability Allows Malicious Microco...
A security vulnerability has been disclosed in AMD's Secure Encrypted Virtualization (SEV) that could permit an attacker to load a...
Microsoft Patches Critical Azure AI Face Service V...
Microsoft has released patches to address two Critical-rated security flaws impacting Azure AI Face Service and Microsoft Account ...
Google Patches 47 Android Security Flaws, Includin...
Google has shipped patches to address 47 security flaws in its Android operating system, including one it said has come under acti...
Microsoft SharePoint Connector Flaw Could've Enabl...
Cybersecurity researchers have disclosed details of a now-patched vulnerability impacting the Microsoft SharePoint connector on Po...