Category: Hacker News
OtterCookie v4 Adds VM Detection and Chrome, MetaM...
The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of a cross-platf...
Initial Access Brokers Target Brazil Execs via NF-...
Cybersecurity researchers are warning of a new campaign that's targeting Portuguese-speaking users in Brazil with trial versions o...
Deploying AI Agents? Learn to Secure Them Before H...
AI agents are changing the way businesses work. They can answer questions, automate tasks, and create better user experiences. But...
Beyond Vulnerability Management – Can You CVE What...
The Vulnerability Treadmill The reactive nature of vulnerability management, combined with delays from policy and process, strains...
Malicious npm Packages Infect 3,200+ Cursor Users ...
Cybersecurity researchers have flagged three malicious npm packages that are designed to target the Apple macOS version of Cursor,...
Google Rolls Out On-Device AI Protections to Detec...
Google on Thursday announced it's rolling out new artificial intelligence (AI)-powered countermeasures to combat scams across Chro...
Chinese Hackers Exploit SAP RCE Flaw CVE-2025-3132...
A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently disclosed security flaw in SAP NetWea...
Qilin Ransomware Ranked Highest in April 2025 with...
Threat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader along with a previously undocum...
Google Pays $1.375 Billion to Texas Over Unauthori...
Google has agreed to pay the U.S. state of Texas nearly $1.4 billion to settle two lawsuits that accused the company of tracking u...
Germany Shuts Down eXch Over $1.9B Laundering, Sei...
Germany's Federal Criminal Police Office (aka Bundeskriminalamt or BKA) has seized the online infrastructure and shutdown linked t...
BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL...
A joint law enforcement operation undertaken by Dutch and U.S. authorities has dismantled a criminal proxy network that's powered ...
Eagle Hunters of Kyrgyzstan
Comments