Category: Hacker News

DPRK Hackers Steal $137M from TRON Users in Single...

Multiple threat activity clusters with ties to North Korea (aka Democratic People's Republic of Korea or DPRK) have been linked to...

Iran-Linked Hackers Target Israel with MURKYTOUR M...

The Iran-nexus threat actor known as UNC2428 has been observed delivering a backdoor known as MURKYTOUR as part of a job-themed so...

Android Spyware Disguised as Alpine Quest App Targ...

Cybersecurity researchers have revealed that Russian military personnel are the target of a new malicious campaign that distribute...

Three Reasons Why the Browser is Best for Stopping...

Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based...

Russian Hackers Exploit Microsoft OAuth to Target ...

Multiple suspected Russia-linked threat actors are "aggressively" targeting individuals and organizations with ties to Ukraine and...

Ripple's xrpl.js npm Package Backdoored to Steal P...

The Ripple cryptocurrency npm JavaScript library named xrpl.js has been compromised by unknown threat actors as part of a software...

Google Drops Cookie Prompt in Chrome, Adds IP Prot...

Google on Tuesday revealed that it will no longer offer a standalone prompt for third-party cookies in its Chrome browser as part ...

Docker Malware Exploits Teneo Web3 Node to Earn Cr...

Cybersecurity researchers have detailed a malware campaign that's targeting Docker environments with a previously undocumented tec...

GCP Cloud Composer Bug Let Attackers Elevate Acces...

Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that could have enabled an atta...

5 Major Concerns With Employees Using The Browser

As SaaS and cloud-native work reshape the enterprise, the web browser has emerged as the new endpoint. However, unlike endpoints, ...

Phishers Exploit Google Sites and DKIM Replay to S...

In what has been described as an "extremely sophisticated phishing attack," threat actors have leveraged an uncommon approach that...

Microsoft Secures MSA Signing with Azure Confident...

Microsoft on Monday announced that it has moved the Microsoft Account (MSA) signing service to Azure confidential virtual machines...

Lotus Panda Hacks SE Asian Governments With Browse...

The China-linked cyber espionage group tracked as Lotus Panda has been attributed to a campaign that compromised multiple organiza...

Kimsuky Exploits BlueKeep RDP Vulnerability to Bre...

Cybersecurity researchers have flagged a new malicious campaign related to the North Korean state-sponsored threat actor known as ...

SuperCard X Android Malware Enables Contactless AT...

A new Android malware-as-a-service (MaaS) platform named SuperCard X can facilitate near-field communication (NFC) relay attacks, ...

The Last of Their Kind

Comments

Subnanosecond Flash Memory

Comments