United State

English

The Hacker News

The Hacker News

About: The Hacker News ( aka THN) is the leading and go-to source for timely and relevant breaking news from the world of cybersecurity, as well as valuable insights into the latest threats and solutions. As an independent news source, we provide unbiased and comprehensive coverage of the industry, making us a trusted resource for professionals and enthusiasts alike.
Contact Us: Email: admin@thehackernews.com
Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan

Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan

Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update

Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update

ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks

ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks

Gainsight Expands Impacted Customer List Following Salesforce Security Alert

Gainsight Expands Impacted Customer List Following Salesforce Security Alert

Shai-Hulud v2 Campaign Spreads From npm to Maven, Exposing Thousands of Secrets

Shai-Hulud v2 Campaign Spreads From npm to Maven, Exposing Thousands of Secrets

Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim 'Korean Leaks' Data Heist

Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim 'Korean Leaks' Data Heist

When Your $2M Security Detection Fails: Can your SOC Save You?

When Your $2M Security Detection Fails: Can your SOC Save You?

Webinar: Learn to Spot Risks and Patch Safely with Community

Webinar: Learn to Spot Risks and Patch Safely with Community

Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swaps

Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swaps

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

FBI Reports $262M in ATO Fraud as Researchers Cite Growing AI Phishing and Holiday Scams

FBI Reports $262M in ATO Fraud as Researchers Cite Growing AI Phishing and Holiday Scams

Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys

Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys

JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers

JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealers

ToddyCat's New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens

ToddyCat's New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokens

3 SOC Challenges You Need to Solve Before 2026

3 SOC Challenges You Need to Solve Before 2026

Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data

Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data

CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users

CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Users

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusions

Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft

Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theft

⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More

⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & More

Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs

Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghurs

ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access

ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access

China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services

China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services

Matrix Push C2 Uses Browser Notifications for Fileless, Cross

Matrix Push C2 Uses Browser Notifications for Fileless, Cross

CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero

CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero

Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation

Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalation

Google Brings AirDrop Compatibility to Android's Quick Share Using Rust

Google Brings AirDrop Compatibility to Android's Quick Share Using Rust

Why IT Admins Choose Samsung for Mobile Security

Why IT Admins Choose Samsung for Mobile Security

APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains

APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domains

SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny

SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutiny