United State

English

The Hacker News

The Hacker News

About: The Hacker News ( aka THN) is the leading and go-to source for timely and relevant breaking news from the world of cybersecurity, as well as valuable insights into the latest threats and solutions. As an independent news source, we provide unbiased and comprehensive coverage of the industry, making us a trusted resource for professionals and enthusiasts alike.
Contact Us: Email: admin@thehackernews.com
Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain

Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain

Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations

Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations

TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies

TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies

Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names

Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names

Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide

Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide

Webinar: Why Top Teams Are Prioritizing Code-to-Cloud Mapping in Our 2025 AppSec

Webinar: Why Top Teams Are Prioritizing Code-to-Cloud Mapping in Our 2025 AppSec

Hidden Vulnerabilities of Project Management Tools & How FluentPro Backup Secures Them

Hidden Vulnerabilities of Project Management Tools & How FluentPro Backup Secures Them

Malicious Nx Packages in 's1ngularity' Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

Malicious Nx Packages in 's1ngularity' Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks

Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks

Someone Created First AI-Powered Ransomware Using OpenAI's gpt

Someone Created First AI-Powered Ransomware Using OpenAI's gpt

Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors

Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors

ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots

ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots

The 5 Golden Rules of Safe AI Adoption

The 5 Golden Rules of Safe AI Adoption

Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data

Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data

Blind Eagle's Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra

Blind Eagle's Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra

Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE

Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE

New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station

New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station

MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers

MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers

ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners

ShadowCaptcha Exploits WordPress Sites to Spread Ransomware, Info Stealers, and Crypto Miners

HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands

HOOK Android Trojan Adds Ransomware Overlays, Expands to 107 Remote Commands

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git

CISA Adds Three Exploited Vulnerabilities to KEV Catalog Affecting Citrix and Git

UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats

UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats

Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3

Docker Fixes CVE-2025-9074, Critical Container Escape Vulnerability With CVSS Score 9.3

Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads

Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads

⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In

⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In

Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations

Why SIEM Rules Fail and How to Fix Them: Insights from 160 Million Attack Simulations

Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing

Transparent Tribe Targets Indian Govt With Weaponized Desktop Shortcuts via Phishing

Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot

Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot