News
Entertainment
Science & Technology
Sport
Business & Money
Life
Culture & Art
Hobbies
4 | Follower
The Hacker News
10.03.2025
SilentCryptoMiner infects 2,000 users by posing as a restriction bypass tool, leveraging YouTube and Telegram for distribution.
08.03.2025
Malicious PyPI package set-utils steals Ethereum private keys, exfiltrating them via Polygon RPC to evade detection.
Discover how ASPM unifies code insights and runtime data to close security gaps and prevent threats. Join Palo Alto Networks’ webinar to learn more.
Microsoft exposes a malvertising campaign impacting 1M+ devices, using GitHub, PowerShell, and RATs for data theft.
Ragnar Loader malware enables ransomware groups to maintain stealthy access, evade detection, and execute remote control operations.
PCI DSS v4 introduces strict script security and monitoring mandates. Learn how A&F tackled compliance to avoid $100,000/month fines.
U.S. and Europol seize Garantex website, citing darknet ties. Tether blocks wallets worth 2.5B rubles.
07.03.2025
Elastic patched a critical Kibana flaw (CVE-2025-25012, CVSS 9.9) enabling arbitrary code execution. Update to version 8.17.3 now.
Over 1,000 WordPress sites infected with JavaScript backdoors, enabling persistent access and malware deployment.
EncryptHub expands phishing and ransomware tactics, leveraging PPI services, trojanized apps, and EncryptRAT to target high-value victims.
Hackers exploit CVE-2024-4577 to breach Japanese firms, leveraging Cobalt Strike, PowerShell, and advanced persistence techniques.
Medusa ransomware surged 42% in 2024, claiming nearly 400 victims. Spearwing exploits Microsoft flaws to breach networks
Attack graphs provide continuous visibility into attack paths, enabling proactive threat detection and risk mitigation.
Bybit’s $1.5B crypto heist linked to North Korean hackers. 77% of funds remain traceable, while Web3 losses hit $1.6B in 2025
06.03.2025
80% of breaches stem from compromised Identity credentials. Learn why centralizing Identity is crucial for security resilience.
Google introduces AI scam detection for Android, flagging fraudulent calls and texts in real time.
U.S. charges 12 Chinese nationals in a cyber espionage case linked to PRC’s MPS, MSS, and APT27.
Dark Caracal APT deploys Poco RAT malware in Latin America, targeting enterprises via phishing lures. Attackers use .REV archives to evade detection.
Silk Typhoon exploits zero-day vulnerabilities, stolen API keys, and cloud services to infiltrate IT supply chains and government networks worldwide.
Lotus Panda targets Asian government and media sectors with new Sagerunex backdoor variants using Dropbox, X, and Zimbra for covert operations.
USB attacks exploit common devices to spread malware. Wazuh detects threats like Stuxnet and Raspberry Robin across OS platforms.
05.03.2025
Cybercriminals exploit ISPs in China and the U.S. West Coast, deploying info stealers, crypto miners, and brute-force tools on over 4,000 IPs.
Attackers are using typosquatted Go packages to deploy malware on Linux and macOS, targeting financial developers.
AI-powered credential stuffing could worsen in 2025, as attackers scale automation to breach accounts. Defending identity security is now more critica
Broadcom patches three actively exploited VMware flaws, including a critical (CVSS 9.3) bug enabling code execution. Update now for protection.
Black Basta and CACTUS ransomware groups share the BackConnect module, suggesting a shift in affiliations.
Hackers used a compromised Indian electronics firm’s email to deliver a Golang backdoor in a UAE-targeted phishing campaign.
04.03.2025
JavaGhost exploits AWS misconfigurations to run phishing campaigns via SES and WorkMail, evading email protections
CISA adds five exploited vulnerabilities to its KEV catalog, including flaws in Cisco, Microsoft, and Progress software.
Paragon Software patches CVE-2025-0289, a zero-day flaw in BioNTdrv.sys, exploited for privilege escalation and ransomware
Get exclusive insights on cyber attacks—including expert analysis on zero-day exploits, AI breaches, and crypto hacks—in our free newsletter.
U.K. ICO launches investigations into TikTok, Reddit, and Imgur over concerns about children's data privacy and online safety compliance
Threat actors use ClickFix to spread Havoc C2 malware via SharePoint and Microsoft Graph API, while scammers exploit Google Ads to target PayPal users
Google’s March 2025 Android Security Bulletin fixes 44 vulnerabilities, including two actively exploited flaws.
Ransomware attacks rose 11% in 2024, with 5,414 incidents and 46 new groups emerging. RansomHub led with 531 attacks.
Vo1d botnet infects 800K+ Android TVs daily, peaks at 1.59M devices, with India’s cases surging 18-fold. Experts warn of escalating cyber threats.
01.03.2025
Cellebrite's zero-day exploit bypassed an Android lock screen to access a Serbian activist’s phone. Amnesty links attack to Linux kernel flaws.
Hackers now scan port 1098 to exploit RDP vulnerabilities, targeting 740,000 IPs daily. Microsoft patches two critical flaws. Protect your business no
Cybercriminals use fake CAPTCHAs in phishing PDFs to spread Lumma Stealer, targeting 7,000+ users via Webflow, GoDaddy, and YouTube
Sticky Werewolf deploys Lumma Stealer via phishing attacks in Russia and Belarus, stealing credentials, banking data, and cryptowallet information.