News
Entertainment
Science & Technology
Sport
Business & Money
Life
Culture & Art
Hobbies
4 | Follower
The Hacker News
10.05.2025
OtterCookie v4 adds VM evasion and MetaMask theft in April 2025, signaling rapid malware evolution.
Malicious npm packages targeting Cursor macOS users stole credentials and disabled updates, impacting 3,200+ downloads.
Dutch and U.S. law enforcement have dismantled a long-running criminal proxy botnet powered by over 7,000 infected IoT and end-of-life (EoL) devices
German police seized eXch on April 30, confiscating €34M in crypto over $1.9B laundering links.
Over 1.3M security issues across 68K assets expose CVE overload + inefficiency in patching response.
Google fined $1.375B by Texas for secretly tracking location and biometric data without user consent.
AI agents pose real threats like data leaks and misuse—Auth0's webinar shares how to secure them fast.
Brazil-targeted phishing abuses RMM trialware via NF-e lures + Dropbox links, enabling stealth access
09.05.2025
Google’s AI scam defenses now block 20x more malicious pages, cutting airline and visa scams by 80%+ in 2024.
61% of orgs suffered breaches despite 43 tools; misconfigured controls + lack of validation fuel failure.
FreeDrain exploited SEO and free hosting to run 38,000+ phishing pages stealing crypto wallets since 2022.
SonicWall fixes 3 critical SMA 100 flaws enabling root-level remote code execution via SSL-VPN access.
MirrorFace deployed ROAMINGMOUSE and updated ANEL malware in March 2025 to target Japan and Taiwan's government systems
Qilin ransomware led April 2025 with 45 data leaks, driven by NETXLOADER’s stealthy malware delivery method.
China-based hackers exploited SAP flaw CVE-2025-31324 since April 29, impacting global industries via web shells.
08.05.2025
SysAid fixed 4 critical pre-auth flaws in March 2025; chained bugs allow full admin access and RCE.
Play ransomware exploited CVE-2025-29824 zero-day in a U.S. breach before Microsoft patched it
Cisco fixes CVE-2025-20188, a 10.0 CVSS flaw tied to hardcoded JWT in wireless controllers, preventing root-level remote exploits.
SSEs lack visibility into browser activity—missing GenAI data leaks, identity misuse, and extension risks.
CVE-2025-27007 exploited in OttoKit WordPress plugin before v1.0.83 enables admin creation without authentication.
Europol dismantled six DDoS-for-hire services, arrested four, seized nine domains—disrupting attacks since 2022.
Russia-linked COLDRIVER uses LOSTKEYS malware via ClickFix lures, targeting advisors, NGOs, and journalists.
07.05.2025
NSO must pay $168M after targeting 1,400+ users via WhatsApp zero-day flaw, court finds illegal spyware use.
PyPI package 'discordpydebug' hides a RAT, downloaded 11,574 times, using stealthy HTTP polling to bypass defenses.
Microsoft warns default Helm charts expose Kubernetes apps by prioritizing ease over security, risking data leaks.
Microsoft Entra ID faces 600M daily attacks; native protections fall short, making backup vital for recovery.
Third-party breaches doubled to 30% in 2025 + ungoverned machine accounts fueled major attacks + unified identity strategy is critical.
Two critical CVEs exploited in GeoVision IoT and Samsung MagicINFO allow Mirai botnet deployment via RCE.
Reckless and Ruthless Rabbit scams use fake celebrity ads, RDGAs, and cloaking tools to target victims across Eastern Europe since 2022.
06.05.2025
Langflow flaw CVE-2025-3248 allows unauthenticated code execution + Patch due May 26 + 466 servers exposed.
Nation-state intrusions. Deepfake-ready malware. AI-powered influence ops. New CVEs, old threats reborn, and spyware with global reach.
Google’s May 2025 Android update patches 46 flaws; one critical bug exploited since March via FreeType.
CISA adds CVE-2025-34028 to KEV list after real-world exploits, forcing federal patching by May 23.
Zero-click AirPlay vulnerabilities exposed in March 2025 could let malware spread across networks undetected.
Stolen credentials remain the top attack vector + Google’s MFA and access controls reduce breach risk + Identity is now the true security perimeter.
05.05.2025
Golden Chickens launch TerraStealerV2 and TerraLogger; both still developing but actively steal data via OCX payloads.
04.05.2025
Iranian threat actor Lemon Sandstorm accessed Middle East CNI from 2023–2025 using VPN flaws, web shells, and 8 custom tools.
Malicious Go and PyPI packages use Gmail and wget to exfiltrate data, wipe Linux disks, and hijack crypto credentials.
03.05.2025
Stealth malware MintsLoader delivers GhostWeaver RAT + Evades sandboxes using DGA + Powers data theft via encrypted C2
Workflow slashes CVE ticketing time by 60% using Tines, CrowdStrike, and ServiceNow for faster action.