The Hacker News

Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling...

Microsoft is warning of an insecure practice wherein software developers are inc...

India’s RBI Introduces Exclusive "bank.in" Domain to Co...

India's central bank, the Reserve Bank of India (RBI), said it's introducing an ...

Hackers Exploiting SimpleHelp RMM Flaws for Persistent ...

Threat actors have been observed exploiting recently disclosed security flaws in...

Fake Google Chrome Sites Distribute ValleyRAT Malware v...

Bogus websites advertising Google Chrome have been used to distribute malicious ...

Ransomware Extortion Drops to $813.5M in 2024, Down fro...

Ransomware attacks netted cybercrime groups a total of $813.5 million in 2024, a...

SparkCat Malware Uses OCR to Extract Crypto Wallet Reco...

A new malware campaign dubbed SparkCat has leveraged a suit of bogus apps on bot...

The Evolving Role of PAM in Cybersecurity Leadership Ag...

Privileged Access Management (PAM) has emerged as a cornerstone of modern cybers...

North Korean APT Kimsuky Uses forceCopy Malware to Stea...

The North Korea-linked nation-state hacking group known as Kimsuky has been obse...

Top 3 Ransomware Threats Active in 2025

You arrive at the office, power up your system, and panic sets in. Every file is...

Cisco Patches Critical ISE Vulnerabilities Enabling Roo...

Cisco has released updates to address two critical security flaws Identity Servi...

Cross-Platform JavaScript Stealer Targets Crypto Wallet...

The North Korea-linked Lazarus Group has been linked to an active campaign that ...

Cybercriminals Use Go Resty and Node Fetch in 13 Millio...

Cybercriminals are increasingly leveraging legitimate HTTP client tools to facil...

Silent Lynx Using PowerShell, Golang, and C++ Loaders i...

A previously undocumented threat actor known as Silent Lynx has been linked to c...

New Veeam Flaw Allows Arbitrary Code Execution via Man-...

Veeam has released patches to address a critical security flaw impacting its Bac...

Navigating the Future: Key IT Vulnerability Management ...

As the cybersecurity landscape continues to evolve, proactive vulnerability mana...

AsyncRAT Campaign Uses Python Payloads and TryCloudflar...

A malware campaign has been observed delivering a remote access trojan (RAT) nam...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.