The Hacker News

Debunking the AI Hype: Inside Real Hacker Tactics

Is AI really reshaping the cyber threat landscape, or is the constant drumbeat o...

Winnti APT41 Targets Japanese Firms in RevivalStone Cyb...

The China-linked threat actor known as Winnti has been attributed to a new campa...

New Xerox Printer Flaws Could Let Attackers Capture Win...

Security vulnerabilities have been disclosed in Xerox VersaLink C7025 Multifunct...

Cybercriminals Exploit Onerror Event in Image Tags to D...

Cybersecurity researchers have flagged a credit card stealing malware campaign t...

Microsoft Uncovers New XCSSET macOS Malware Variant wit...

Microsoft said it has discovered a new variant of a known Apple macOS malware ca...

South Korea Suspends DeepSeek AI Downloads Over Privacy...

South Korea has formally suspended new downloads of Chinese artificial intellige...

CISO's Expert Guide To CTEM And Why It Matters

Cyber threats evolve—has your defense strategy kept up? A new free guide availab...

⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hac...

Welcome to this week’s Cybersecurity News Recap. Discover how cyber attackers ar...

New Golang-Based Backdoor Uses Telegram Bot API for Eva...

Cybersecurity researchers have shed light on a new Golang-based backdoor that us...

Android's New Feature Blocks Fraudsters from Sideloadin...

Google is working on a new security feature for Android that blocks device owner...

New “whoAMI” Attack Exploits AWS AMI Name Confusion for...

Cybersecurity researchers have disclosed a new type of name confusion attack cal...

Lazarus Group Deploys Marstech1 JavaScript Implant in T...

The North Korean threat actor known as the Lazarus Group has been linked to a pr...

AI-Powered Social Engineering: Ancillary Tools and Tech...

Social engineering is advancing fast, at the speed of generative AI. This is off...

Microsoft: Russian-Linked Hackers Using 'Device Code Ph...

Microsoft is calling attention to an emerging threat cluster it calls Storm-2372...

RansomHub Becomes 2024’s Top Ransomware Group, Hitting ...

The threat actors behind the RansomHub ransomware-as-a-service (RaaS) scheme hav...

PostgreSQL Vulnerability Exploited Alongside BeyondTrus...

Threat actors who were behind the exploitation of a zero-day vulnerability in Be...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.