-
Security
/ 5 days agoHacker News opens submissions for 2026 Cybersecurity Stars Awards
The Hacker News, a long standing publication covering cybersecurity, announced the launch of its “Cybersecurity Stars Awards 2026.” Submissions are now...
-
Security
/ 5 days agoMuddyWater Uses Microsoft Teams in False Flag Ransomware Attack
A state-sponsored hacking group linked to the Iranian government has been linked to a disruptive ransomware attack that security researchers describe...
-
Security
/ 5 days agoMirai Botnet Variant Exploits ADB to Hijack IoT Devices
Cybersecurity researchers have identified a new botnet derived from the Mirai malware, self-identified as xlabs_v1, which is actively targeting internet-connected devices...
-
Security
/ 5 days agoCritical PAN-OS Flaw Under Active Exploitation Enables Remote Attacks
A critical security vulnerability in Palo Alto Networks’ PAN-OS software is being actively exploited by threat actors, the company confirmed in...
-
Security
/ 5 days agoCloudZ RAT Malware Uses New Plugin to Steal Credentials and OTPs
cybersecurity researchers have disclosed details of a recent intrusion campaign that leverages a remote access tool known as CloudZ RAT alongside...
-
Security
/ 5 days agoGoogle expands Android app verification to block supply chain attacks
Google has announced an expansion of its Binary Transparency initiative for Android applications, aiming to protect the ecosystem from supply chain...
-
Security
/ 6 days agoStudy Exposes Security Flaws in Over 1 Million AI Services
An extensive security audit has revealed critical vulnerabilities across more than one million publicly accessible artificial intelligence services, raising concerns about...
-
Security
/ 6 days agoHackers Exploit Critical MetInfo CMS Flaw in Active Attacks
Threat actors are actively exploiting a critical security vulnerability in the open-source MetInfo content management system (CMS), according to a new...
-
Security
/ 6 days agoPersistent OAuth Tokens Present a Security Risk for Organisations
A significant security vulnerability is affecting numerous organisations, stemming from the standard authorisation process used by many popular cloud applications. The...
-
Security
/ 6 days agoChina-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions
A sophisticated advanced persistent threat (APT) group with links to China has been attributed to a series of cyberattacks targeting government...

