The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to admin@thehackernews.com
- Qilin Ransomware Turns South Korean MSP Breach Into 28-Victim ‘Korean Leaks’ Data Heistby info@thehackernews.com (The Hacker News) on November 26, 2025 at 2:31 pm
South Korea’s financial sector has been targeted by what has been described as a sophisticated supply chain attack that led to the deployment of Qilin ransomware. “This operation combined the capabilities of a major Ransomware-as-a-Service (RaaS) group, Qilin, with potential involvement from North Korean state-affiliated actors (Moonstone Sleet), leveraging Managed Service Provider (MSP)
- When Your $2M Security Detection Fails: Can your SOC Save You?by info@thehackernews.com (The Hacker News) on November 26, 2025 at 11:55 am
Enterprises today are expected to have at least 6-8 detection tools, as detection is considered a standard investment and the first line of defense. Yet security leaders struggle to justify dedicating resources further down the alert lifecycle to their superiors. As a result, most organizations’ security investments are asymmetrical, robust detection tools paired with an under-resourced SOC,
- Chrome Extension Caught Injecting Hidden Solana Transfer Fees Into Raydium Swapsby info@thehackernews.com (The Hacker News) on November 26, 2025 at 11:10 am
Cybersecurity researchers have discovered a new malicious extension on the Chrome Web Store that’s capable of injecting a stealthy Solana transfer into a swap transaction and transferring the funds to an attacker-controlled cryptocurrency wallet. The extension, named Crypto Copilot, was first published by a user named “sjclark76” on May 7, 2024. The developer describes the browser add-on as
- Webinar: Learn to Spot Risks and Patch Safely with Community-Maintained Toolsby info@thehackernews.com (The Hacker News) on November 26, 2025 at 11:10 am
If you’re using community tools like Chocolatey or Winget to keep systems updated, you’re not alone. These platforms are fast, flexible, and easy to work with—making them favorites for IT teams. But there’s a catch… The very tools that make your job easier might also be the reason your systems are at risk. These tools are run by the community. That means anyone can add or update packages. Some
- RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malwareby info@thehackernews.com (The Hacker News) on November 26, 2025 at 8:28 am
The threat actors behind a malware family known as RomCom targeted a U.S.-based civil engineering company via a JavaScript loader dubbed SocGholish to deliver the Mythic Agent. “This is the first time that a RomCom payload has been observed being distributed by SocGholish,” Arctic Wolf Labs researcher Jacob Faires said in a Tuesday report. The activity has been attributed with medium-to-high
- FBI Reports $262M in ATO Fraud as Researchers Cite Growing AI Phishing and Holiday Scamsby info@thehackernews.com (The Hacker News) on November 26, 2025 at 4:29 am
The U.S. Federal Bureau of Investigation (FBI) has warned that cybercriminals are impersonating financial institutions with an aim to steal money or sensitive information to facilitate account takeover (ATO) fraud schemes. The activity targets individuals, businesses, and organizations of varied sizes and across sectors, the agency said, adding the fraudulent schemes have led to more than $262
- Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keysby info@thehackernews.com (The Hacker News) on November 25, 2025 at 4:49 pm
New research has found that organizations in various sensitive sectors, including governments, telecoms, and critical infrastructure, are pasting passwords and credentials into online tools like JSONformatter and CodeBeautify that are used to format and validate code. Cybersecurity company watchTowr Labs said it captured a dataset of over 80,000 files on these sites, uncovering thousands of
- JackFix Uses Fake Windows Update Pop-Ups on Adult Sites to Deliver Multiple Stealersby info@thehackernews.com (The Hacker News) on November 25, 2025 at 2:18 pm
Cybersecurity researchers are calling attention to a new campaign that’s leveraging a combination of ClickFix lures and fake adult websites to deceive users into running malicious commands under the guise of a “critical” Windows security update. “Campaign leverages fake adult websites (xHamster, PornHub clones) as its phishing mechanism, likely distributed via malvertising,” Acronis said in a
- ToddyCat’s New Hacking Tools Steal Outlook Emails and Microsoft 365 Access Tokensby info@thehackernews.com (The Hacker News) on November 25, 2025 at 11:36 am
The threat actor known as ToddyCat has been observed adopting new methods to obtain access to corporate email data belonging to target companies, including using a custom tool dubbed TCSectorCopy. “This attack allows them to obtain tokens for the OAuth 2.0 authorization protocol using the user’s browser, which can be used outside the perimeter of the compromised infrastructure to access
- 3 SOC Challenges You Need to Solve Before 2026by info@thehackernews.com (The Hacker News) on November 25, 2025 at 11:30 am
2026 will mark a pivotal shift in cybersecurity. Threat actors are moving from experimenting with AI to making it their primary weapon, using it to scale attacks, automate reconnaissance, and craft hyper-realistic social engineering campaigns. The Storm on the Horizon Global world instability, coupled with rapid technological advancement, will force security teams to adapt not just their
- Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malwareby info@thehackernews.com (The Hacker News) on November 25, 2025 at 11:28 am
Cybersecurity researchers have disclosed details of a new campaign that has leveraged Blender Foundation files to deliver an information stealer known as StealC V2. “This ongoing operation, active for at least six months, involves implanting malicious .blend files on platforms like CGTrader,” Morphisec researcher Shmuel Uzan said in a report shared with The Hacker News. “Users unknowingly
- CISA Warns of Active Spyware Campaigns Hijacking High-Value Signal and WhatsApp Usersby info@thehackernews.com (The Hacker News) on November 25, 2025 at 6:42 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday issued an alert warning of bad actors actively leveraging commercial spyware and remote access trojans (RATs) to target users of mobile messaging applications. “These cyber actors use sophisticated targeting and social engineering techniques to deliver spyware and gain unauthorized access to a victim’s messaging app,
- New Fluent Bit Flaws Expose Cloud to RCE and Stealthy Infrastructure Intrusionsby info@thehackernews.com (The Hacker News) on November 24, 2025 at 3:03 pm
Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight telemetry agent, that could be chained to compromise and take over cloud infrastructures. The security defects “allow attackers to bypass authentication, perform path traversal, achieve remote code execution, cause denial-of-service conditions, and manipulate tags,” Oligo Security said in
- Second Sha1-Hulud Wave Affects 25,000+ Repositories via npm Preinstall Credential Theftby info@thehackernews.com (The Hacker News) on November 24, 2025 at 1:03 pm
Multiple security vendors are sounding the alarm about a second wave of attacks targeting the npm registry in a manner that’s reminiscent of the Shai-Hulud attack. The new supply chain campaign, dubbed Sha1-Hulud, has compromised hundreds of npm packages, according to reports from Aikido, HelixGuard, JFrog, Koi Security, ReversingLabs, SafeDep, Socket, Step Security, and Wiz. The trojanized
- ⚡ Weekly Recap: Fortinet Exploit, Chrome 0-Day, BadIIS Malware, Record DDoS, SaaS Breach & Moreby info@thehackernews.com (The Hacker News) on November 24, 2025 at 12:32 pm
This week saw a lot of new cyber trouble. Hackers hit Fortinet and Chrome with new 0-day bugs. They also broke into supply chains and SaaS tools. Many hid inside trusted apps, browser alerts, and software updates. Big firms like Microsoft, Salesforce, and Google had to react fast — stopping DDoS attacks, blocking bad links, and fixing live flaws. Reports also showed how fast fake news, AI
- Chinese DeepSeek-R1 AI Generates Insecure Code When Prompts Mention Tibet or Uyghursby info@thehackernews.com (The Hacker News) on November 24, 2025 at 11:07 am
New research from CrowdStrike has revealed that DeepSeek’s artificial intelligence (AI) reasoning model DeepSeek-R1 produces more security vulnerabilities in response to prompts that contain topics deemed politically sensitive by China. “We found that when DeepSeek-R1 receives prompts containing topics the Chinese Communist Party (CCP) likely considers politically sensitive, the likelihood of it
- ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Accessby info@thehackernews.com (The Hacker News) on November 24, 2025 at 7:18 am
A recently patched security flaw in Microsoft Windows Server Update Services (WSUS) has been exploited by threat actors to distribute malware known as ShadowPad. “The attacker targeted Windows Servers with WSUS enabled, exploiting CVE-2025-59287 for initial access,” AhnLab Security Intelligence Center (ASEC) said in a report published last week. “They then used PowerCat, an open-source
- China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Servicesby info@thehackernews.com (The Hacker News) on November 22, 2025 at 3:19 pm
The China-linked advanced persistent threat (APT) group known as APT31 has been attributed to cyber attacks targeting the Russian information technology (IT) sector between 2024 and 2025 while staying undetected for extended periods of time. “In the period from 2024 to 2025, the Russian IT sector, especially companies working as contractors and integrators of solutions for government agencies,
- Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacksby info@thehackernews.com (The Hacker News) on November 22, 2025 at 6:47 am
Bad actors are leveraging browser notifications as a vector for phishing attacks to distribute malicious links by means of a new command-and-control (C2) platform called Matrix Push C2. “This browser-native, fileless framework leverages push notifications, fake alerts, and link redirects to target victims across operating systems,” Blackfog researcher Brenda Robb said in a Thursday report. In
- CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerabilityby info@thehackernews.com (The Hacker News) on November 22, 2025 at 6:45 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting Oracle Identity Manager to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability in question is CVE-2025-61757 (CVSS score: 9.8), a case of missing authentication for a critical function that can result in pre-authenticated
- Grafana Patches CVSS 10.0 SCIM Flaw Enabling Impersonation and Privilege Escalationby info@thehackernews.com (The Hacker News) on November 21, 2025 at 3:40 pm
Grafana has released security updates to address a maximum severity security flaw that could allow privilege escalation or user impersonation under certain configurations. The vulnerability, tracked as CVE-2025-41115, carries a CVSS score of 10.0. It resides in the System for Cross-domain Identity Management (SCIM) component that allows automated user provisioning and management. First
- Google Brings AirDrop Compatibility to Android’s Quick Share Using Rust-Hardened Securityby info@thehackernews.com (The Hacker News) on November 21, 2025 at 1:00 pm
In a surprise move, Google on Thursday announced that it has updated Quick Share, its peer-to-peer file transfer service, to work with Apple’s equipment AirDrop, allowing users to more easily share files and photos between Android and iPhone devices. The cross-platform sharing feature is currently limited to the Pixel 10 lineup and works with iPhone, iPad, and macOS devices, with plans to expand
- Why IT Admins Choose Samsung for Mobile Securityby info@thehackernews.com (The Hacker News) on November 21, 2025 at 11:00 am
Ever wonder how some IT teams keep corporate data safe without slowing down employees? Of course you have. Mobile devices are essential for modern work—but with mobility comes risk. IT admins, like you, juggle protecting sensitive data while keeping teams productive. That’s why more enterprises are turning to Samsung for mobile security. Hey—you’re busy, so here’s a quick-read article on what
- APT24 Deploys BADAUDIO in Years-Long Espionage Hitting Taiwan and 1,000+ Domainsby info@thehackernews.com (The Hacker News) on November 21, 2025 at 10:42 am
A China-nexus threat actor known as APT24 has been observed using a previously undocumented malware dubbed BADAUDIO to establish persistent remote access to compromised networks as part of a nearly three-year campaign. “While earlier operations relied on broad strategic web compromises to compromise legitimate websites, APT24 has recently pivoted to using more sophisticated vectors targeting
- SEC Drops SolarWinds Case After Years of High-Stakes Cybersecurity Scrutinyby info@thehackernews.com (The Hacker News) on November 21, 2025 at 8:05 am
The U.S. Securities and Exchange Commission (SEC) has abandoned its lawsuit against SolarWinds and its chief information security officer, alleging that the company had misled investors about the security practices that led to the 2020 supply chain attack. In a joint motion filed November 20, 2025, the SEC, along with SolarWinds and its CISO Timothy G. Brown, asked the court to voluntarily





























