The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to admin@thehackernews.com
- Over 1,000 SOHO Devices Hacked in China-linked LapDogs Cyber Espionage Campaignby info@thehackernews.com (The Hacker News) on June 27, 2025 at 3:58 pm
Threat hunters have discovered a network of more than 1,000 compromised small office and home office (SOHO) devices that have been used to facilitate a prolonged cyber espionage infrastructure campaign for China-nexus hacking groups. The Operational Relay Box (ORB) network has been codenamed LapDogs by SecurityScorecard’s STRIKE team. “The LapDogs network has a high concentration of victims
- PUBLOAD and Pubshell Malware Used in Mustang Panda’s Tibet-Specific Attackby info@thehackernews.com (The Hacker News) on June 27, 2025 at 1:25 pm
A China-linked threat actor known as Mustang Panda has been attributed to a new cyber espionage campaign directed against the Tibetan community. The spear-phishing attacks leveraged topics related to Tibet, such as the 9th World Parliamentarians’ Convention on Tibet (WPCT), China’s education policy in the Tibet Autonomous Region (TAR), and a recently published book by the 14th Dalai Lama,
- Business Case for Agentic AI SOC Analystsby info@thehackernews.com (The Hacker News) on June 27, 2025 at 11:00 am
Security operations centers (SOCs) are under pressure from both sides: threats are growing more complex and frequent, while security budgets are no longer keeping pace. Today’s security leaders are expected to reduce risk and deliver results without relying on larger teams or increased spending. At the same time, SOC inefficiencies are draining resources. Studies show that up to half of all
- Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkitby info@thehackernews.com (The Hacker News) on June 27, 2025 at 10:25 am
A new campaign has been observed leveraging fake websites advertising popular software such as WPS Office, Sogou, and DeepSeek to deliver Sainbox RAT and the open-source Hidden rootkit. The activity has been attributed with medium confidence to a Chinese hacking group called Silver Fox (aka Void Arachne), citing similarities in tradecraft with previous campaigns attributed to the threat actor.
- MOVEit Transfer Faces Increased Threats as Scanning Surges and CVE Flaws Are Targetedby info@thehackernews.com (The Hacker News) on June 27, 2025 at 7:43 am
Threat intelligence firm GreyNoise is warning of a “notable surge” in scanning activity targeting Progress MOVEit Transfer systems starting May 27, 2025—suggesting that attackers may be preparing for another mass exploitation campaign or probing for unpatched systems.MOVEit Transfer is a popular managed file transfer solution used by businesses and government agencies to share sensitive data
- OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoorsby info@thehackernews.com (The Hacker News) on June 27, 2025 at 6:31 am
Cybersecurity researchers have detailed a new campaign dubbed OneClik that leverages Microsoft’s ClickOnce software deployment technology and bespoke Golang backdoors to compromise organizations within the energy, oil, and gas sectors. “The campaign exhibits characteristics aligned with Chinese-affiliated threat actors, though attribution remains cautious,” Trellix researchers Nico Paulo
- Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacksby info@thehackernews.com (The Hacker News) on June 26, 2025 at 4:46 pm
Cybersecurity researchers have disclosed a critical vulnerability in the Open VSX Registry (“open-vsx[.]org”) that, if successfully exploited, could have enabled attackers to take control of the entire Visual Studio Code extensions marketplace, posing a severe supply chain risk. “This vulnerability provides attackers full control over the entire extensions marketplace, and in turn, full control
- Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Accessby info@thehackernews.com (The Hacker News) on June 26, 2025 at 1:24 pm
Cisco has released updates to address two maximum-severity security flaws in Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) that could permit an unauthenticated attacker to execute arbitrary commands as the root user. The vulnerabilities, assigned the CVE identifiers CVE-2025-20281 and CVE-2025-20282, carry a CVSS score of 10.0 each. A description of the defects is
- New FileFix Method Emerges as a Threat Following 517% Rise in ClickFix Attacksby info@thehackernews.com (The Hacker News) on June 26, 2025 at 1:03 pm
The ClickFix social engineering tactic as an initial access vector using fake CAPTCHA verifications increased by 517% between the second half of 2024 and the first half of this year, according to data from ESET. “The list of threats that ClickFix attacks lead to is growing by the day, including infostealers, ransomware, remote access trojans, cryptominers, post-exploitation tools, and even
- The Hidden Risks of SaaS: Why Built-In Protections Aren’t Enough for Modern Data Resilienceby info@thehackernews.com (The Hacker News) on June 26, 2025 at 11:00 am
SaaS Adoption is Skyrocketing, Resilience Hasn’t Kept Pace SaaS platforms have revolutionized how businesses operate. They simplify collaboration, accelerate deployment, and reduce the overhead of managing infrastructure. But with their rise comes a subtle, dangerous assumption: that the convenience of SaaS extends to resilience. It doesn’t. These platforms weren’t built with full-scale data
- Iranian APT35 Hackers Targeting Israeli Tech Experts with AI-Powered Phishing Attacksby info@thehackernews.com (The Hacker News) on June 26, 2025 at 8:45 am
An Iranian state-sponsored hacking group associated with the Islamic Revolutionary Guard Corps (IRGC) has been linked to a spear-phishing campaign targeting journalists, high-profile cyber security experts, and computer science professors in Israel. “In some of those campaigns, Israeli technology and cyber security professionals were approached by attackers who posed as fictitious assistants to
- Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africaby info@thehackernews.com (The Hacker News) on June 26, 2025 at 7:19 am
Cybersecurity researchers are calling attention to a series of cyber attacks targeting financial organizations across Africa since at least July 2023 using a mix of open-source and publicly available tools to maintain access. Palo Alto Networks Unit 42 is tracking the activity under the moniker CL-CRI-1014, where “CL” refers to “cluster” and “CRI” stands for “criminal motivation.” It’s suspected
- CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinetby info@thehackernews.com (The Hacker News) on June 26, 2025 at 6:02 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added three security flaws, each impacting AMI MegaRAC, D-Link DIR-859 router, and Fortinet FortiOS, to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The list of vulnerabilities is as follows – CVE-2024-54085 (CVSS score: 10.0) – An authentication bypass by spoofing
- WhatsApp Adds AI-Powered Message Summaries for Faster Chat Previewsby info@thehackernews.com (The Hacker News) on June 26, 2025 at 4:36 am
Popular messaging platform WhatsApp has added a new artificial intelligence (AI)-powered feature that leverages its in-house solution Meta AI to summarize unread messages in chats. The feature, called Message Summaries, is currently rolling out in the English language to users in the United States, with plans to bring it to other regions and languages later this year. It “uses Meta AI to
- nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discoveryby info@thehackernews.com (The Hacker News) on June 25, 2025 at 4:56 pm
New research has uncovered continued risk from a known security weakness in Microsoft’s Entra ID, potentially enabling malicious actors to achieve account takeovers in susceptible software-as-a-service (SaaS) applications. Identity security company Semperis, in an analysis of 104 SaaS applications, found nine of them to be vulnerable to Entra ID cross-tenant nOAuth abuse. First disclosed by
- Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADCby info@thehackernews.com (The Hacker News) on June 25, 2025 at 2:51 pm
Citrix has released security updates to address a critical flaw affecting NetScaler ADC that it said has been exploited in the wild. The vulnerability, tracked as CVE-2025-6543, carries a CVSS score of 9.2 out of a maximum of 10.0. It has been described as a case of memory overflow that could result in unintended control flow and denial-of-service. However, successful exploitation requires the
- Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposureby info@thehackernews.com (The Hacker News) on June 25, 2025 at 1:37 pm
Cybersecurity researchers have detailed two now-patched security flaws in SAP Graphical User Interface (GUI) for Windows and Java that, if successfully exploited, could have enabled attackers to access sensitive information under certain conditions. The vulnerabilities, tracked as CVE-2025-0055 and CVE-2025-0056 (CVSS scores: 6.0), were patched by SAP as part of its monthly updates for January
- Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Gamesby info@thehackernews.com (The Hacker News) on June 25, 2025 at 11:00 am
Thousands of personal records allegedly linked to athletes and visitors of the Saudi Games have been published online by a pro-Iranian hacktivist group called Cyber Fattah. Cybersecurity company Resecurity said the breach was announced on Telegram on June 22, 2025, in the form of SQL database dumps, characterizing it as an information operation “carried out by Iran and its proxies.” “The actors
- Beware the Hidden Risk in Your Entra Environmentby info@thehackernews.com (The Hacker News) on June 25, 2025 at 10:30 am
If you invite guest users into your Entra ID tenant, you may be opening yourself up to a surprising risk. A gap in access control in Microsoft Entra’s subscription handling is allowing guest users to create and transfer subscriptions into the tenant they are invited into, while maintaining full ownership of them. All the guest user needs are the permissions to create subscriptions in
- SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacksby info@thehackernews.com (The Hacker News) on June 25, 2025 at 8:45 am
Unknown threat actors have been distributing a trojanized version of SonicWall’s SSL VPN NetExtender application to steal credentials from unsuspecting users who may have installed it. “NetExtender enables remote users to securely connect and run applications on the company network,” SonicWall researcher Sravan Ganachari said. “Users can upload and download files, access network drives, and use
- North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packagesby info@thehackernews.com (The Hacker News) on June 25, 2025 at 8:12 am
Cybersecurity researchers have uncovered a fresh batch of malicious npm packages linked to the ongoing Contagious Interview operation originating from North Korea. According to Socket, the ongoing supply chain attack involves 35 malicious packages that were uploaded from 24 npm accounts. These packages have been collectively downloaded over 4,000 times. The complete list of the JavaScript
- Microsoft Extends Windows 10 Security Updates for One Year with New Enrollment Optionsby info@thehackernews.com (The Hacker News) on June 25, 2025 at 5:10 am
Microsoft on Tuesday announced that it’s extending Windows 10 Extended Security Updates (ESU) for an extra year by letting users either pay a small fee of $30 or by sync their PC settings to the cloud. The development comes ahead of the tech giant’s upcoming October 14, 2025, deadline, when it plans to officially end support and stop providing security updates for devices running Windows 10. The
- New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Publicby info@thehackernews.com (The Hacker News) on June 24, 2025 at 6:47 pm
The United States Embassy in India has announced that applicants for F, M, and J nonimmigrant visas should make their social media accounts public. The new guideline seeks to help officials verify the identity and eligibility of applicants under U.S. law. The U.S. Embassy said every visa application review is a “national security decision.” “Effective immediately, all individuals applying for an
- Researchers Find Way to Shut Down Cryptominer Campaigns Using Bad Shares and XMRogueby info@thehackernews.com (The Hacker News) on June 24, 2025 at 2:17 pm
Cybersecurity researchers have detailed two novel methods that can be used to disrupt cryptocurrency mining botnets. The methods take advantage of the design of various common mining topologies in order to shut down the mining process, Akamai said in a new report published today. “We developed two techniques by leveraging the mining topologies and pool policies that enable us to reduce a
- Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggersby info@thehackernews.com (The Hacker News) on June 24, 2025 at 1:26 pm
Unidentified threat actors have been observed targeting publicly exposed Microsoft Exchange servers to inject malicious code into the login pages that harvest their credentials. Positive Technologies, in a new analysis published last week, said it identified two different kinds of keylogger code written in JavaScript on the Outlook login page – Those that save collected data to a local file