The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to admin@thehackernews.com
- Step Into the Password Graveyard… If You Dare (and Join the Live Session)by info@thehackernews.com (The Hacker News) on October 8, 2025 at 11:35 am
Every year, weak passwords lead to millions in losses — and many of those breaches could have been stopped. Attackers don’t need advanced tools; they just need one careless login. For IT teams, that means endless resets, compliance struggles, and sleepless nights worrying about the next credential leak. This Halloween, The Hacker News and Specops Software invite you to a live webinar: “
- Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Nowby info@thehackernews.com (The Hacker News) on October 8, 2025 at 10:58 am
Cybersecurity researchers have disclosed details of a now-patched vulnerability in the popular figma-developer-mcp Model Context Protocol (MCP) server that could allow attackers to achieve code execution. The vulnerability, tracked as CVE-2025-53967 (CVSS score: 7.5), is a command injection bug stemming from the unsanitized use of user input, opening the door to a scenario where an attacker can
- No Time to Waste: Embedding AI to Cut Noise and Reduce Riskby info@thehackernews.com (The Hacker News) on October 8, 2025 at 8:57 am
Artificial intelligence is reshaping cybersecurity on both sides of the battlefield. Cybercriminals are using AI-powered tools to accelerate and automate attacks at a scale defenders have never faced before. Security teams are overwhelmed by an explosion of vulnerability data, tool outputs, and alerts, all while operating with finite human resources. The irony is that while AI has become a
- OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacksby info@thehackernews.com (The Hacker News) on October 8, 2025 at 7:16 am
OpenAI on Tuesday said it disrupted three activity clusters for misusing its ChatGPT artificial intelligence (AI) tool to facilitate malware development. This includes a Russian‑language threat actor, who is said to have used the chatbot to help develop and refine a remote access trojan (RAT), a credential stealer with an aim to evade detection. The operator also used several ChatGPT accounts to
- BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekersby info@thehackernews.com (The Hacker News) on October 7, 2025 at 5:04 pm
A Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering tactics to deceive job seekers and digital marketing professionals to deliver a previously undocumented malware called Vampire Bot. “The attackers pose as recruiters, distributing malicious files disguised as job descriptions and corporate documents,” Aryaka Threat Research Labs
- Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Themby info@thehackernews.com (The Hacker News) on October 7, 2025 at 3:18 pm
Google’s DeepMind division on Monday announced an artificial intelligence (AI)-powered agent called CodeMender that automatically detects, patches, and rewrites vulnerable code to prevent future exploits. The efforts add to the company’s ongoing efforts to improve AI-powered vulnerability discovery, such as Big Sleep and OSS-Fuzz. DeepMind said the AI agent is designed to be both reactive and
- New Research: AI Is Already the #1 Data Exfiltration Channel in the Enterpriseby info@thehackernews.com (The Hacker News) on October 7, 2025 at 11:00 am
For years, security leaders have treated artificial intelligence as an “emerging” technology, something to keep an eye on but not yet mission-critical. A new Enterprise AI and SaaS Data Security Report by AI & Browser Security company LayerX proves just how outdated that mindset has become. Far from a future concern, AI is already the single largest uncontrolled channel for corporate data
- XWorm 6.0 Returns with 35+ Plugins and Enhanced Data Theft Capabilitiesby info@thehackernews.com (The Hacker News) on October 7, 2025 at 10:36 am
Cybersecurity researchers have charted the evolution of XWorm malware, turning it into a versatile tool for supporting a wide range of malicious actions on compromised hosts. “XWorm’s modular design is built around a core client and an array of specialized components known as plugins,” Trellix researchers Niranjan Hegde and Sijo Jacob said in an analysis published last week. “These plugins are
- 13-Year-Old Redis Flaw Exposed: CVSS 10.0 Vulnerability Lets Attackers Run Code Remotelyby info@thehackernews.com (The Hacker News) on October 7, 2025 at 8:33 am
Redis has disclosed details of a maximum-severity security flaw in its in-memory database software that could result in remote code execution under certain circumstances. The vulnerability, tracked as CVE-2025-49844 (aka RediShell), has been assigned a CVSS score of 10.0. “An authenticated user may use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free,
- Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomwareby info@thehackernews.com (The Hacker News) on October 7, 2025 at 8:15 am
Microsoft on Monday attributed a threat actor it tracks as Storm-1175 to the exploitation of a critical security flaw in Fortra GoAnywhere software to facilitate the deployment of Medusa ransomware. The vulnerability is CVE-2025-10035 (CVSS score: 10.0), a critical deserialization bug that could result in command injection without authentication. It was addressed in version 7.8.4, or the Sustain
- Oracle EBS Under Fire as Cl0p Exploits CVE-2025-61882 in Real-World Attacksby info@thehackernews.com (The Hacker News) on October 7, 2025 at 5:12 am
CrowdStrike on Monday said it’s attributing the exploitation of a recently disclosed security flaw in Oracle E-Business Suite with moderate confidence to a threat actor it tracks as Graceful Spider (aka Cl0p), and that the first known exploitation occurred on August 9, 2025. The malicious activity involves the exploitation of CVE-2025-61882 (CVSS score: 9.8), a critical vulnerability that
- New Report Links Research Firms BIETA and CIII to China’s MSS Cyber Operationsby info@thehackernews.com (The Hacker News) on October 6, 2025 at 2:00 pm
A Chinese company named the Beijing Institute of Electronics Technology and Application (BIETA) has been assessed to be likely led by the Ministry of State Security (MSS). The assessment comes from evidence that at least four BIETA personnel have clear or possible links to MSS officers and their relationship with the University of International Relations, which is known to share links with the
- 5 Critical Questions For Adopting an AI Security Solutionby info@thehackernews.com (The Hacker News) on October 6, 2025 at 11:38 am
In the era of rapidly advancing artificial intelligence (AI) and cloud technologies, organizations are increasingly implementing security measures to protect sensitive data and ensure regulatory compliance. Among these measures, AI-SPM (AI Security Posture Management) solutions have gained traction to secure AI pipelines, sensitive data assets, and the overall AI ecosystem. These solutions help
- ⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & Moreby info@thehackernews.com (The Hacker News) on October 6, 2025 at 11:38 am
The cyber world never hits pause, and staying alert matters more than ever. Every week brings new tricks, smarter attacks, and fresh lessons from the field. This recap cuts through the noise to share what really matters—key trends, warning signs, and stories shaping today’s security landscape. Whether you’re defending systems or just keeping up, these highlights help you spot what’s coming
- Oracle Rushes Patch for CVE-2025-61882 After Cl0p Exploited It in Data Theft Attacksby info@thehackernews.com (The Hacker News) on October 6, 2025 at 11:37 am
Oracle has released an emergency update to address a critical security flaw in its E-Business Suite software that it said has been exploited in the recent wave of Cl0p data theft attacks. The vulnerability, tracked as CVE-2025-61882 (CVSS score: 9.8), concerns an unspecified bug that could allow an unauthenticated attacker with network access via HTTP to compromise and take control of the Oracle
- Chinese Cybercrime Group Runs Global SEO Fraud Ring Using Compromised IIS Serversby info@thehackernews.com (The Hacker News) on October 6, 2025 at 11:36 am
Cybersecurity researchers have shed light on a Chinese-speaking cybercrime group codenamed UAT-8099 that has been attributed to search engine optimization (SEO) fraud and theft of high-value credentials, configuration files, and certificate data. The attacks are designed to target Microsoft Internet Information Services (IIS) servers, with most of the infections reported in India, Thailand
- Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Filesby info@thehackernews.com (The Hacker News) on October 6, 2025 at 6:01 am
A now patched security vulnerability in Zimbra Collaboration was exploited as a zero-day earlier this year in cyber attacks targeting the Brazilian military. Tracked as CVE-2025-27915 (CVSS score: 5.4), the vulnerability is a stored cross-site scripting (XSS) vulnerability in the Classic Web Client that arises as a result of insufficient sanitization of HTML content in ICS calendar files,
- CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thiefby info@thehackernews.com (The Hacker News) on October 4, 2025 at 2:37 pm
Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity’s agentic AI browser Comet by embedding malicious prompts within a seemingly innocuous link to siphon sensitive data, including from connected services, like email and calendar. The sneaky prompt injection attack plays out in the form of a malicious link that, when clicked, triggers the
- Scanning Activity on Palo Alto Networks Portals Jump 500% in One Dayby info@thehackernews.com (The Hacker News) on October 4, 2025 at 10:39 am
Threat intelligence firm GreyNoise disclosed on Friday that it has observed a massive spike in scanning activity targeting Palo Alto Networks login portals. The company said it observed a nearly 500% increase in IP addresses scanning Palo Alto Networks login portals on October 3, 2025, the highest level recorded in the last three months. It described the traffic as targeted and structured, and
- Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealerby info@thehackernews.com (The Hacker News) on October 3, 2025 at 6:11 pm
A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer. That’s according to findings from Infoblox, which found the threat actor to maintain control of domains hosting the first stage of the stealer, a backdoor called StarFish. The DNS threat intelligence firm said it has been tracking Detour Dog since August 2023, when
- Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloadsby info@thehackernews.com (The Hacker News) on October 3, 2025 at 3:58 pm
The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their website, even as the flagship information stealer has been updated to support the ability to collect device and web browser fingerprints, among others. “Rhadamanthys was initially promoted through posts on cybercrime forums, but soon it became clear that the author had a
- Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTELby info@thehackernews.com (The Hacker News) on October 3, 2025 at 12:02 pm
Brazilian users have emerged as the target of a new self-propagating malware dubbed SORVEPOTEL that spreads via the popular messaging app WhatsApp. The campaign, codenamed Water Saci by Trend Micro, weaponizes the trust with the platform to extend its reach across Windows systems, adding the attack is “engineered for speed and propagation” rather than data theft or ransomware. “SORVEPOTEL has
- Product Walkthrough: How Passwork 7 Addresses Complexity of Enterprise Securityby info@thehackernews.com (The Hacker News) on October 3, 2025 at 11:30 am
Passwork is positioned as an on-premises unified platform for both password and secrets management, aiming to address the increasing complexity of credential storage and sharing in modern organizations. The platform recently received a major update that reworks all the core mechanics. Passwork 7 introduces significant changes to how credentials are organized, accessed, and managed, reflecting
- New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRATby info@thehackernews.com (The Hacker News) on October 3, 2025 at 10:30 am
A threat actor that’s known to share overlaps with a hacking group called YoroTrooper has been observed targeting the Russian public sector with malware families such as FoalShell and StallionRAT. Cybersecurity vendor BI.ZONE is tracking the activity under the moniker Cavalry Werewolf. It’s also assessed to have commonalities with clusters tracked as SturgeonPhisher, Silent Lynx, Comrade Saiga,
- CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wildby info@thehackernews.com (The Hacker News) on October 3, 2025 at 8:23 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Smartbedded Meteobridge to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, CVE-2025-4008 (CVSS score: 8.7), is a case of command injection in the Meteobridge web interface that could result in code execution. “