Aug 18, 2025Ravie LakshmananMalware / Enterprise Security The threat actors behind the Noodlophile malware are leveraging spear-phishing emails and updated […]
Category: Security
Lenovo’s Lena AI chatbot had weakness that let attackers hijack sessions
Lenovo’s customer service AI chatbot Lena was recently found to contain a critical vulnerability that could allow attackers to steal […]
Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware
Aug 18, 2025Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers have lifted the lid on the threat actors’ exploitation of a […]
⚡ Weekly Recap: NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More
Power doesn’t just disappear in one big breach. It slips away in the small stuff—a patch that’s missed, a setting […]
Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks
Cybersecurity researchers have discovered a malicious package in the Python Package Index (PyPI) repository that introduces malicious behavior through a […]
Wazuh for Regulatory Compliance
Aug 18, 2025The Hacker NewsData Breach / Regulatory Compliance Organizations handling various forms of sensitive data or personally identifiable information […]
How to Test an OpenAI Model Against Single-Turn Adversarial Attacks Using deepteam
In this tutorial, we’ll explore how to test an OpenAI model against single-turn adversarial attacks using deepteam. deepteam provides 10+ […]
ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure
Aug 16, 2025Ravie LakshmananAndroid / Malware Cybersecurity researchers have detailed the inner workings of an Android banking trojan called ERMAC […]
Russian Group EncryptHub Exploits MSC EvilTwin Vulnerability to Deploy Fickle Stealer Malware
Aug 16, 2025Ravie LakshmananMalware / Vulnerability The threat actor known as EncryptHub is continuing to exploit a now-patched security flaw […]
Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools
Aug 15, 2025Ravie LakshmananMalware / Open Source A Chinese-speaking advanced persistent threat (APT) actor has been observed targeting web infrastructure […]