Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale
Nov 18, 2025The Hacker NewsCloud Security / Compliance You've probably already moved…
Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability
Nov 18, 2025Ravie LakshmananBrowser Security / Vulnerability Google on Monday released security…
New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT
Nov 17, 2025Ravie Lakshmanan Cybersecurity researchers have discovered malware campaigns using the…
Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT
The threat actor known as Dragon Breath has been observed making use…
Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts
Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in…
Chinese Hackers Use Anthropic’s AI to Launch Automated Cyber Espionage Campaign
State-sponsored threat actors from China used artificial intelligence (AI) technology developed by…
Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets
The Iranian state-sponsored threat actor known as APT42 has been observed targeting…
RondoDox Exploits Unpatched XWiki Servers to Pull More Devices Into Its Botnet
Nov 15, 2025Ravie LakshmananMalware / Vulnerability The botnet malware known as RondoDox…
Five Plead Guilty in U.S. for Helping North Korean IT Workers Infiltrate 136 Companies
The U.S. Department of Justice (DoJ) on Friday announced that five individuals…


