New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora
May 31, 2025Ravie LakshmananVulnerability / Linux Two information disclosure flaws have been…
China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil
May 30, 2025Ravie LakshmananVulnerability / Threat Intelligence The China-linked threat actor behind…
New EDDIESTEALER Malware Bypasses Chrome’s App-Bound Encryption to Steal Browser Data
A new malware campaign is distributing a novel Rust-based information stealer dubbed…
ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach
May 30, 2025Ravie LakshmananVulnerability / Data Breach ConnectWise, the developer of remote…
Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools
Fake installers for popular artificial intelligence (AI) tools like OpenAI ChatGPT and…
DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints
The threat actors behind the DragonForce ransomware gained access to an unnamed…
Czech Republic Blames China-Linked APT31 Hackers for 2022 Cyberattack
May 28, 2025Ravie LakshmananCybersecurity / Cyber Espionage The Czech Republic on Wednesday…
Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore
May 28, 2025Ravie LakshmananRansomware / Data Breach An Iranian national has pleaded…
How ‘Browser-in-the-Middle’ Attacks Steal Sessions in Seconds
May 28, 2025The Hacker NewsBrowser Security / Credential Theft Would you expect…


