5 Identity Threat Detection & Response Must-Haves for Super SaaS Security
Mar 19, 2025The Hacker NewsSaaS Security / Threat Detection Identity-based attacks are…
Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017
Mar 18, 2025Ravie LakshmananVulnerability / Windows Security An unpatched security flaw impacting…
New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors
Mar 18, 2025Ravie LakshmananAI Security / Software Security Cybersecurity researchers have disclosed…
A Stealthy RAT Targeting Credentials and Crypto Wallets
Microsoft is calling attention to a novel remote access trojan (RAT) named…
Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure
Mar 17, 2025Ravie LakshmananVulnerability / Web Security A recently disclosed security flaw…
Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year
Mar 17, 2025Ravie LakshmananBotnet / Vulnerability An unpatched security flaw impacting the…
OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection
Mar 14, 2025Ravie LakshmananThreat Intelligence / Malware A new malware campaign has…
New MassJacker Malware Targets Piracy Users, Hijacking Cryptocurrency Transactions
Mar 14, 2025Ravie LakshmananSoftware Security / Cybercrime Users searching for pirated software…
Why Most Microsegmentation Projects Fail—And How Andelyn Biosciences Got It Right
Most microsegmentation projects fail before they even get off the ground—too complex,…


