Tag: hacker
-
The Canvas Hack Is a New Kind of Ransomware Debacle
Thousands of schools around the US were paralyzed on Thursday after education tech firm Instructure shut down access to its Canvas platform following a breach by hackers going by the name ShinyHunters. First seen on wired.com Jump to article: www.wired.com/story/canvas-hack-shinyhunters-ransomware-instructure/
-
ShinyHunters Defaces Canvas LMS Portal, Hundreds of Universities Affected
ShinyHunters hackers defaced the official Canvas LMS portal after breaching Instructure systems, disrupting university access worldwide. First seen on hackread.com Jump to article: hackread.com/shinyhunters-defaces-canvas-lms-portal-universities-affected/
-
Iranian government hackers using Chaos ransomware as cover, researchers say
First seen on therecord.media Jump to article: therecord.media/iran-government-hackers-use-chaos-ransomware-as-cover
-
Hackers Use Fake Claude AI Site to Infect Users With New Beagle Malware
Researchers have discovered a new malvertising campaign using a fake Claude AI website to plant a new, undocumented backdoor named Beagle on user devices. First seen on hackread.com Jump to article: hackread.com/hackers-fake-claude-ai-site-infect-beagle-malware/
-
Hackers deface school login pages after claiming another Instructure hack
The cybercrime group ShinyHunters claimed to have hacked Instructure again, defacing the login pages of several Instructure customer schools with an extortion message. First seen on techcrunch.com Jump to article: techcrunch.com/2026/05/07/hackers-deface-school-login-pages-after-claiming-another-instructure-hack/
-
Nation-state actors exploit Palo Alto PAN-OS zero-day for weeks
Palo Alto says hackers exploited PAN-OS zero-day CVE-2026-0300 for weeks, gaining root access to exposed firewalls and hiding traces. Palo Alto Networks warned that suspected state-sponsored hackers have been exploiting the critical PAN-OS zero-day CVE-2026-0300 for nearly a month. After exploiting the flaw, attackers deployed tunneling tools such as EarthWorm and ReverseSocks5, used stolen credentials…
-
Hackers hack victims hacked by other hackers
An unknown group of hackers is breaking into systems previously breached by the cybercrime group TeamPCP. Once inside, the hackers immediately kick out TeamPCP and remove its hacking tools from the victims’ systems. First seen on techcrunch.com Jump to article: techcrunch.com/2026/05/07/hackers-hack-victims-hacked-by-other-hackers/
-
Cryptohack Roundup: Bitcoin Core Reveals High-Severity Flaw
Also: TrustedVolumes, Wasabi Protocol and Ekubo Hacks. This week, Bitcoin Core revealed a memory safety flaw, hackers exploited TrustedVolumes, Wasabi Protocol and Ekubo, Bithumb suspension paused, sentencing in U.S. theft case, prosecutors seek 20-year sentence for Delio CEO and North Korea denied that it’s a thief. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/cryptohack-roundup-bitcoin-core-reveals-high-severity-flaw-a-31625
-
Palo Alto Networks warns state-linked cluster behind zero-day exploitation
A patch for the flaw, which hackers began targeting in early April, won’t be ready for another week. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/palo-alto-networks-state-linked-zero-day/819588/
-
VECT-Ransomware Wenn Hacker-Laien zur echten Gefahr werden
Ende 2025 tauchte mit VECT eine weitere Ransomware-Gruppe auf, die sich vorgenommen hat, das Geschäft der digitalen Erpressung zu demokratisieren. Durch eine Partnerschaft mit Breachforums, einem der größten Marktplätze für Cyberkriminalität, öffnete VECT seine Plattform für jeden registrierten Nutzer. Das rief Tausende potenzielle Angreifer praktisch über Nacht auf den Plan. Gleichzeitig sicherte sich die Gruppe…
-
Researcher Shows Edge Browser Stores Saved Passwords in Plaintext
Cybersecurity expert Tom Rønning finds Microsoft Edge loads all saved passwords into computer memory as cleartext, making them easy for hackers to steal. First seen on hackread.com Jump to article: hackread.com/edge-browser-stores-saved-plaintext-passwords/
-
One Click, Total Shutdown: The “Patient Zero” Webinar on Killing Stealth Breaches
The hardest part of cybersecurity isn’t the technology, it’s the people.Every major breach you’ve read about lately usually starts the same way: one employee, one clever email, and one “Patient Zero” infection.In 2026, hackers are using AI to make these “first clicks” nearly impossible to spot. If a single laptop gets compromised on your watch,…
-
Polish intelligence warns hackers attacked water treatment control systems
The agency did not publicly attribute the incidents to a specific group or country but said Poland faced intensified hostile cyber activity in 2024 and 2025, “with particular emphasis on the special services of the Russian Federation.” First seen on therecord.media Jump to article: therecord.media/polish-intelligence-warns-hackers-attacked-water-treatment
-
State-sponsored hackers likely behind zero-day attacks on Palo Alto firewalls
Palo Alto Networks believes the in-the-wild exploitation of a zero-day vulnerability (CVE-2026-0300) in its firewalls is likely the work of state-sponsored threat actors. A … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/05/07/state-sponsored-hackers-zero-day-attacks-palo-alto-firewalls/
-
Hackers Weaponize Claude AI in Attacks on Water and Drainage Utilities
Hackers have abused commercial Claude AI models to help compromise a Mexican water and drainage utility’s IT network and probe systems connected to critical infrastructure. The attackers used Claude as an operational “copilot” to discover industrial systems, build custom tools, and plan attacks against an internal SCADA/IIoT platform managing water and drainage processes. The investigation…
-
Palo Alto Networks firewall zero-day exploited for nearly a month
Palo Alto Networks warned customers that suspected state-sponsored hackers have been exploiting a critical-severity PAN-OS firewall zero-day vulnerability for nearly a month. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/pan-os-firewall-rce-zero-day-exploited-in-attacks-since-april-9/
-
Fake Claude AI Installers Used to Spread Malware in New Cyber Scam
Hackers are abusing fake Claude AI installer pages promoted through Google Ads to trick users into running malware in a campaign. The operation combines highly realistic install guides with a stealthy, multi”‘stage infection chain that abuses trusted Windows components, fileless execution, and advanced evasion techniques to stay under the radar. Victims who click these ads…
-
GRU: Russlands Militärgeheimdienst bildet Hacker an Eliteuni aus
Tags: hackerAn der renommierten Bauman-Universität in Moskau betreibt der GRU ein verdecktes Ausbildungsprogramm für Hacker und Spione. First seen on golem.de Jump to article: www.golem.de/news/gru-russlands-militaergeheimdienst-bildet-hacker-an-eliteuni-aus-2605-208410.html
-
Hackers Exploit Google Ads to Steal GoDaddy ManageWP Logins
Hackers are abusing Google Ads to steal GoDaddy ManageWP credentials by placing a look”‘alike phishing ad above the legitimate ManageWP result and proxying victims’ logins in real time via an adversary”‘in”‘the”‘middle (AiTM) setup. The attackers purchase a sponsored Google ads that imitates ManageWP branding and appears as the top result, while the legitimate domain is…
-
Palo Alto Networks: Hacker attackieren Firewalls über Zero-Day-Lücke
Angreifer kapern durch speziell gestaltete Datenpakete ganze Firewalls von Palo Alto Networks. Einen Patch dagegen gibt es frühestens ab dem 13. Mai. First seen on golem.de Jump to article: www.golem.de/news/palo-alto-networks-hacker-attackieren-firewalls-ueber-zero-day-luecke-2605-208405.html
-
Hackers abuse Google ads for GoDaddy ManageWP login phishing
A phishing campaign delivered through Google sponsored search results is targeting credentials for ManageWP, GoDaddy’s platform for managing fleets of WordPress websites. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hackers-abuse-google-ads-for-godaddy-managewp-login-phishing/
-
Google Fixes CVSS 10 Gemini CLI Vulnerability Enabling GitHub Issue-Based RCE
Tags: cvss, github, google, hacker, injection, rce, remote-code-execution, supply-chain, vulnerabilityGoogle patches a CVSS 10 Gemini CLI vulnerability that allowed hackers to use prompt injection and privilege escalation for a full supply chain compromise. First seen on hackread.com Jump to article: hackread.com/google-cvss-10-gemini-cli-vulnerability-github-rce/
-
AI evaluation startup Braintrust confirms breach, tells every customer to rotate sensitive keys
Braintrust, a startup that makes an “operating system for engineers building AI software,” notified customers that hackers broke into one of its Amazon cloud environments, and is asking customers to rotate their API keys. First seen on techcrunch.com Jump to article: techcrunch.com/2026/05/06/ai-evaluation-startup-braintrust-confirms-breach-tells-every-customer-to-rotate-sensitive-keys/
-
Hackers Hate AI Slop Even More Than You Do
It’s not just you. Scammers, hackers, and other cybercriminals are complaining about “AI shit” flooding platforms where they discuss cyberattacks and other illegal activity. First seen on wired.com Jump to article: www.wired.com/story/cybercriminals-are-complaining-about-ai-slop-flooding-their-forums/
-
Attacks Abuse Windows Phone Link to Steal Texts & Bypass 2FA
In hard-to-detect attacks, hackers are dropping the CloudZ RAT and a fresh plugin, Pheno, to hijack the Windows-based bridge between PCs and smartphones. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/attacks-abuse-windows-phone-link-texts-bypass-2fa
-
Hackers compromise Daemon Tools in global supply-chain attack, researchers say
Researchers at Kaspersky said attackers tampered with installers for Daemon Tools, a popular program used to mount disk images as virtual drives, and distributed them through the software’s official website. First seen on therecord.media Jump to article: therecord.media/hackers-compromise-daemon-tools-global-supply-chain-attack
-
The Hacker News Launches ‘Cybersecurity Stars Awards 2026’, Submissions Now Open
For nearly 20 years, we at The Hacker News have mostly told scary stories about cyberspace, big hacks, broken systems, and new threats.But behind every headline, there’s a quieter, better story.It’s the story of leaders making tough calls under pressure, teams building smarter defenses, and security products that keep hunting threats 24/7, even when it’s…
-
World Passkey Day 2026 : Warum Passkeys zur wichtigen Waffe gegen KI-Hacker werden
Mit der zunehmenden Integration autonomer KI-Agenten verändert sich auch die Identitätssicherheit grundlegend. Unternehmen benötigen künftig eine Governance-Struktur mit KI-Agenten Verwaltung First seen on infopoint-security.de Jump to article: www.infopoint-security.de/world-passkey-day-2026-warum-passkeys-zur-wichtigen-waffe-gegen-ki-hacker-werden/a45002/
-
Iran-Linked Hackers Target Oman Ministries in Webshell and Data Theft Campaign
Iran-linked operators have mounted a broad espionage operation against multiple Omani ministries, abusing exposed webshells, SQL escalation scripts, and a poorly secured C2 server to steal judicial and identity data at scale. Attacker’s own open directory strongly suggests a Ministry of Intelligence and Security (MOIS) nexus compromised a mailbox , but there are not enough unique…

