Tag: hacker
-
Don’t get distracted by AI, focus on real cyber threats
While hackers are using artificial intelligence to optimise attacks, many of the most damaging breaches still rely on old-school methods, says a top security analyst from Google First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366634363/Google-Dont-get-distracted-by-AI-focus-on-real-cyber-threats
-
Russian hacker to plead guilty to aiding Yanluowang ransomware group
Court documents show evidence proving Volkov served as an initial access broker for the ransomware gang, breaking into the network of victims and then offering his access for a percentage of the ransom. First seen on therecord.media Jump to article: therecord.media/russian-hacker-to-plead-guilty-aiding-ransomware-group
-
Russian hacker to plead guilty to aiding Yanluowang ransomware group
Court documents show evidence proving Volkov served as an initial access broker for the ransomware gang, breaking into the network of victims and then offering his access for a percentage of the ransom. First seen on therecord.media Jump to article: therecord.media/russian-hacker-to-plead-guilty-aiding-ransomware-group
-
Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature
Google’s Mandiant Threat Defense on Monday said it discovered n-day exploitation of a now-patched security flaw in Gladinet’s Triofox file-sharing and remote access platform.The critical vulnerability, tracked as CVE-2025-12480 (CVSS score: 9.1), allows an attacker to bypass authentication and access the configuration pages, resulting in the upload and execution of arbitrary payloads. The First seen…
-
Konni Hackers Turn Google’s Find Hub into a Remote Data-Wiping Weapon
The North Korea-affiliated threat actor known as Konni (aka Earth Imp, Opal Sleet, Osmium, TA406, and Vedalia) has been attributed to a new set of attacks targeting both Android and Windows devices for data theft and remote control.”Attackers impersonated psychological counselors and North Korean human rights activists, distributing malware disguised as stress-relief programs,” the Genians…
-
Cisco detects new attack variant targeting vulnerable firewalls
Hackers may be able to overload unpatched devices, the company said. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisco-firewall-attack-variant-arcanedoor/805116/
-
Cisco detects new attack variant targeting vulnerable firewalls
Hackers may be able to overload unpatched devices, the company said. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisco-firewall-attack-variant-arcanedoor/805116/
-
Chef schreibt dir auf Teams? Könnte ein Hacker sein so tricksten Angreifer Unternehmen aus
Tags: hackerFirst seen on t3n.de Jump to article: t3n.de/news/microsoft-teams-hacker-fake-chef-angriff-1715232/
-
Monsta FTP Vulnerability Exposed Thousands of Servers to Full Takeover
Monsta FTP users must update now! A critical pre-authentication flaw (CVE-2025-34299) allows hackers to fully take over web servers. Patch to version 2.11.3 immediately. First seen on hackread.com Jump to article: hackread.com/monsta-ftp-flaw-web-servers-open-server-takeover/
-
Monsta FTP Vulnerability Exposed Thousands of Servers to Full Takeover
Monsta FTP users must update now! A critical pre-authentication flaw (CVE-2025-34299) allows hackers to fully take over web servers. Patch to version 2.11.3 immediately. First seen on hackread.com Jump to article: hackread.com/monsta-ftp-flaw-web-servers-open-server-takeover/
-
Hackers Exploit Websites to Inject Malicious Links for SEO Manipulation
A surge in online casino spam is reshaping the dark corners of the internet, with threat actors increasingly hacking websites to embed malicious SEO-boosting links. This evolving tactic aims to promote online gambling sites by hijacking the authority of legitimate websites putting site owners and unsuspecting users alike at risk. Historically, blackhat SEO spam campaigns…
-
Hackers Exploit Websites to Inject Malicious Links for SEO Manipulation
A surge in online casino spam is reshaping the dark corners of the internet, with threat actors increasingly hacking websites to embed malicious SEO-boosting links. This evolving tactic aims to promote online gambling sites by hijacking the authority of legitimate websites putting site owners and unsuspecting users alike at risk. Historically, blackhat SEO spam campaigns…
-
Hackers Abuse runc Tool to Escape Containers and Compromise Hosts
Three critical vulnerabilities in runc, the widely-used container runtime that powers Docker and Kubernetes, have been disclosed, allowing attackers to break out of container isolation and gain root access to host systems. The flaws, identified as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881, were revealed by a SUSE researcher on November 5, 2025. CVE ID Affected Versions Fixed…
-
Hackers Abuse runc Tool to Escape Containers and Compromise Hosts
Three critical vulnerabilities in runc, the widely-used container runtime that powers Docker and Kubernetes, have been disclosed, allowing attackers to break out of container isolation and gain root access to host systems. The flaws, identified as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881, were revealed by a SUSE researcher on November 5, 2025. CVE ID Affected Versions Fixed…
-
Hackers Abuse runc Tool to Escape Containers and Compromise Hosts
Three critical vulnerabilities in runc, the widely-used container runtime that powers Docker and Kubernetes, have been disclosed, allowing attackers to break out of container isolation and gain root access to host systems. The flaws, identified as CVE-2025-31133, CVE-2025-52565, and CVE-2025-52881, were revealed by a SUSE researcher on November 5, 2025. CVE ID Affected Versions Fixed…
-
Nikkei data breach exposes personal data of over 17,000 staff
Hackers used stolen login details from an employee’s computer to access the Japanese media giant’s Slack messaging platform, with names, e-mail addresses, and chat histories potentially exposed First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366634243/Nikkei-data-breach-exposes-personal-data-of-over-17000-staff
-
Dangerous runC flaws could allow hackers to escape Docker containers
Three newly disclosed vulnerabilities in the runC container runtime used in Docker and Kubernetes could be exploited to bypass isolation restrictions and get access to the host system. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/dangerous-runc-flaws-could-allow-hackers-to-escape-docker-containers/
-
Security Affairs newsletter Round 549 by Pierluigi Paganini INTERNATIONAL EDITION
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best security articles from Security Affairs are free in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. China-linked hackers target U.S. non-profit in long-term espionage campaign A new Italian citizen was targeted with…
-
China-linked hackers target U.S. non-profit in long-term espionage campaign
A China-linked group targeted a U.S. non-profit to gain long-term access, part of wider attacks on U.S. entities tied to policy matters. China-linked hackers breached a U.S. policy-focused nonprofit in April 2025, maintaining weeks of access. They used DLL sideloading via vetysafe.exe, a tactic used by other Chinese APT groups like Space Pirates, Kelp, and…
-
Samsung Zero-Day Flaw Exploited by ‘Landfall’ Spyware
Spyware Targets Samsung Galaxy Devices, Says Unit 42. Hackers used previously unknown commercial spyware dubbed Landfall to surveil the activities of Samsung Galaxy device owners in the Middle East, say security researchers who posit the threat actor has connections to the United Arab Emirates. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/samsung-zero-day-flaw-exploited-by-landfall-spyware-a-29963
-
Cisco Warns of Active Exploitation of ASA and FTD 0-Day Vulnerability
Cisco warns that hackers are actively exploiting a 0-day flaw in its firewall software, putting unpatched systems at risk of full compromise. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/cisco-warns-of-active-exploitation-of-asa-and-ftd-0-day-vulnerability/
-
From Log4j to IIS, China’s Hackers Turn Legacy Bugs into Global Espionage Tools
A China-linked threat actor has been attributed to a cyber attack targeting an U.S. non-profit organization with an aim to establish long-term persistence, as part of broader activity aimed at U.S. entities that are linked to or involved in policy issues.The organization, according to a report from Broadcom’s Symantec and Carbon Black teams, is “active…
-
Google Warns of AI-Driven Threat Escalation in 2026
Google’s 2026 forecast warns that AI has become both the hacker’s greatest weapon and cybersecurity’s most vital defense. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/google-warns-of-ai-driven-threat-escalation-in-2026/
-
Google Warns of AI-Driven Threat Escalation in 2026
Google’s 2026 forecast warns that AI has become both the hacker’s greatest weapon and cybersecurity’s most vital defense. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/google-warns-of-ai-driven-threat-escalation-in-2026/
-
What is Domain Hijacking? Everything to Know About Domain Hijacking Attacks
What is Domain Hijacking? Domain hijacking, also referred to as domain theft, refers to the act where the registrant of a domain name has their domain name taken over without their permission. This happens when a hacker somehow gets into the account of the owner of a particular domain and then proceeds to change theRead…
-
What is Domain Hijacking? Everything to Know About Domain Hijacking Attacks
What is Domain Hijacking? Domain hijacking, also referred to as domain theft, refers to the act where the registrant of a domain name has their domain name taken over without their permission. This happens when a hacker somehow gets into the account of the owner of a particular domain and then proceeds to change theRead…

