Vulnerability Web Hosting1 Min Read May 9, 2026 cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now cPanel has released updates to address three vulnerabilities in cPanel and Web Host Manager (WHM) that could be exploited to achieve privilege escalation,…
3 Min Read May 8, 2026 TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms Threat hunters have flagged a previously undocumented Brazilian banking… Malware Threat Intelligence
4 Min Read May 8, 2026 Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads Cybersecurity researchers have discovered fraudulent apps on the… Android Mobile Security
2 Min Read May 8, 2026 One Click, Total Shutdown: The "Patient Zero" Webinar on Killing Stealth Breaches The hardest part of cybersecurity isn't the technology, it’s the… Artificial Intelligence Threat Detection
DevOps Linux2 Min Read May 8, 2026 Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise A previously undocumented Linux implant codenamed Quasar Linux RAT (QLNX) is targeting developers' systems to establish a silent foothold as…
AI Security Threat Detection5 Min Read May 8, 2026 One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk The dark secret of enterprise security operations is that defenders have quietly institutionalized the practice of not looking. This is not…
Malware Threat Intelligence2 Min Read May 8, 2026 New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials Cybersecurity researchers have disclosed details of a new Linux backdoor named PamDOORa that's being advertised on the Rehub Russian…
Linux Vulnerability3 Min Read May 8, 2026 Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions Details have emerged about a new, unpatched local privilege escalation (LPE) vulnerability impacting the Linux kernel. Dubbed Dirty Frag, it…
Network Security Vulnerability2 Min Read May 7, 2026 Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access Ivanti is warning that a new security flaw impacting Endpoint Manager Mobile (EPMM) has been explored in limited attacks in the wild. The…
Cloud Security Threat Intelligence3 Min Read May 7, 2026 PCPJack Credential Stealer Exploits 5 CVEs to Spread Worm-Like Across Cloud Systems Cybersecurity researchers have disclosed details of a new credential theft framework dubbed PCPJack that targets exposed cloud infrastructure…
Cyber Espionage Vulnerability2 Min Read May 7, 2026 PAN-OS RCE Exploit Under Active Use Enabling Root Access and Espionage Palo Alto Networks has disclosed that threat actors may have attempted to unsuccessfully exploit a recently disclosed critical security flaw…
Cybersecurity News Hacking News16 Min Read May 7, 2026 ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New Stories Bad week. Turns out the easiest way to get hacked in 2026 is still the same old garbage: shady packages, fake apps, forgotten DNS junk, scam…
Identity Management Incident Response11 Min Read May 7, 2026 Day Zero Readiness: The Operational Gaps That Break Incident Response Having an incident response retainer, or even a pre-approved external incident response firm, is not the same as being ready for an incident.…
Malware Threat Intelligence2 Min Read May 7, 2026 PyPI Packages Deliver ZiChatBot Malware via Zulip APIs on Windows and Linux Cybersecurity researchers have discovered three packages on the Python Package Index (PyPI) repository that are designed to stealthily deliver…
Software Security Vulnerability3 Min Read May 7, 2026 vm2 Node.js Library Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution A dozen critical security vulnerabilities have been disclosed in the vm2 Node.js library that could be exploited by bad actors to break out of…
IoT Security Malware3 Min Read May 6, 2026 Mirai-Based xlabs_v1 Botnet Exploits ADB to Hijack IoT Devices for DDoS Attacks Cybersecurity researchers have exposed a new Mirai-derived botnet that self-identifies as xlabs_v1 and targets internet-exposed devices…
Cybercrime Ransomware6 Min Read May 6, 2026 MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack The Iranian state-sponsored hacking group known as MuddyWater (aka Mango Sandstorm, Seedworm, and Static Kitten) has been attributed to a…
Industry Recognition Security Leadership3 Min Read May 6, 2026 The Hacker News Launches 'Cybersecurity Stars Awards 2026' — Submissions Now Open For nearly 20 years, we at The Hacker News have mostly told scary stories about cyberspace — big hacks, broken systems, and new threats.…
Compliance Data Security6 Min Read May 6, 2026 Your AI Agents Are Already Inside the Perimeter. Do You Know What They're Doing? Analysts recently confirmed what identity security teams have quietly feared: AI agents are being deployed faster than enterprises can govern…
Android Data Security3 Min Read May 6, 2026 Google's Android Apps Get Public Verification to Stop Supply Chain Attacks Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks. "This new public…
Endpoint Security Threat Intelligence3 Min Read May 6, 2026 Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs Cybersecurity researchers have disclosed details of an intrusion that involved the use of a CloudZ remote access tool (RAT) and a previous…
Network Security Vulnerability2 Min Read May 6, 2026 Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution Palo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in…
Server Security Vulnerability2 Min Read May 5, 2026 Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE The Apache Software Foundation (ASF) has released security updates to address several security vulnerabilities in the HTTP Server, including a…
Endpoint Security Software Security3 Min Read May 5, 2026 DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware A newly identified supply chain attack targeting DAEMON Tools software has compromised its installers to serve a malicious payload, according…
Endpoint Security Network Security3 Min Read May 5, 2026 China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions A sophisticated China-nexus advanced persistent threat (APT) group has been attributed to attacks targeting government entities in South…
Enterprise Security SaaS Security5 Min Read May 5, 2026 The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closed Every AI tool, workflow automation, and productivity app your employees connected to Google or Microsoft this year left something behind: a…
Network Security Vulnerability2 Min Read May 5, 2026 MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks Threat actors are actively exploiting a critical security flaw impacting an open-source content management system (CMS) known as MetInfo,…
API Security Artificial Intelligence4 Min Read May 5, 2026 We Scanned 1 Million Exposed AI Services. Here's How Bad the Security Actually Is While the software industry has made genuine strides over the past few decades to deliver products securely, the furious pace of AI adoption…
Cyber Espionage Surveillance3 Min Read May 5, 2026 ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows The North Korea-aligned state-sponsored hacking group known as ScarCruft has compromised a video game platform in a supply chain espionage…
Network Security Vulnerability2 Min Read May 5, 2026 Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come under…
Cloud Security Data Breach Malware Phishing4 Min Read May 5, 2026 Microsoft Details Phishing Campaign Targeting 35,000 Users Across 26 Countries Microsoft has disclosed details of a large-scale credential theft campaign that has leveraged a combination of code of conduct-themed lures…
Endpoint Security Network Security2 Min Read May 4, 2026 Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools An active phishing campaign has been observed targeting multiple vectors since at least April 2025 with legitimate Remote Monitoring and…
Enterprise Software Vulnerability1 Min Read May 4, 2026 Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass Progress Software has released updates to address two security flaws in MOVEit Automation, including a critical bug that could result in an…
Cybersecurity Hacking17 Min Read May 4, 2026 ⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE & More This week, the shadows moved faster than the patches. While most teams were still triaging last month’s alerts, attackers had already…
Artificial Intelligence Supply Chain Security5 Min Read May 4, 2026 2026: The Year of AI-Assisted Attacks On December 4, 2025, a 17-year-old was arrested in Osaka under Japan’s Unauthorized Access Prohibition Act. The young man had run…
Network Security Vulnerability2 Min Read May 4, 2026 Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks A previously unknown threat actor has been observed targeting government and military entities in Southeast Asia, alongside a smaller cluster…
Financial Crime Mobile Security7 Min Read May 4, 2026 Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M A coordinated international operation involving U.S. and Chinese authorities has arrested at least 276 suspects and shut down nine scam…
Container Security Vulnerability3 Min Read May 3, 2026 CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux…
Data Breach Enterprise Security1 Min Read May 2, 2026 Trellix Confirms Source Code Breach With Unauthorized Repository Access Cybersecurity company Trellix has announced that it suffered a breach that enabled unauthorized access to a "portion" of its source code. It…
Malware Threat Intelligence3 Min Read May 1, 2026 30,000 Facebook Accounts Hacked via Google AppSheet Phishing Campaign A newly discovered Vietnamese-linked operation has been observed using a Google AppSheet as a "phishing relay" to distribute phishing emails…
Malware Social Engineering2 Min Read May 1, 2026 Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks Cybersecurity researchers are warning of two cybercrime groups that are carrying out "rapid, high-impact attacks" operating almost within the…
Network Security Vulnerability4 Min Read May 1, 2026 China-Linked Hackers Target Asian Governments, NATO State, Journalists, and Activists Cybersecurity researchers have disclosed details of a new China-aligned espionage campaign targeting government and defense sectors across…
Compliance Data Protection5 Min Read May 1, 2026 Top Five Sales Challenges Costing MSPs Cybersecurity Revenue The managed security services market is projected to grow from $38.31 billion in 2025 to $69.16 billion by 2030[1], with cybersecurity being…
Data Breach Law Enforcement2 Min Read May 1, 2026 Two Cybersecurity Professionals Get 4-Year Sentences in BlackCat Ransomware Attacks The U.S. Department of Justice (DoJ) on Thursday announced the sentencing of two cybersecurity professionals to four years each in prison for…
Malware Supply Chain Attack2 Min Read May 1, 2026 Poisoned Ruby Gems and Go Modules Exploit CI Pipelines for Credential Theft A new software supply chain attack campaign has been observed using sleeper packages as a conduit to subsequently push malicious payloads that…
Malware Supply Chain Attack3 Min Read April 30, 2026 PyTorch Lightning and Intercom-client Hit in Supply Chain Attacks to Steal Credentials In yet another software supply chain attack, threat actors have managed to compromise the popular Python package Lightning to push two…