Iran-Linked MuddyWater Targets 100+ Organisations in Global Espionage Campaign on October 22, 2025 Posted by The Hacker News
Cybercriminals turn on each other: the story of Lumma Stealer’s collapse on October 22, 2025 Posted by Graham Cluley
Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files on October 22, 2025 Posted by The Hacker News
Posted in Hacking news New GobRAT Remote Access Trojan Targeting Linux Routers in Japan on May 29, 2023 The Hacker News
Posted in Hacking news Don’t Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims on May 29, 2023 The Hacker News
Posted in Hacking news PyPI Implements Mandatory Two-Factor Authentication for Project Owners on May 28, 2023 The Hacker News
Posted in Hacking news New Stealthy Bandit Stealer Targeting Web Browsers and Cryptocurrency Wallets on May 27, 2023 The Hacker News
Posted in Hacking news Critical OAuth Vulnerability in Expo Framework Allows Account Hijacking on May 27, 2023 The Hacker News
Posted in A Little Sunshine Phishing Domains Tanked After Meta Sued Freenom on May 26, 2023 BrianKrebs
Posted in Hacking news Severe Flaw in Google Cloud’s Cloud SQL Service Exposed Confidential Data on May 26, 2023 The Hacker News
Posted in Hacking news Predator Android Spyware: Researchers Sound the Alarm on Alarming Capabilities on May 26, 2023 The Hacker News
Posted in Hacking news 5 Must-Know Facts about 5G Network Security and Its Cloud Benefits on May 26, 2023 The Hacker News