ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories on April 9, 2026 Posted by The Hacker News
Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025 on April 9, 2026 Posted by The Hacker News
Posted in Hacking news Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers on February 27, 2025 The Hacker News
Posted in Hacking news Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites on February 26, 2025 The Hacker News
Posted in Hacking news Leaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles on February 26, 2025 The Hacker News
Posted in Hacking news SOC 3.0 – The Evolution of the SOC and How AI is Empowering Human Talent on February 26, 2025 The Hacker News
Posted in Hacking news New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems on February 26, 2025 The Hacker News
Posted in Hacking news Three Password Cracking Techniques and How to Defend Against Them on February 26, 2025 The Hacker News
Posted in Hacking news CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries on February 26, 2025 The Hacker News
Posted in Hacking news Malicious PyPI Package “automslc” Enables 104K+ Unauthorized Deezer Music Downloads on February 26, 2025 The Hacker News
Posted in Hacking news CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation on February 25, 2025 The Hacker News
Posted in Hacking news LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile on February 25, 2025 The Hacker News