Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access on May 15, 2026 Posted by The Hacker News
Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence on May 15, 2026 Posted by The Hacker News
What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface on May 15, 2026 Posted by The Hacker News
Posted in Hacking news APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies on April 8, 2026 The Hacker News
Posted in Hacking news Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP) on April 8, 2026 The Hacker News
Posted in Hacking news Anthropic’s Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems on April 8, 2026 The Hacker News
Posted in Hacking news N. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust on April 8, 2026 The Hacker News
Posted in Hacking news Iran-Linked Hackers Disrupt U.S. Critical Infrastructure by Targeting Internet-Exposed PLCs on April 7, 2026 The Hacker News
Posted in Hacking news Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign on April 7, 2026 The Hacker News
Posted in Hacking news Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access on April 7, 2026 The Hacker News
Posted in Hacking news Over 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign on April 7, 2026 The Hacker News
Posted in Hacking news [Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk on April 7, 2026April 7, 2026 The Hacker News
Posted in Hacking news The Hidden Cost of Recurring Credential Incidents on April 7, 2026 The Hacker News