Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access on May 15, 2026 Posted by The Hacker News
Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence on May 15, 2026 Posted by The Hacker News
What 45 Days of Watching Your Own Tools Will Tell You About Your Real Attack Surface on May 15, 2026 Posted by The Hacker News
Posted in Hacking news New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released on April 1, 2026 The Hacker News
Posted in Hacking news 3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming) on April 1, 2026 The Hacker News
Posted in Hacking news Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069 on April 1, 2026 The Hacker News
Posted in Hacking news Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms on March 31, 2026 The Hacker News
Posted in Hacking news Android Developer Verification Rollout Begins Ahead of September Enforcement on March 31, 2026 The Hacker News
Posted in Hacking news TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks on March 31, 2026 The Hacker News
Posted in Hacking news Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts on March 31, 2026 The Hacker News
Posted in Hacking news Silver Fox Expands Asia Cyber Campaign with AtlasCross RAT and Fake Domains on March 31, 2026 The Hacker News
Posted in Hacking news The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority on March 31, 2026March 31, 2026 The Hacker News
Posted in Hacking news Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account on March 30, 2026 The Hacker News