Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity on September 11, 2025 Posted by The Hacker News
Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence on September 11, 2025 Posted by The Hacker News
SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers on September 11, 2025 Posted by The Hacker News
Posted in Hacking news Over a Dozen Malicious npm Packages Target Roblox Game Developers on August 22, 2023 The Hacker News
Posted in Hacking news CISOs Tout SaaS Cybersecurity Confidence, But 79% Admit to SaaS Incidents, New Report Finds on August 22, 2023 The Hacker News
Posted in Hacking news Carderbee Attacks: Hong Kong Organizations Targeted via Malicious Software Updates on August 22, 2023 The Hacker News
Posted in Hacking news New Variant of XLoader macOS Malware Disguised as ‘OfficeNote’ Productivity App on August 22, 2023 The Hacker News
Posted in Hacking news Ivanti Warns of Critical Zero-Day Flaw Being Actively Exploited in Sentry Software on August 21, 2023 The Hacker News
Posted in Hacking news Critical Adobe ColdFusion Flaw Added to CISA’s Exploited Vulnerability Catalog on August 21, 2023 The Hacker News
Posted in Hacking news New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC on August 21, 2023 The Hacker News
Posted in Hacking news How to Investigate an OAuth Grant for Suspicious Activity or Overly Permissive Scopes on August 21, 2023 The Hacker News
Posted in Hacking news This Malware Turned Thousands of Hacked Windows and macOS PCs into Proxy Servers on August 21, 2023 The Hacker News
Posted in Hacking news HiatusRAT Malware Resurfaces: Taiwan Firms and U.S. Military Under Attack on August 20, 2023 The Hacker News