Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent Access on May 15, 2026 Posted by The Hacker News
Four OpenClaw Flaws Enable Data Theft, Privilege Escalation, and Persistence on May 15, 2026 Posted by The Hacker News
Posted in Hacking news Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets on March 10, 2026 The Hacker News
Posted in Hacking news FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials on March 10, 2026 The Hacker News
Posted in Hacking news KadNap Malware Infects 14,000+ Edge Devices to Power Stealth Proxy Botnet on March 10, 2026 The Hacker News
Posted in Hacking news New “LeakyLooker” Flaws in Google Looker Studio Could Enable Cross-Tenant SQL Queries on March 10, 2026 The Hacker News
Posted in Hacking news How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows on March 10, 2026March 10, 2026 The Hacker News
Posted in Hacking news The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction on March 10, 2026 The Hacker News
Posted in Hacking news APT28 Uses BEARDSHELL and COVENANT Malware to Spy on Ukrainian Military on March 10, 2026 The Hacker News
Posted in Hacking news Threat Actors Mass-Scan Salesforce Experience Cloud via Modified AuraInspector Tool on March 10, 2026 The Hacker News
Posted in Hacking news CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited on March 9, 2026 The Hacker News
Posted in Hacking news Malicious npm Package Posing as OpenClaw Installer Deploys RAT, Steals macOS Credentials on March 9, 2026 The Hacker News