CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief on October 4, 2025 Posted by The Hacker News
Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day on October 4, 2025 Posted by The Hacker News
Friday Squid Blogging: Squid Overfishing in the Southwest Atlantic on October 3, 2025 Posted by Bruce Schneier
Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer on October 3, 2025 Posted by The Hacker News
Posted in Hacking news GhostToken Flaw Could Let Attackers Hide Malicious Apps in Google Cloud Platform on April 21, 2023 The Hacker News
Posted in Hacking news 14 Kubernetes and Cloud Security Challenges and How to Solve Them on April 21, 2023 The Hacker News
Posted in Hacking news N.K. Hackers Employ Matryoshka Doll-Style Cascading Supply Chain Attack on 3CX on April 21, 2023 The Hacker News
Posted in Hacking news Cisco and VMware Release Security Updates to Patch Critical Flaws in their Products on April 20, 2023 The Hacker News
Posted in Hacking news Two Critical Flaws Found in Alibaba Cloud’s PostgreSQL Databases on April 20, 2023 The Hacker News
Posted in Hacking news Lazarus Group Adds Linux Malware to Arsenal in Operation Dream Job on April 20, 2023 The Hacker News
Posted in Hacking news Beyond Traditional Security: NDR’s Pivotal Role in Safeguarding OT Networks on April 20, 2023 The Hacker News
Posted in Hacking news Fortra Sheds Light on GoAnywhere MFT Zero-Day Exploit Used in Ransomware Attacks on April 20, 2023 The Hacker News
Posted in Hacking news ChatGPT’s Data Protection Blind Spots and How Security Teams Can Solve Them on April 20, 2023 The Hacker News
Posted in Hacking news Daggerfly Cyberattack Campaign Hits African Telecom Services Providers on April 20, 2023 The Hacker News