CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief on October 4, 2025 Posted by The Hacker News
Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day on October 4, 2025 Posted by The Hacker News
Friday Squid Blogging: Squid Overfishing in the Southwest Atlantic on October 3, 2025 Posted by Bruce Schneier
Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer on October 3, 2025 Posted by The Hacker News
Posted in Hacking news 3CX Desktop App Targeted in Supply Chain Cyber Attack, Affecting Millions of Users on March 29, 2023 The Hacker News
Posted in Hacking news Spyware Vendors Caught Exploiting Zero-Day Vulnerabilities on Android and iOS Devices on March 29, 2023 The Hacker News
Posted in Hacking news Mélofée: Researchers Uncover New Linux Malware Linked to Chinese APT Groups on March 29, 2023 The Hacker News
Posted in Hacking news Smart Mobility has a Blindspot When it Comes to API Security on March 29, 2023 The Hacker News
Posted in Hacking news Smart Mobility has a Blindspot When it Comes to API Security on March 29, 2023 The Hacker News
Posted in Hacking news How to Build a Research Lab for Reverse Engineering — 4 Ways on March 29, 2023 The Hacker News
Posted in Hacking news Trojanized TOR Browser Installers Spreading Crypto-Stealing Clipper Malware on March 29, 2023 The Hacker News
Posted in Hacking news North Korean APT43 Group Uses Cybercrime to Fund Espionage Operations on March 28, 2023 The Hacker News
Posted in Hacking news Microsoft Introduces GPT-4 AI-Powered Security Copilot Tool to Empower Defenders on March 28, 2023 The Hacker News
Posted in Hacking news Pakistan-Origin SideCopy Linked to New Cyberattack on India’s Ministry of Defence on March 28, 2023 The Hacker News