The Hacker News Launches ‘Cybersecurity Stars Awards 2026’ — Submissions Now Open on May 6, 2026 Posted by The Hacker News
Your AI Agents Are Already Inside the Perimeter. Do You Know What They’re Doing? on May 6, 2026 Posted by The Hacker News
Google’s Android Apps Get Public Verification to Stop Supply Chain Attacks on May 6, 2026 Posted by The Hacker News
New Variant of UpdateAgent Malware Infects Mac Computers with Adware on February 3, 2022February 3, 2022 The Hacker News
New Wave of Cyber Attacks Target Palestine with Political Bait and Malware on February 3, 2022 The Hacker News
New Malware Used by SolarWinds Attackers Went Undetected for Years on February 2, 2022February 3, 2022 The Hacker News
Dozens of Security Flaws Discovered in UEFI Firmware Used by Several Vendors on February 2, 2022 The Hacker News
Hacker Group ‘Moses Staff’ Using New StrifeWater RAT in Ransomware Attacks on February 2, 2022February 4, 2022 The Hacker News
Critical Bug Found in WordPress Plugin for Elementor with Over a Million Installations on February 2, 2022 The Hacker News
SolarMarker Malware Uses Novel Techniques to Persist on Hacked Systems on February 1, 2022February 1, 2022 The Hacker News
Iranian Hackers Using New PowerShell Backdoor in Cyber Espionage Attacks on February 1, 2022 The Hacker News