MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack on May 6, 2026 Posted by The Hacker News
The Hacker News Launches ‘Cybersecurity Stars Awards 2026’ — Submissions Now Open on May 6, 2026 Posted by The Hacker News
Your AI Agents Are Already Inside the Perimeter. Do You Know What They’re Doing? on May 6, 2026 Posted by The Hacker News
Iranian Hackers Using New PowerShell Backdoor in Cyber Espionage Attacks on February 1, 2022 The Hacker News
Ukraine Continues to Face Cyber Espionage Attacks from Russian Hackers on February 1, 2022 The Hacker News
Researchers Uncover New Iranian Hacking Campaign Targeting Turkish Users on February 1, 2022February 1, 2022 The Hacker News
New SureMDM Vulnerabilities Could Expose Companies to Supply Chain Attacks on February 1, 2022February 1, 2022 The Hacker News
Behind The Buzzword: Four Ways to Assess Your Zero Trust Security Posture on January 31, 2022February 2, 2022 The Hacker News
New Samba Bug Allows Remote Attackers to Execute Arbitrary Code as Root on January 31, 2022February 1, 2022 The Hacker News
Your Graphics Card Fingerprint Can Be Used to Track Your Activities Across the Web on January 31, 2022February 4, 2022 The Hacker News
German Court Rules Websites Embedding Google Fonts Violates GDPR on January 31, 2022February 1, 2022 The Hacker News
Researchers Use Natural Silk Fibers to Generate Secure Keys for Strong Authentication on January 31, 2022January 31, 2022 The Hacker News