Android Developer Verification Rollout Begins Ahead of September Enforcement on March 31, 2026 Posted by The Hacker News
TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks on March 31, 2026 Posted by The Hacker News
Operation TrueChaos: 0-Day Exploitation Against Southeast Asian Government Targets on March 31, 2026 Posted by stcpresearch
Vertex AI Vulnerability Exposes Google Cloud Data and Private Artifacts on March 31, 2026 Posted by The Hacker News
Posted in Hacking news Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed on September 25, 2025 The Hacker News
Posted in Hacking news Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software on September 24, 2025 The Hacker News
Posted in Hacking news Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike on September 24, 2025 The Hacker News
Posted in Hacking news UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors on September 24, 2025 The Hacker News
Posted in Hacking news Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models on September 24, 2025 The Hacker News
Posted in Hacking news How One Bad Password Ended a 158-Year-Old Business on September 24, 2025 The Hacker News
Posted in Hacking news New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus on September 24, 2025 The Hacker News
Posted in Hacking news iframe Security Exposed: The Blind Spot Fueling Payment Skimmer Attacks on September 24, 2025 The Hacker News
Posted in Hacking news Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM Credentials on September 24, 2025 The Hacker News
Posted in Hacking news State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability on September 23, 2025 The Hacker News