Five New Exploited Bugs Land in CISA’s Catalog — Oracle and Microsoft Among Targets on October 20, 2025 Posted by The Hacker News
⚡ Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More on October 20, 2025 Posted by The Hacker News
Analysing ClickFix: 3 Reasons Why Copy/Paste Attacks Are Driving Security Breaches on October 20, 2025 Posted by The Hacker News
Posted in Advanced Malware Researchers Developed Artificial Intelligence-Powered Stealthy Malware on August 9, 2018 The Hacker News
Posted in Apple Apple Transfers Chinese Users’ iCloud Data to State-Controlled Data Centers on July 18, 2018 The Hacker News
Posted in Bug Bounty Program Microsoft Offers $100,000 Bounty for Finding Bugs in Its Identity Services on July 18, 2018 The Hacker News
Posted in cyber security Free Thanatos Ransomware Decryption Tool Released on June 26, 2018 The Hacker News
Posted in Advanced Persistent Threat A New Paradigm For Cyber Threat Hunting on June 11, 2018 The Hacker News
Posted in botnet Hackers are exploiting a new zero-day flaw in GPON routers on May 23, 2018 The Hacker News
Posted in cyber security Chinese Hackers Find Over a Dozen Vulnerabilities in BMW Cars on May 23, 2018 The Hacker News
Posted in cyber security Critical Flaws in PGP and S/MIME Tools Can Reveal Encrypted Emails in Plaintext on May 14, 2018May 14, 2018 The Hacker News
Posted in Coinhive Microsoft Adds Support for JavaScript in Excel—What Could Possibly Go Wrong? on May 9, 2018 The Hacker News