UAT-10362 Targets Taiwanese NGOs with LucidRook Malware in Spear-Phishing Campaigns on April 9, 2026 Posted by The Hacker News
ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories on April 9, 2026 Posted by The Hacker News
Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025 on April 9, 2026 Posted by The Hacker News
Posted in Hacking news Webinar: How to Stop Python Supply Chain Attacks—and the Expert Tools You Need on August 7, 2025August 7, 2025 The Hacker News
Posted in Hacking news Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft on August 6, 2025 The Hacker News
Posted in Hacking news Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams on August 6, 2025 The Hacker News
Posted in Hacking news AI Slashes Workloads for vCISOs by 68% as SMBs Demand More – New Report Reveals on August 6, 2025 The Hacker News
Posted in Hacking news Microsoft Launches Project Ire to Autonomously Classify Malware Using AI Tools on August 6, 2025 The Hacker News
Posted in Hacking news Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems on August 6, 2025 The Hacker News
Posted in Hacking news CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures on August 6, 2025 The Hacker News
Posted in Hacking news AI Is Transforming Cybersecurity Adversarial Testing – Pentera Founder’s Vision on August 5, 2025 The Hacker News
Posted in Hacking news CISA Adds 3 D-Link Router Flaws to KEV Catalog After Active Exploitation Reports on August 5, 2025 The Hacker News
Posted in Hacking news ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections on August 5, 2025 The Hacker News