Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025 on April 9, 2026 Posted by The Hacker News
Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region on April 9, 2026 Posted by The Hacker News
Posted in Hacking news ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More on October 2, 2025 The Hacker News
Posted in Hacking news Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware on October 2, 2025 The Hacker News
Posted in Hacking news How to Close Threat Detection Gaps: Your SOC’s Action Plan on October 2, 2025 The Hacker News
Posted in Hacking news Warning: Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro on October 2, 2025 The Hacker News
Posted in Hacking news New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer on October 1, 2025 The Hacker News
Posted in Hacking news OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps on October 1, 2025 The Hacker News
Posted in Hacking news How Leading Security Teams Blend AI + Human Workflows (Free Webinar) on October 1, 2025 The Hacker News
Posted in Hacking news Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover on October 1, 2025 The Hacker News
Posted in Hacking news Hackers Exploit Milesight Routers to Send Phishing SMS to European Users on October 1, 2025 The Hacker News
Posted in Hacking news 2025 Cybersecurity Reality Check: Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising on October 1, 2025 The Hacker News