Below I’ve curated cyber security news from the world-wide-web – the lefthand column is from “The Hacker News” website and on the right is news from “Security Week”. Both are top cyber security news sites. In the very least this shows that threats are daily and they are very real.
Hacker News
- MSS Claims NSA Used 42 Cyber Tools in Multi-Stage...by info@thehackernews.com (The Hacker News) on October 20, 2025 at 5:32 am
China on Sunday accused the U.S. National Security Agency (NSA) of carrying out a "premeditated" cyber attack targeting the National Time Service Center (NTSC), as it described the U.S. as a "hacker empire" and the "greatest source of chaos in cyberspace." The Ministry of State Security (MSS), in a […]
- Europol Dismantles SIM Farm Network Powering 49...by info@thehackernews.com (The Hacker News) on October 19, 2025 at 6:13 am
Europol on Friday announced the disruption of a sophisticated cybercrime-as-a-service (CaaS) platform that operated a SIM farm and enabled its customers to carry out a broad spectrum of crimes ranging from phishing to investment fraud. The coordinated law enforcement effort, dubbed Operation […]
- New .NET CAPI Backdoor Targets Russian Auto and...by info@thehackernews.com (The Hacker News) on October 18, 2025 at 11:41 am
Cybersecurity researchers have shed light on a new campaign that has likely targeted the Russian automobile and e-commerce sectors with a previously undocumented .NET malware dubbed CAPI Backdoor. According to Seqrite Labs, the attack chain involves distributing phishing emails containing a ZIP […]
- Silver Fox Expands Winos 4.0 Attacks to Japan and...by info@thehackernews.com (The Hacker News) on October 18, 2025 at 6:51 am
The threat actors behind a malware family known as Winos 4.0 (aka ValleyRAT) have expanded their targeting footprint from China and Taiwan to target Japan and Malaysia with another remote access trojan (RAT) tracked as HoldingHands RAT (aka Gh0stBins). "The campaign relied on phishing emails with […]
- North Korean Hackers Combine BeaverTail and...by info@thehackernews.com (The Hacker News) on October 17, 2025 at 1:33 pm
The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality of two of its malware programs, indicating that the hacking group is actively refining its toolset. That's according to new findings from Cisco Talos, which said recent […]
- Identity Security: Your First and Last Line of...by info@thehackernews.com (The Hacker News) on October 17, 2025 at 11:00 am
The danger isn’t that AI agents have bad days — it’s that they never do. They execute faithfully, even when what they’re executing is a mistake. A single misstep in logic or access can turn flawless automation into a flawless catastrophe. This isn't some dystopian fantasy—it's Tuesday at […]
- Researchers Uncover WatchGuard VPN Bug That Could...by info@thehackernews.com (The Hacker News) on October 17, 2025 at 9:25 am
Cybersecurity researchers have disclosed details of a recently patched critical security flaw in WatchGuard Fireware that could allow unauthenticated attackers to execute arbitrary code. The vulnerability, tracked as CVE-2025-9242 (CVSS score: 9.3), is described as an out-of-bounds write […]
- Microsoft Revokes 200 Fraudulent Certificates...by info@thehackernews.com (The Hacker News) on October 17, 2025 at 6:03 am
Microsoft on Thursday disclosed that it revoked more than 200 certificates used by a threat actor it tracks as Vanilla Tempest to fraudulently sign malicious binaries in ransomware attacks. The certificates were "used in fake Teams setup files to deliver the Oyster backdoor and ultimately deploy […]
- North Korean Hackers Use EtherHiding to Hide...by info@thehackernews.com (The Hacker News) on October 16, 2025 at 2:56 pm
A threat actor with ties to the Democratic People's Republic of Korea (aka North Korea) has been observed leveraging the EtherHiding technique to distribute malware and enable cryptocurrency theft, marking the first time a state-sponsored hacking group has embraced the method. The activity has been […]
- Hackers Abuse Blockchain Smart Contracts to...by info@thehackernews.com (The Hacker News) on October 16, 2025 at 2:52 pm
A financially motivated threat actor codenamed UNC5142 has been observed abusing blockchain smart contracts as a way to facilitate the distribution of information stealers, such as Atomic (AMOS), Lumma, Rhadamanthys (aka RADTHIEF), and Vidar, targeting both Windows and Apple macOS systems. "UNC5142 […]
WordPress News
- Feed has no items.