Aug 06, 2025The Hacker NewsCompliance / Security Operations As the volume and sophistication of cyber threats and...
Hacking
The malicious ad tech purveyor known as VexTrio Viper has been observed developing several malicious apps that...
Aug 06, 2025Ravie LakshmananDevOps / Container Security Cybersecurity researchers have demonstrated an “end-to-end privilege escalation chain” in...
Aug 07, 2025Ravie LakshmananNetwork Security / Vulnerability SonicWall has revealed that the recent spike in activity targeting...
Aug 11, 2025Ravie LakshmananZero-Day / Vulnerability The maintainers of the WinRAR file archiving utility have released an...
Aug 07, 2025Ravie LakshmananVulnerability / Threat Intelligence Cybersecurity researchers have disclosed multiple security flaws in video surveillance...
Aug 07, 2025Ravie LakshmananVulnerability / Threat Detection Microsoft has released an advisory for a high-severity security flaw...
Now that we are well into 2025, cloud attacks are evolving faster than ever and artificial intelligence...
Aug 07, 2025Ravie LakshmananMalware / Threat Intelligence Cybersecurity researchers have discovered a set of 11 malicious Go...
Aug 07, 2025The Hacker NewsDevSecOps / Supply Chain Security Python is everywhere in modern software. From machine...