Security News

Chinese Weaver Ant hackers spied on telco network for 4 years
2025-03-24 17:53

A China-linked advanced threat group named Weaver Ant spent more than four years in the network of a telecommunications services provider, hiding traffic and infrastructure with the help of...

Critical flaw in Next.js lets hackers bypass authorization
2025-03-24 16:15

A critical severity vulnerability has been discovered in the Next.js open-source web development framework, potentially allowing attackers to bypass authorization checks. [...]

Oracle denies breach after hacker claims theft of 6 million data records
2025-03-21 20:43

Oracle denies it was breached after a threat actor claimed to be selling 6 million data records allegedly stolen from the company's Oracle Cloud federated SSO login servers [...]

HellCat hackers go on a worldwide Jira hacking spree
2025-03-20 13:44

Swiss global solutions provider Ascom has confirmed a cyberattack on its IT infrastructure as a hacker group known as Hellcat targets Jira servers worldwide using compromised credentials. [...]

TechRepublic EXCLUSIVE: New Ransomware Attacks are Getting More Personal as Hackers ‘Apply Psychological Pressure”
2025-03-19 21:28

Ransomware attackers know where your kids go to school and they want you to know it, according to professional negotiators at Sygnia.

Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners
2025-03-19 15:52

Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurrency miners and remote access trojans (RATs) like Quasar RAT. The vulnerability, assigned the CVE identifier...

New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors
2025-03-18 15:43

Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that affects artificial intelligence (AI)-powered code editors like GitHub Copilot...

Hackers target AI and crypto as software supply chain risks grow
2025-03-18 05:30

The growing sophistication of software supply chain attacks is driven by widespread flaws in open-source and third-party commercial software, along with malicious campaigns that specifically...

OKX suspends DEX aggregator after Lazarus hackers try to launder funds
2025-03-17 18:23

OKX Web3 has decided to suspend its DEX aggregator services to implement security upgrades following reports of abuse by the notorious North Korean Lazarus hackers, who recently conducted a $1.5...

Live Ransomware Demo: See How Hackers Breach Networks and Demand a Ransom
2025-03-14 11:25

Cyber threats evolve daily. In this live webinar, learn exactly how ransomware attacks unfold—from the initial breach to the moment hackers demand payment. Join Joseph Carson, Delinea’s Chief...