Critical React Native CLI Flaw Exposed Millions of Developers to Remote Attacks

Nov 04, 2025Ravie LakshmananVulnerability / Supply Chain Security Details have emerged about a now-patched critical security…

Operation SkyCloak Deploys Tor-Enabled OpenSSH Backdoor Targeting Defense Sectors

Nov 04, 2025Ravie LakshmananMalware / Cyber Espionage Threat actors are leveraging weaponized attachments distributed via phishing…

Ransomware Defense Using the Wazuh Open Source Platform

Ransomware is malicious software designed to block access to a computer system or encrypt data until…

Government Agencies Issue Emergency Guidance for Microsoft Exchange Server

Image: Envato If your team still runs Microsoft Exchange Server, treat this as a fire alarm.…

Microsoft Detects “SesameOp” Backdoor Using OpenAI’s API as a Stealth Command Channel

Nov 04, 2025Ravie LakshmananArtificial Intelligence / Malware Microsoft has disclosed details of a novel backdoor dubbed…

New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea

Nov 03, 2025Ravie LakshmananCybersecurity / Malware The North Korea-linked threat actor known as Kimsuky has distributed…

Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive

Nov 03, 2025Ravie LakshmananCryptocurrency / Threat Intelligence Cybersecurity researchers have flagged a new malicious extension in…

How Continuous Exposure Management Transforms Security Operations

Nov 03, 2025The Hacker NewsSOC Operations / Exposure Management Security Operations Centers (SOC) today are overwhelmed.…

Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks

Nov 03, 2025Ravie LakshmananCybercrime / Supply Chain Attack Bad actors are increasingly training their sights on…

Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More

Nov 03, 2025Ravie LakshmananCybersecurity / Hacking News Cyberattacks are getting smarter and harder to stop. This…