New Phishing Kit Targeting US and EU Enterprises

Sep 10, 2025The Hacker NewsMalware Analysis / Enterprise Security Phishing-as-a-Service (PhaaS) platforms keep evolving, giving attackers…

SAP Patches Critical NetWeaver (CVSS Up to 10.0) and Previously Exploited S/4HANA Flaws

Sep 10, 2025Ravie LakshmananSoftware Security / Vulnerability SAP on Tuesday released security updates to address multiple…

Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts

Sep 10, 2025Ravie LakshmananVulnerability / Software Security Adobe has warned of a critical security flaw in…

TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs

Cybersecurity researchers have discovered a variant of a recently disclosed campaign that abuses the TOR network…

New Malware Campaigns Highlight Rising AI and Phishing Risks

Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malware-turned-remote access…

Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks

Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft’s Direct Send feature…

RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities

Sep 09, 2025Ravie LakshmananMobile Security / Threat Intelligence A new Android malware called RatOn has evolved…

[Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them

Sep 09, 2025The Hacker NewsArtificial Intelligence / Threat Detection ⚠️ One click is all it takes.…

How Leading CISOs are Getting Budget Approval

It’s budget season. Once again, security is being questioned, scrutinized, or deprioritized. If you’re a CISO…

20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack

Sep 09, 2025Ravie LakshmananCryptocurrency / Software Security Multiple npm packages have been compromised as part of…