Sep 10, 2025The Hacker NewsMalware Analysis / Enterprise Security Phishing-as-a-Service (PhaaS) platforms keep evolving, giving attackers…
Technology
SAP Patches Critical NetWeaver (CVSS Up to 10.0) and Previously Exploited S/4HANA Flaws
Sep 10, 2025Ravie LakshmananSoftware Security / Vulnerability SAP on Tuesday released security updates to address multiple…
Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts
Sep 10, 2025Ravie LakshmananVulnerability / Software Security Adobe has warned of a critical security flaw in…
TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs
Cybersecurity researchers have discovered a variant of a recently disclosed campaign that abuses the TOR network…
New Malware Campaigns Highlight Rising AI and Phishing Risks
Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malware-turned-remote access…
Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks
Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft’s Direct Send feature…
RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities
Sep 09, 2025Ravie LakshmananMobile Security / Threat Intelligence A new Android malware called RatOn has evolved…
[Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them
Sep 09, 2025The Hacker NewsArtificial Intelligence / Threat Detection ⚠️ One click is all it takes.…
How Leading CISOs are Getting Budget Approval
It’s budget season. Once again, security is being questioned, scrutinized, or deprioritized. If you’re a CISO…
20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack
Sep 09, 2025Ravie LakshmananCryptocurrency / Software Security Multiple npm packages have been compromised as part of…