Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain

Aug 29, 2025Ravie LakshmananCryptocurrency / Cybercrime Authorities from the Netherlands and the United States have announced…

Google Warns Salesloft OAuth Breach Extends Beyond Salesforce, Impacting All Integrations

Aug 29, 2025Ravie LakshmananData Breach / Salesforce Google has revealed that the recent wave of attacks…

TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies

Aug 29, 2025Ravie LakshmananMalware / Windows Security Cybersecurity researchers have discovered a cybercrime campaign that’s using…

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

Aug 28, 2025Ravie LakshmananArtificial Intelligence / Malware The U.S. Department of the Treasury’s Office of Foreign…

Malicious Nx Packages in ‘s1ngularity’ Attack Leaked 2,349 GitHub, Cloud, and AI Credentials

The maintainers of the nx build system have alerted users to a supply chain attack that…

Hidden Vulnerabilities of Project Management Tools & How FluentPro Backup Secures Them

Every day, businesses, teams, and project managers trust platforms like Trello, Asana, etc., to collaborate and…

Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide

The China-linked advanced persistent threat (APT) actor known as Salt Typhoon has continued its attacks targeting…

Researchers Find VS Code Flaw Allowing Attackers to Republish Deleted Extensions Under Same Names

Aug 28, 2025Ravie LakshmananMalware / Ransomware Cybersecurity researchers have discovered a loophole in the Visual Studio…

Honor’s slim Magic V5 foldable is fun to use, minus the huge camera bump

There is a spec war going on among companies to claim the crown of thinnest foldable.…

Why Top Teams Are Prioritizing Code-to-Cloud Mapping in Our 2025 AppSec

Aug 28, 2025The Hacker NewsCloud Security / Generative AI Picture this: Your team rolls out some…