U.K. Government Drops Apple Encryption Backdoor Order After U.S. Civil Liberties Pushback

Aug 19, 2025Ravie LakshmananEncryption / Cloud Security The U.K. government has apparently abandoned its plans to…

PyPI Blocks 1,800 Expired-Domain Emails to Prevent Account Takeovers and Supply Chain Attacks

Aug 19, 2025Ravie LakshmananSupply Chain Security The maintainers of the Python Package Index (PyPI) repository have…

Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures

Aug 18, 2025Ravie LakshmananMalware / Enterprise Security The threat actors behind the Noodlophile malware are leveraging…

Microsoft Windows Vulnerability Exploited to Deploy PipeMagic RansomExx Malware

Aug 18, 2025Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers have lifted the lid on the threat…

Wazuh for Regulatory Compliance

Aug 18, 2025The Hacker NewsData Breach / Regulatory Compliance Organizations handling various forms of sensitive data…

NFC Fraud, Curly COMrades, N-able Exploits, Docker Backdoors & More

Aug 18, 2025Ravie LakshmananCybersecurity / Hacking News Power doesn’t just disappear in one big breach. It…

Malicious PyPI and npm Packages Discovered Exploiting Dependencies in Supply Chain Attacks

Cybersecurity researchers have discovered a malicious package in the Python Package Index (PyPI) repository that introduces…

ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure

Aug 16, 2025Ravie LakshmananAndroid / Malware Cybersecurity researchers have detailed the inner workings of an Android…

Russian Group EncryptHub Exploits MSC EvilTwin Vulnerability to Deploy Fickle Stealer Malware

Aug 16, 2025Ravie LakshmananMalware / Vulnerability The threat actor known as EncryptHub is continuing to exploit…

Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools

Aug 15, 2025Ravie LakshmananMalware / Open Source A Chinese-speaking advanced persistent threat (APT) actor has been…