The Impact of Robotic Process Automation (RPA) on Identity and Access Management

Dec 11, 2025The Hacker NewsAutomation / Compliance As enterprises refine their strategies for handling Non-Human Identities…

NANOREMOTE Malware Uses Google Drive API for Hidden Control on Windows Systems

Dec 11, 2025Ravie LakshmananCyber Espionage / Windows Security Cybersecurity researchers have disclosed details of a new…

Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories

Dec 11, 2025Ravie Lakshmanan This week’s cyber stories show how fast the online world can turn…

WIRTE Leverages AshenLoader Sideloading to Install the AshTag Espionage Backdoor

Dec 11, 2025Ravie LakshmananCyberwarfare / Threat Intelligence An advanced persistent threat (APT) known as WIRTE has…

Chrome Targeted by Active In-the-Wild Exploit Tied to Undisclosed High-Severity Flaw

Dec 11, 2025Ravie LakshmananZero-Day / Vulnerability Google on Wednesday shipped security updates for its Chrome browser…

Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution

Dec 11, 2025Ravie LakshmananVulnerability / Encryption Huntress is warning of a new actively exploited vulnerability in…

React2Shell Exploitation Delivers Crypto Miners and New Malware Across Multiple Sectors

React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React…

.NET SOAPwn Flaw Opens Door for File Writes and Remote Code Execution via Rogue WSDL

Dec 10, 2025Ravie LakshmananEnterprise Security / Web Services New research has uncovered exploitation primitives in the…

Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling

Dec 10, 2025Ravie LakshmananHardware Security / Vulnerability Three security vulnerabilities have been disclosed in the Peripheral…

How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes

Dec 10, 2025The Hacker NewsCloud Security / Threat Detection Cloud security is changing. Attackers are no…