The Hacker News
- [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications May 17, 2025Modern apps move fast—faster than most security teams can keep up. As businesses rush to build in the cloud, security often lags behind. Teams scan code in isolation, react late to cloud threats, and monitor SOC alerts only after damage is done. Attackers don’t wait. They exploit vulnerabilities within hours. Yet most organizations take days […]
- New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors May 16, 2025Cybersecurity researchers are calling attention to a new botnet malware called HTTPBot that has been used to primarily single out the gaming industry, as well as technology companies and educational institutions in China. "Over the past few months, it has expanded aggressively, continuously leveraging infected devices to launch external attacks," NSFOCUS said in a report […]
- Top 10 Best Practices for Effective Data Protection May 16, 2025Data is the lifeblood of productivity, and protecting sensitive data is more critical than ever. With cyber threats evolving rapidly and data privacy regulations tightening, organizations must stay vigilant and proactive to safeguard their most valuable assets. But how do you build an effective data protection framework? In this article, we'll explore data protection best […]
- Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks May 16, 2025Researchers at ETH Zürich have discovered yet another security flaw that they say impacts all modern Intel CPUs and causes them to leak sensitive data from memory, showing that the vulnerability known as Spectre continues to haunt computer systems after more than seven years. The vulnerability, referred to as Branch Privilege Injection (BPI), "can be […]
- Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks May 16, 2025Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy a remote access trojan called Remcos RAT. "Threat actors delivered malicious LNK files embedded within ZIP archives, often disguised as Office documents," Qualys security researcher Akshay Thorve said in a technical report. "The attack chain […]
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
- Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack May 16, 2025A serious security flaw affecting the Eventin plugin, a popular event management solution for WordPress, was recently discovered by Denver Jackson, a member of the Patchstack Alliance community. This vulnerability in the plugin, which boasts over 10,000 active installations, allowed any unauthenticated user to gain administrative access to the affected sites, putting them at significant […]
- Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication May 16, 2025A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign embedded within the seemingly innocuous package os-info-checker-es6. First published on March 19, 2025, with initial versions appearing benign, the package rapidly evolved into a complex threat. Early iterations focused on gathering basic OS information, but subsequent updates between March 22-23 introduced […]
- New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads May 16, 2025A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through a highly sophisticated phishing-based attack. Cybersecurity researchers have uncovered a multi-stage infection chain that begins with a deceptive PDF document titled “Pay Adjustment.” This document lures victims into downloading a malicious ZIP file hosted on Netlify, a popular web hosting platform. […]
- Printer Company Distributes Malicious Drivers Infected with XRed Malware May 16, 2025Procolored, a printer manufacturing company, has been found distributing software drivers infected with malicious code, including the notorious XRed backdoor malware. The issue came to light when Cameron Coward, a YouTuber behind the channel Serial Hobbyism, attempted to review a $6,000 UV printer and encountered antivirus alerts upon plugging in a USB drive containing the […]
- Chinese Agent Impersonate as Stanford Student For Intelligence Gathering May 16, 2025Chinese intelligence operative posing as a Stanford University student has been uncovered following an investigation into suspicious approaches made to students conducting China-related research. The agent, using the alias “Charles Chen,” targeted several students over an extended period, primarily women researching sensitive China topics. This revelation comes amid growing concerns about systematic Chinese Communist Party […]