Tag: hackers

Chinese hackers reportedly targeting government entities using ‘Brickstorm’ malware

Hackers with links to China reportedly successfully infiltrated a number of unnamed government and tech entities using...

Chinese hackers used Brickworm malware to breach critical US infrastructure

Chinese state-sponsored actors deploy Brickworm malware to infiltrate government and IT networks worldwideMalware targets VMware vSphere and...

Hackers observed injecting legitimate banking apps with malicious code

Group-IB links poisoned mobile banking apps to GoldFactoryAttackers decompile legitimate apps, add trojans/backdoors, and spread them via...

FBI says hackers have stolen $262 million in account takeover scams in 2025 so far – here’s how you can stay safe

FBI warns attackers can steal credentials through phishing tricks and quickly take over financial accountsHoliday-themed domains lure...

Malicious LLMs are letting even unskilled hackers to craft dangerous new malware

Hackers use untethered LLMs such as WormGPT 4 and KawaiiGPT for cybercrimeWormGPT 4 enables encryptors, exfiltration tools,...

Ransomware hackers attack SMBs being acquired to try and gain access to multiple companies

ReliaQuest warns Akira ransomware often spreads via compromised assets inherited during mergers and acquisitionsMost infections stem from...

Hackers impersonate TechCrunch reporters to steal sensitive information – but you can always trust us

Scammers impersonate TechCrunch reporters to gain access to sensitive corporate and operational informationFake emails increasingly mimic real...

Windows Server flaw targeted by hackers to spread malware – here’s what we know

Chinese state-sponsored actors are exploiting CVE-2025-59287, a critical WSUS flaw enabling unauthenticated RCE with SYSTEM privilegesAhnLab reports...

SonicWall tells customers to patch SonicOS flaw allowing hackers to crash firewalls

SonicWall patches SSLVPN flaw CVE-2025-40601, enabling unauthenticated DoS attacks on Gen7/Gen8 firewallsNo exploitation seen yet; users urged...

Even your smart photo frames aren’t safe from hackers now – experts flag popular Android product is at risk, so here’s how to stay...

Experts flag Uhale devices download malicious software automatically each time it boots upSeventeen security issues discovered across...

Hackers claim to have hit Under Armour in massive data breach – here’s what we know, and how you can stay safe

Hackers have posted data they claim is stolen from Under Armour It includes PII from customers and...

JSON services hijacked by North Korean hackers to send out malware

Lazarus Group used JSON storage services to host malware in the Contagious Interview campaign targeting developersAttackers lured...

Hackers, your game is over – US government announces ‘strike force’ to stamp out Southeast Asian cyber scams

US Strike Force targets scam centers in Burma, Cambodia, and LaosCrypto Seizure team forfeits over $401 million...

Hackers spin a tedious yarn – fabric supplier behind H&M, Adidas, and more hit by worrying cyber breach

Fulgar confirms ransomware attack linked to notorious RansomHouse groupAttackers published internal documents, including bank balances, invoices, and...

If hackers can use AI to automate massive cyber attacks, Terminator robots are the least of our problems

I can see it now: the Terminator travels back to 2021 and then casually walks by the...

Anthropic’s AI was used by Chinese hackers to run a Cyberattack

A few months ago, Anthropic published a report detailing how its Claude AI model had been weaponized...

Anthropic claims Chinese hackers hijacked Claude to launch AI-orchestrated and automated cyberattacks

Anthropic says it discovered an all-AI cyberattack targeting at least 30 organizationsThis is believed to be the...

Hackers use Anthropic’s AI model Claude once again

Anthropic announced on Thursday that Chinese state-backed hackers used the company’s AI model Claude to automate roughly...

Hackers turn Cisco and Citrix zero-days into a malware nightmare

CVE-2025-20337 enables unauthenticated remote code execution in Cisco ISE systemsAttackers deployed custom in-memory web shells with advanced...

Hackers hijacked antivirus features to install malware – here’s what we know

CVE-2025-12480 in Triofox allowed zero-day exploitation via improper access controlUNC6485 attackers deployed Zoho Assist, AnyDesk, and SSH...

North Korean hackers hijack Google’s Find Hub to find and wipe target devices

KONNI hackers use KakaoTalk to deliver malware and harvest account credentials from victimsAttackers exploit Google Find Hub...

SonicWall blames state hackers for damaging data breach

SonicWall confirms state-sponsored actor accessed cloud backups via API in a targeted breachInitially downplayed, the breach ultimately...

Microsoft Teams really could be bad for your (security) health – hackers spoof bosses, send fake messages, and more

Microsoft Teams flaws allowed message edits, spoofed alerts, and forged caller identitiesAttackers could exploit these bugs for...

Russian hackers hit Windows machines via Linux VMs with new custom malware

Curly COMrades deployed Alpine Linux VMs on Windows hosts to hide reverse-shell malware activityVM traffic tunneled via...

Hackers are teaming up with organized crime gangs to steal cargo right from supply chains

Hackers are creating phishing attacks for logistics companiesThey then gain access and redirect shipments to new destinationsReal...

How a bunch of hackers freed the Kinect from the Xbox

In 2010, when Microsoft unveiled the Kinect, it pitched the camera as a revolutionary new gaming device....

Experts warn UK’s basic infrastructure at risk after hackers target drinking water suppliers

Report reveals hackers have disrupted UK water suppliers on five occasions since Jan 2024The safe water supply...

“We have terrible security practices” – University of Pennsylvania hackers say they’ve stolen over a million records in major cyberattack

Attacker accessed University systems via compromised SSO, stealing data on 1.2 million individualsOffensive mass email sent post-ejection...

Chinese hackers target European diplomats with Windows zero-day flaw

Mustang Panda used CVE-2025-9491 to target European diplomats via phishing and malicious .LNK filesExploited Windows Shell Link...

Claude can be tricked into sending your private company data to hackers – all it takes is some kind words

Claude’s Code Interpreter can be exploited to exfiltrate private user data via prompt injectionResearcher tricked Claude into...

Chinese state hackers may be using VMWare Tools flaw to hack US systems – so patch now, CISA warns

CISA added CVE-2025-41244 to KEV, mandating patching by November 20The bug enables local privilege escalation via VMware...

Ransomware hackers are now running Linux encryptors in Windows to stay undetected

Qilin ransomware uses WSL to run Linux encryptors stealthily on Windows systemsAttackers bypass Windows defenses by executing...