NestDaddy
Web Global News Local News Financial News Tech News Images Maps TravelHub
Research AI Tools Games Software
Showing 20 of 82 tech news articles in Cybersecurity
'MuddyWater' Hackers Target Israeli Orgs With Retro Game Tactic Cybersecurity
Darkreading 1 day ago

'MuddyWater' Hackers Target Israeli Orgs With Retro Game Tactic

Iran's top state-sponsored APT is usually rather crass. But in a recent spate of attacks, it tried out some interesting evasion tactics, including delving into Snake, an old-school mobile game.

Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts Cybersecurity
Thehackernews 1 day ago

Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts

Cloudflare on Wednesday said it detected and mitigated the largest ever distributed denial-of-service (DDoS) attack that measured at 29.7 terabits per second (Tbps). The activity, the web infrastructure and security company said, originated from a DDoS botnet-for-hire known as AISURU, which has been

Cybersecurity
Securityaffairs 2 days ago

King Addons flaw lets anyone become WordPress admin

Hackers are exploiting a King Addons flaw (CVE-2025-8489) that lets anyone register and instantly gain admin privileges on WordPress sites. Hackers are exploiting a critical vulnerability, tracked as CVE-2025-8489 (CVSS score of 9.8), in the WordPress plugin King Addons for Elementor that allows una

'ShadyPanda' Hackers Weaponize Millions of Browsers Cybersecurity
Darkreading 2 days ago

'ShadyPanda' Hackers Weaponize Millions of Browsers

The China-based cyber-threat group has been quietly using malicious extensions on the Google Chrome and Microsoft Edge marketplaces to spy on millions of users.

Critical React Flaw Triggers Calls for Immediate Action Cybersecurity
Darkreading 2 days ago

Critical React Flaw Triggers Calls for Immediate Action

The vulnerability, which was assigned two CVEs with maximum CVSS scores of 10, may affect more than a third of cloud service providers.

Arizona AG Sues Temu Over 'Stealing' User Data Cybersecurity
Darkreading 2 days ago

Arizona AG Sues Temu Over 'Stealing' User Data

The suit alleges the Chinese retailer's app secretly accesses and harvests users' sensitive information without their knowledge or consent.

Cybersecurity
Securityaffairs 2 days ago

University of Pennsylvania and University of Phoenix disclose data breaches

The University of Pennsylvania and the University of Phoenix confirm they were hit in the Oracle E-Business Suite hacking campaign. The University of Pennsylvania (Penn) and the University of Phoenix confirmed they were hit in the recent cyberattack targeting Oracle E-Business Suite customers. Penn

Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution Cybersecurity
Thehackernews 2 days ago

Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution

A maximum-severity security flaw has been disclosed in React Server Components (RSC) that, if successfully exploited, could result in remote code execution. The vulnerability, tracked as CVE-2025-55182, carries a CVSS score of 10.0. The vulnerability has been codenamed React2shell. It allows "unauth

Discover the AI Tools Fueling the Next Cybercrime Wave — Watch the Webinar Cybersecurity
Thehackernews 2 days ago

Discover the AI Tools Fueling the Next Cybercrime Wave — Watch the Webinar

Remember when phishing emails were easy to spot? Bad grammar, weird formatting, and requests from a "Prince" in a distant country? Those days are over. Today, a 16-year-old with zero coding skills and a $200 allowance can launch a campaign that rivals state-sponsored hackers. They don't need to be s

Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation Cybersecurity
Thehackernews 2 days ago

Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation

Microsoft has silently plugged a security flaw that has been exploited by several threat actors since 2017 as part of the company's November 2025 Patch Tuesday updates, according to ACROS Security's 0patch. The vulnerability in question is CVE-2025-9491 (CVSS score: 7.8/7.0), which has been describe

WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts Cybersecurity
Thehackernews 2 days ago

WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts

A critical security flaw impacting a WordPress plugin known as King Addons for Elementor has come under active exploitation in the wild. The vulnerability, CVE-2025-8489 (CVSS score: 9.8), is a case of privilege escalation that allows unauthenticated attackers to grant themselves administrative priv

Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud Cybersecurity
Thehackernews 2 days ago

Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud

The threat actor known as Water Saci is actively evolving its tactics, switching to a sophisticated, highly layered infection chain that uses HTML Application (HTA) files and PDFs to propagate via WhatsApp a worm that deploys a banking trojan in attacks targeting users in Brazil. The latest wave is

The Ransomware Holiday Bind: Burnout or Be Vulnerable Cybersecurity
Darkreading 2 days ago

The Ransomware Holiday Bind: Burnout or Be Vulnerable

Ransomware groups target enterprises during off-hours, weekends, and holidays when security teams are stretched thin and response times lag.

Cybersecurity
Securityaffairs 2 days ago

Researchers spotted Lazarus’s remote IT workers in action

Researchers exposed a Lazarus scheme using remote IT workers tied to North Korea’s Famous Chollima APT group in a joint investigation. Researchers filmed Lazarus APT group’s remote-worker scheme in action, uncovering a North Korean network of IT contractors linked to the Famous Chollima unit, TheHac

AI Bolsters Python Variant of Brazilian WhatsApp Attacks Cybersecurity
Darkreading 2 days ago

AI Bolsters Python Variant of Brazilian WhatsApp Attacks

Water Saci has upgraded its self-propagating malware to compromise banks and cryptocurrency exchanges by targeting enterprise users of the popular chat app.

Chopping AI Down to Size: Turning Disruptive Technology into a Strategic Advantage Cybersecurity
Thehackernews 2 days ago

Chopping AI Down to Size: Turning Disruptive Technology into a Strategic Advantage

Most people know the story of Paul Bunyan. A giant lumberjack, a trusted axe, and a challenge from a machine that promised to outpace him. Paul doubled down on his old way of working, swung harder, and still lost by a quarter inch. His mistake was not losing the contest. His mistake was assuming tha

Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code Cybersecurity
Thehackernews 2 days ago

Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code

Three critical security flaws have been disclosed in an open-source utility called Picklescan that could allow malicious actors to execute arbitrary code by loading untrusted PyTorch models, effectively bypassing the tool's protections. Picklescan, developed and maintained by Matthieu Maitre (@mmait

Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems Cybersecurity
Thehackernews 2 days ago

Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems

Cybersecurity researchers have discovered a malicious Rust package that's capable of targeting Windows, macOS, and Linux systems, and features malicious functionality to stealthily execute on developer machines by masquerading as an Ethereum Virtual Machine (EVM) unit helper tool. The Rust crate, na

China Researches Ways to Disrupt Satellite Internet Cybersecurity
Darkreading 3 days ago

China Researches Ways to Disrupt Satellite Internet

While satellite constellations — such as Starlink — are resilient, 2,000 drones could cut communications to a region the size of Taiwan, researchers find.

While ECH Adoption Is Low, Risks Remain for Enterprises, End Users Cybersecurity
Darkreading 3 days ago

While ECH Adoption Is Low, Risks Remain for Enterprises, End Users

Is the new privacy protocol helping malicious actors more than Internet users?