Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

thehackernews.com

The Hacker News

Get the latest updates from The Hacker News directly as they happen.

Follow now 563 followers

Latest posts

Last updated about 6 hours ago

ShadowRay 2.0 Exploits Unpatched Ray Flaw to Build Self-Spreading GPU Cryptomining Botnet

about 6 hours ago

Oligo Security has warned of ongoing attacks exploiting a two-year-old security flaw...

Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows

about 7 hours ago

Cybersecurity researchers have warned of an actively expanding botnet dubbed Tsundere that's...

ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves

about 11 hours ago

This week has been crazy in the world of hacking and online...

CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat

about 12 hours ago

CTM360 has identified a rapidly expanding WhatsApp account-hacking campaign targeting users worldwide...

New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices

about 13 hours ago

Cybersecurity researchers have disclosed details of a new Android banking trojan called...

Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

about 16 hours ago

Threat actors with ties to Iran engaged in cyber warfare as part...

TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign

about 20 hours ago

Threat actors are leveraging bogus installers masquerading as popular software to trick...

Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)

1 day ago

A recently disclosed security flaw impacting 7-Zip has come under active exploitation...

Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices

1 day ago

Cybersecurity researchers have disclosed details of a new campaign that leverages a...

WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide

1 day ago

A newly discovered campaign has compromised tens of thousands of outdated or...

Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software

1 day ago

The challenge facing security leaders is monumental: Securing environments where failure is...

EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates

1 day ago

The threat actor known as PlushDaemon has been observed using a previously...