Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

feedburner.com

The Hacker News

Get the latest updates from The Hacker News directly as they happen.

Follow now 2554 followers

Latest posts

Last updated about 6 hours ago

OpenAI to Show Ads in ChatGPT for Logged-In U.S. Adults on Free and Go Plans

about 7 hours ago

OpenAI on Friday said it would start showing ads in ChatGPT to...

GootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection

about 21 hours ago

The JavaScript (aka JScript) malware loader called GootLoader has been observed using...

Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts

1 day ago

Cybersecurity researchers have discovered five new malicious Google Chrome web browser extensions...

Your Digital Footprint Can Lead Right to Your Front Door

1 day ago

You lock your doors at night. You avoid sketchy phone calls. You’re...

LOTUSLITE Backdoor Targets U.S. Policy Entities Using Venezuela-Themed Spear Phishing

1 day ago

Security experts have disclosed details of a new campaign that has targeted...

China-Linked APT Exploits Sitecore Zero-Day in Attacks on American Critical Infrastructure

1 day ago

A threat actor likely aligned with China has been observed targeting critical...

Cisco Patches Zero-Day RCE Exploited by China-Linked APT in Secure Email Gateways

1 day ago

Cisco on Thursday released security updates for a maximum-severity security flaw impacting...

AWS CodeBuild Misconfiguration Exposed GitHub Repos to Potential Supply Chain Attacks

2 days ago

A critical misconfiguration in Amazon Web Services (AWS) CodeBuild could have allowed...

Critical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access

2 days ago

A maximum-severity security flaw in a WordPress plugin called Modular DS has...

Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot

2 days ago

Cybersecurity researchers have disclosed details of a new attack method dubbed Reprompt...

ThreatsDay Bulletin: AI Voice Cloning Exploit, Wi-Fi Kill Switch, PLC Vulns, and 14 More Stories

2 days ago

The internet never stays quiet. Every week, new hacks, scams, and security...

Model Security Is the Wrong Frame – The Real Risk Is Workflow Security

2 days ago

As AI copilots and assistants become embedded in daily work, security teams...