Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

feedburner.com

The Hacker News

Get the latest updates from The Hacker News directly as they happen.

Follow now 2501 followers

Latest posts

Last updated about 2 hours ago

ThreatsDay Bulletin: 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves

about 3 hours ago

This week has been crazy in the world of hacking and online...

CTM360 Exposes a Global WhatsApp Hijacking Campaign: HackOnChat

about 4 hours ago

CTM360 has identified a rapidly expanding WhatsApp account-hacking campaign targeting users worldwide...

New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices

about 4 hours ago

Cybersecurity researchers have disclosed details of a new Android banking trojan called...

Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt

about 7 hours ago

Threat actors with ties to Iran engaged in cyber warfare as part...

TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign

about 11 hours ago

Threat actors are leveraging bogus installers masquerading as popular software to trick...

Hackers Actively Exploiting 7-Zip Symbolic Link–Based RCE Vulnerability (CVE-2025-11001)

about 23 hours ago

A recently disclosed security flaw impacting 7-Zip has come under active exploitation...

Python-Based WhatsApp Worm Spreads Eternidade Stealer Across Brazilian Devices

about 23 hours ago

Cybersecurity researchers have disclosed details of a new campaign that leverages a...

WrtHug Exploits Six ASUS WRT Flaws to Hijack Tens of Thousands of EoL Routers Worldwide

1 day ago

A newly discovered campaign has compromised tens of thousands of outdated or...

Application Containment: How to Use Ringfencing to Prevent the Weaponization of Trusted Software

1 day ago

The challenge facing security leaders is monumental: Securing environments where failure is...

EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates

1 day ago

The threat actor known as PlushDaemon has been observed using a previously...

ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts

1 day ago

Malicious actors can exploit default configurations in ServiceNow's Now Assist generative artificial...

Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild

1 day ago

Fortinet has warned of a new security flaw in FortiWeb that it...