Author: chouaibcher@gmail.com

  • ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

    ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

    The Hacker NewsThis week’s updates show how small changes can create real problems. Not loud incidents, but quiet shifts that are easy to miss until they add up. The kind that affects systems people rely on every day.
    Many of the stories point to the same trend: familiar tools being used in unexpected ways. Security controls are being worked on. Trusted platforms turning into weak spots. What looks routine on​Read More

  • Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

    Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

    The Hacker NewsA study by OMICRON has revealed widespread cybersecurity gaps in the operational technology (OT) networks of substations, power plants, and control centers worldwide. Drawing on data from more than 100 installations, the analysis highlights recurring technical, organizational, and functional issues that leave critical energy infrastructure vulnerable to cyber threats.
    The findings are based on​Read More

  • 3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026

    3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026

    The Hacker NewsBeyond the direct impact of cyberattacks, enterprises suffer from a secondary but potentially even more costly risk: operational downtime, any amount of which translates into very real damage. That’s why for CISOs, it’s key to prioritize decisions that reduce dwell time and protect their company from risk. 
    Three strategic steps you can take this year for better results:
    1. Focus on today’s​Read More

  • Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

    Iran-Linked RedKitten Cyber Campaign Targets Human Rights NGOs and Activists

    The Hacker NewsA Farsi-speaking threat actor aligned with Iranian state interests is suspected to be behind a new campaign targeting non-governmental organizations and individuals involved in documenting recent human rights abuses.
    The activity, observed by HarfangLab in January 2026, has been codenamed RedKitten. It’s said to coincide with the nationwide unrest in Iran that began towards the end of 2025,​Read More

  • Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

    Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

    The Hacker NewsGoogle-owned Mandiant on Friday said it identified an “expansion in threat activity” that uses tradecraft consistent with extortion-themed attacks orchestrated by a financially motivated hacking group known as ShinyHunters.
    The attacks leverage advanced voice phishing (aka vishing) and bogus credential harvesting sites mimicking targeted companies to gain unauthorized access to victim​Read More

  • CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

    CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

    The Hacker NewsCERT Polska, the Polish computer emergency response team, revealed that coordinated cyber attacks targeted more than 30 wind and photovoltaic farms, a private company from the manufacturing sector, and a large combined heat and power plant (CHP) supplying heat to almost half a million customers in the country.
    The incident took place on December 29, 2025. The agency has attributed the attacks to​Read More

  • Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

    Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

    The Hacker NewsCybersecurity researchers have discovered malicious Google Chrome extensions that come with capabilities to hijack affiliate links, steal data, and collect OpenAI ChatGPT authentication tokens.
    One of the extensions in question is Amazon Ads Blocker (ID: pnpchphmplpdimbllknjoiopmfphellj), which claims to be a tool to browse Amazon without any sponsored content. It was uploaded to the Chrome​Read More

  • China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

    China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

    The Hacker NewsCybersecurity researchers have discovered a new campaign attributed to a China-linked threat actor known as UAT-8099 that took place between late 2025 and early 2026.
    The activity, discovered by Cisco Talos, has targeted vulnerable Internet Information Services (IIS) servers located across Asia, but with a specific focus on targets in Thailand and Vietnam. The scale of the campaign is currently​Read More

  • ⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

    ⚡ Weekly Recap: Proxy Botnet, Office Zero-Day, MongoDB Ransoms, AI Hijacks & New Threats

    The Hacker NewsEvery week brings new discoveries, attacks, and defenses that shape the state of cybersecurity. Some threats are stopped quickly, while others go unseen until they cause real damage.
    Sometimes a single update, exploit, or mistake changes how we think about risk and protection. Every incident shows how defenders adapt — and how fast attackers try to stay ahead.
    This week’s recap brings you the​Read More

  • Securing the Mid-Market Across the Complete Threat Lifecycle

    Securing the Mid-Market Across the Complete Threat Lifecycle

    The Hacker NewsFor mid-market organizations, cybersecurity is a constant balancing act. Proactive, preventative security measures are essential to protect an expanding attack surface. Combined with effective protection that blocks threats, they play a critical role in stopping cyberattacks before damage is done.
    The challenge is that many security tools add complexity and cost that most mid-market businesses​Read More