Author: chouaibcher@gmail.com

  • My Day Getting My Hands Dirty with an NDR System

    My Day Getting My Hands Dirty with an NDR System

    The Hacker NewsMy objectiveThe role of NDR in SOC workflowsStarting up the NDR systemHow AI complements the human responseWhat else did I try out?What could I see with NDR that I wouldn’t otherwise?Am I ready to be a network security analyst now?

    My objective
    As someone relatively inexperienced with network threat hunting, I wanted to get some hands-on experience using a network detection and response (​

  • Microsoft Finds “Summarize with AI” Prompts Manipulating Chatbot Recommendations

    Microsoft Finds “Summarize with AI” Prompts Manipulating Chatbot Recommendations

    The Hacker NewsNew research from Microsoft has revealed that legitimate businesses are gaming artificial intelligence (AI) chatbots via the “Summarize with AI” button that’s being increasingly placed on websites in ways that mirror classic search engine poisoning (SEO).
    The new AI hijacking technique has been codenamed AI Recommendation Poisoning by the Microsoft Defender Security Research Team. The tech giant​

  • Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta

    Apple Tests End-to-End Encrypted RCS Messaging in iOS 26.4 Developer Beta

    The Hacker NewsApple on Monday released a new developer beta of iOS and iPadOS with support for end-to-end encryption (E2EE) in Rich Communications Services (RCS) messages.
    The feature is currently available for testing in iOS and iPadOS 26.4 Beta, and is expected to be shipped to customers in a future update for iOS, iPadOS, macOS, and watchOS.
    “End-to-end encryption is in beta and is not available for all​

  • Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware

    Weekly Recap: Outlook Add-Ins Hijack, 0-Day Patches, Wormable Botnet & AI Malware

    The Hacker NewsThis week’s recap shows how small gaps are turning into big entry points. Not always through new exploits, often through tools, add-ons, cloud setups, or workflows that people already trust and rarely question.
    Another signal: attackers are mixing old and new methods. Legacy botnet tactics, modern cloud abuse, AI assistance, and supply-chain exposure are being used side by side, whichever path​

  • Safe and Inclusive E‑Society: How Lithuania Is Bracing for AI‑Driven Cyber Fraud

    Safe and Inclusive E‑Society: How Lithuania Is Bracing for AI‑Driven Cyber Fraud

    The Hacker NewsPresentation of the KTU Consortium Mission ‘A Safe and Inclusive Digital Society’ at the Innovation Agency event ‘Innovation Breakfast: How Mission-Oriented Science and Innovation Programmes Will Address Societal Challenges’.

    Technologies are evolving fast, reshaping economies, governance, and daily life. Yet, as innovation accelerates, so do digital risks. Technological change is no longer​

  • New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft

    New ZeroDayRAT Mobile Spyware Enables Real-Time Surveillance and Data Theft

    The Hacker NewsCybersecurity researchers have disclosed details of a new mobile spyware platform dubbed ZeroDayRAT that’s being advertised on Telegram as a way to grab sensitive data and facilitate real-time surveillance on Android and iOS devices.
    “The developer runs dedicated channels for sales, customer support, and regular updates, giving buyers a single point of access to a fully operational spyware​

  • New Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Released

    New Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Released

    The Hacker NewsGoogle on Friday released security updates for its Chrome browser to address a security flaw that it said has been exploited in the wild.
    The high-severity vulnerability, tracked as CVE-2026-2441 (CVSS score: 8.8), has been described as a use-after-free bug in CSS. Security researcher Shaheen Fazim has been credited with discovering and reporting the shortcoming on February 11, 2026.
    “Use after​

  • Gainsight Expands Impacted Customer List Following Salesforce Security Alert

    Gainsight Expands Impacted Customer List Following Salesforce Security Alert

    The Hacker NewsGainsight has disclosed that the recent suspicious activity targeting its applications has affected more customers than previously thought.
    The company said Salesforce initially provided a list of 3 impacted customers and that it has “expanded to a larger list” as of November 21, 2025. It did not reveal the exact number of customers who were impacted, but its CEO, Chuck Ganapathi, said “we​Read More

  • Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update

    Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update

    The Hacker NewsMicrosoft has announced plans to improve the security of Entra ID authentication by blocking unauthorized script injection attacks starting a year from now.
    The update to its Content Security Policy (CSP) aims to enhance the Entra ID sign-in experience at “login.microsoftonline[.]com” by only letting scripts from trusted Microsoft domains run.
    “This update strengthens security and adds an extra​Read More

  • ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories

    ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories

    The Hacker NewsHackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering busts and new scams, there’s a lot happening in the cyber world.
    Criminals are getting creative — using smart tricks to steal data, sound real, and hide in plain sight. But they’re not the only ones moving fast. Governments and security teams are fighting back, shutting down fake​Read More