Author: chouaibcher@gmail.com

  • India Orders Phone Makers to Pre-Install Sanchar Saathi App to Tackle Telecom Fraud

    India Orders Phone Makers to Pre-Install Sanchar Saathi App to Tackle Telecom Fraud

    The Hacker NewsIndia’s telecommunications ministry has reportedly asked major mobile device manufacturers to preload a government-backed cybersecurity app named Sanchar Saathi on all new phones within 90 days.
    According to a report from Reuters, the app cannot be deleted or disabled from users’ devices.
    Sanchar Saathi, available on the web and via mobile apps for Android and iOS, allows users to report​Read More

  • ShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs Into Spyware

    ShadyPanda Turns Popular Browser Extensions with 4.3 Million Installs Into Spyware

    The Hacker NewsA threat actor known as ShadyPanda has been linked to a seven-year-long browser extension campaign that has amassed over 4.3 million installations over time.
    Five of these extensions started off as legitimate programs before malicious changes were introduced in mid-2024, according to a report from Koi Security, attracting 300,000 installs. These extensions have since been taken down.
    “These​Read More

  • India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

    India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

    The Hacker NewsIndia’s Department of Telecommunications (DoT) has issued directions to app-based communication service providers to ensure that the platforms cannot be used without an active SIM card linked to the user’s mobile number.
    To that end, messaging apps like WhatsApp, Telegram, Snapchat, Arattai, Sharechat, Josh, JioChat, and Signal that use an Indian mobile number for uniquely identifying their​Read More

  • Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

    Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

    The Hacker NewsA joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScan and ANY.RUN, a solution for interactive malware analysis and threat intelligence, has uncovered one of North Korea’s most persistent infiltration schemes: a network of remote IT workers tied to Lazarus Group’s Famous Chollima division.
    For the first time, researchers managed​Read More

  • GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

    GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

    The Hacker NewsThe supply chain campaign known as GlassWorm has once again reared its head, infiltrating both Microsoft Visual Studio Marketplace and Open VSX with 24 extensions impersonating popular developer tools and frameworks like Flutter, React, Tailwind, Vim, and Vue.
    GlassWorm was first documented in October 2025, detailing its use of the Solana blockchain for command-and-control (C2) and harvest npm,​Read More

  • Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

    Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

    The Hacker NewsCybersecurity researchers have disclosed details of an npm package that attempts to influence artificial intelligence (AI)-driven security scanners.
    The package in question is eslint-plugin-unicorn-ts-2, which masquerades as a TypeScript extension of the popular ESLint plugin. It was uploaded to the registry by a user named “hamburgerisland” in February 2024. The package has been downloaded​Read More

  • Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation

    Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation

    The Hacker NewsMicrosoft has silently plugged a security flaw that has been exploited by several threat actors since 2017 as part of the company’s November 2025 Patch Tuesday updates, according to ACROS Security’s 0patch.
    The vulnerability in question is CVE-2025-9491 (CVSS score: 7.8/7.0), which has been described as a Windows Shortcut (LNK) file UI misinterpretation vulnerability that could lead to remote​Read More

  • WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts

    WordPress King Addons Flaw Under Active Attack Lets Hackers Make Admin Accounts

    The Hacker NewsA critical security flaw impacting a WordPress plugin known as King Addons for Elementor has come under active exploitation in the wild.
    The vulnerability, CVE-2025-8489 (CVSS score: 9.8), is a case of privilege escalation that allows unauthenticated attackers to grant themselves administrative privileges by simply specifying the administrator user role during registration.
    It affects versions​Read More

  • Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud

    Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud

    The Hacker NewsThe threat actor known as Water Saci is actively evolving its tactics, switching to a sophisticated, highly layered infection chain that uses HTML Application (HTA) files and PDFs to propagate via WhatsApp a worm that deploys a banking trojan in attacks targeting users in Brazil.
    The latest wave is characterized by the attackers shifting from PowerShell to a Python-based variant that spreads the​Read More

  • “Getting to Yes”: An Anti-Sales Guide for MSPs

    “Getting to Yes”: An Anti-Sales Guide for MSPs

    The Hacker NewsMost MSPs and MSSPs know how to deliver effective security. The challenge is helping prospects understand why it matters in business terms. Too often, sales conversations stall because prospects are overwhelmed, skeptical, or tired of fear-based messaging.
    That’s why we created ”Getting to Yes”: An Anti-Sales Guide for MSPs. This guide helps service providers transform resistance into trust and​Read More