The Hacker NewsCybersecurity researchers have disclosed details of an active web traffic hijacking campaign that has targeted NGINX installations and management panels like Baota (BT) in an attempt to route it through the attacker’s infrastructure.
Datadog Security Labs said it observed threat actors associated with the recent React2Shell (CVE-2025-55182, CVSS score: 10.0) exploitation using malicious NGINXRead More
Category: news
-

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign
-

Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
The Hacker NewsMicrosoft has announced a three-phase approach to phase out New Technology LAN Manager (NTLM) as part of its efforts to shift Windows environments toward stronger, Kerberos-based options.
The development comes more than two years after the tech giant revealed its plans to deprecate the legacy technology, citing its susceptibility to weaknesses that could facilitate relay attacks and allow badRead More -

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
The Hacker NewsA previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical infrastructure organizations across 37 countries over the past year, according to new findings from Palo Alto Networks Unit 42.
In addition, the hacking crew has been observed conducting active reconnaissance against government infrastructure associated with 155Read More -

Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata
The Hacker NewsCybersecurity researchers have disclosed details of a now-patched security flaw impacting Ask Gordon, an artificial intelligence (AI) assistant built into Docker Desktop and the Docker Command-Line Interface (CLI), that could be exploited to execute code and exfiltrate sensitive data.
The critical vulnerability has been codenamed DockerDash by cybersecurity company Noma Labs. It was addressed byRead More -

How Samsung Knox Helps Stop Your Network Security Breach
The Hacker NewsAs you know, enterprise network security has undergone significant evolution over the past decade. Firewalls have become more intelligent, threat detection methods have advanced, and access controls are now more detailed. However (and it’s a big “however”), the increasing use of mobile devices in business operations necessitates network security measures that are specificallyRead More
-
![[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate](https://techaffare.com/wp-content/uploads/2026/02/soc-OzaYjN.jpg)
[Webinar] The Smarter SOC Blueprint: Learn What to Build, Buy, and Automate
The Hacker NewsMost security teams today are buried under tools. Too many dashboards. Too much noise. Not enough real progress.
Every vendor promises “complete coverage” or “AI-powered automation,” but inside most SOCs, teams are still overwhelmed, stretched thin, and unsure which tools are truly pulling their weight. The result? Bloated stacks, missed signals, and mounting pressure to do more with less.
ThisRead More -

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware
The Hacker NewsCybersecurity researchers have discovered a new supply chain attack in which legitimate packages on npm and the Python Package Index (PyPI) repository have been compromised to push malicious versions to facilitate wallet credential theft and remote code execution.
The compromised versions of the two packages are listed below –@dydxprotocol/v4-client-js (npm) – 3.4.1, 1.22.1, 1.15.2, 1.0.31&Read More
-

Hackers Exploit Metro4Shell RCE Flaw in React Native CLI npm Package
The Hacker NewsThreat actors have been observed exploiting a critical security flaw impacting the Metro Development Server in the popular “@react-native-community/cli” npm package.
Cybersecurity company VulnCheck said it first observed exploitation of CVE-2025-11953 (aka Metro4Shell) on December 21, 2025. With a CVSS score of 9.8, the vulnerability allows remote unauthenticated attackers to execute arbitraryRead More -

When Cloud Outages Ripple Across the Internet
The Hacker NewsRecent major cloud service outages have been hard to miss. High-profile incidents affecting providers such as AWS, Azure, and Cloudflare have disrupted large parts of the internet, taking down websites and services that many other systems depend on. The resulting ripple effects have halted applications and workflows that many organizations rely on every day.
For consumers, these outages areRead More -

APT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks
The Hacker NewsThe Russia-linked state-sponsored threat actor known as APT28 (aka UAC-0001) has been attributed to attacks exploiting a newly disclosed security flaw in Microsoft Office as part of a campaign codenamed Operation Neusploit.
Zscaler ThreatLabz said it observed the hacking group weaponizing the shortcoming on January 29, 2026, in attacks targeting users in Ukraine, Slovakia, and Romania, threeRead More