Category: news

  • Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

    Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

    The Hacker NewsGoogle on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance on its targets, as various hacking groups continue to weaponize the tool for accelerating various phases of the cyber attack life cycle, enabling information operations, and even conducting model extraction attacks.
    “The​Read More

  • OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills

    OpenClaw Integrates VirusTotal Scanning to Detect Malicious ClawHub Skills

    The Hacker NewsOpenClaw (formerly Moltbot and Clawdbot) has announced that it’s partnering with Google-owned VirusTotal to scan skills that are being uploaded to ClawHub, its skill marketplace, as part of broader efforts to bolster the security of the agentic ecosystem.
    “All skills published to ClawHub are now scanned using VirusTotal’s threat intelligence, including their new Code Insight capability,”​Read More

  • Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

    Lazarus Campaign Plants Malicious Packages in npm and PyPI Ecosystems

    The Hacker NewsCybersecurity researchers have discovered a fresh set of malicious packages across npm and the Python Package Index (PyPI) repository linked to a fake recruitment-themed campaign orchestrated by the North Korea-linked Lazarus Group.
    The coordinated campaign has been codenamed graphalgo in reference to the first package published in the npm registry. It’s assessed to be active since May 2025.
    “​Read More

  • Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution

    Fortinet Patches Critical SQLi Flaw Enabling Unauthenticated Code Execution

    The Hacker NewsFortinet has released security updates to address a critical flaw impacting FortiClientEMS that could lead to the execution of arbitrary code on susceptible systems.
    The vulnerability, tracked as CVE-2026-21643, has a CVSS rating of 9.1 out of a maximum of 10.0.

    “An improper neutralization of special elements used in an SQL Command (‘SQL Injection’) vulnerability [CWE-89] in FortiClientEMS may​Read More

  • China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

    China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Campaign

    The Hacker NewsThe Cyber Security Agency (CSA) of Singapore on Monday revealed that the China-nexus cyber espionage group known as UNC3886 targeted its telecommunications sector.
    “UNC3886 had launched a deliberate, targeted, and well-planned campaign against Singapore’s telecommunications sector,” CSA said. “All four of Singapore’s major telecommunications operators (‘telcos’) – M1, SIMBA Telecom, Singtel, and​Read More

  • SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

    SolarWinds Web Help Desk Exploited for RCE in Multi-Stage Attacks on Exposed Servers

    The Hacker NewsMicrosoft has revealed that it observed a multi‑stage intrusion that involved the threat actors exploiting internet‑exposed SolarWinds Web Help Desk (WHD) instances to obtain initial access and move laterally across the organization’s network to other high-value assets.
    That said, the Microsoft Defender Security Research Team said it’s not clear whether the activity weaponized recently​Read More

  • ⚡ Weekly Recap: AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More

    ⚡ Weekly Recap: AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More

    The Hacker NewsCyber threats are no longer coming from just malware or exploits. They’re showing up inside the tools, platforms, and ecosystems organizations use every day. As companies connect AI, cloud apps, developer tools, and communication systems, attackers are following those same paths.
    A clear pattern this week: attackers are abusing trust. Trusted updates, trusted marketplaces, trusted apps, even​Read More

  • How Top CISOs Solve Burnout and Speed up MTTR without Extra Hiring

    How Top CISOs Solve Burnout and Speed up MTTR without Extra Hiring

    The Hacker NewsWhy do SOC teams keep burning out and missing SLAs even after spending big on security tools? Routine triage piles up, senior specialists get dragged into basic validation, and MTTR climbs, while stealthy threats still find room to slip through. Top CISOs have realized the solution isn’t hiring more people or stacking yet another tool onto the workflow, but giving their teams faster, clearer​Read More

  • North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

    North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations

    The Hacker NewsThe North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from Windows and macOS systems with the ultimate goal of facilitating financial theft.
    “The intrusion relied on a social engineering scheme involving a compromised Telegram account, a fake Zoom meeting, a ClickFix infection vector, and reported usage of AI-generated​Read More

  • DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

    DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies

    The Hacker NewsThe information technology (IT) workers associated with the Democratic People’s Republic of Korea (DPRK) are now applying to remote positions using real LinkedIn accounts of individuals they’re impersonating, marking a new escalation of the fraudulent scheme.
    “These profiles often have verified workplace emails and identity badges, which DPRK operatives hope will make their fraudulent​Read More