The Hacker News

Malicious PyPI Packages Exploit Instagram and TikTok APIs to Validate User Accounts

Researchers identified several malicious packages on PyPI and npm that exploit APIs and implant backdoors. checker-SaGaF (2,605 downloads) steinlurks (1,049 downloads) sinnercore (3,300 downloads) dbgpkg (~350 downloads) requestsdev (76 downloads)

Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper

A newly discovered malicious npm package, os-info-checker-es6, masquerades as a utility for retrieving OS information but is designed to stealthily deliver a next-stage payload.

CTM360 Identifies Surge in Phishing Attacks Targeting Meta Business Users

A sophisticated phishing campaign dubbed Meta Mirage has been uncovered, targeting users of Meta's Business Suite. This campaign specifically focuses on hijacking high-value accounts.

BianLian and RansomExx Exploit SAP NetWeaver Flaw to Deploy PipeMagic Trojan

Threat actors BianLian and RansomExx (tracked by Microsoft as Storm-2460) are actively exploiting SAP NetWeaver vulnerabilities CVE-2025-31324 and CVE-2025-42999 to deploy the PipeMagic trojan and Brute Ratel C2 framework.

SysAid Patches 4 Critical Flaws Enabling Pre-Auth RCE in On-Premise Version

Multiple critical vulnerabilities have been discovered in the on-premise version of SysAid IT support software, enabling pre-authenticated remote code execution (RCE) with elevated privileges.

Hackers Exploit Samsung MagicINFO, GeoVision IoT Flaws to Deploy Mirai Botnet

Threat actors are actively exploiting critical vulnerabilities in end-of-life (EoL) GeoVision IoT devices and Samsung MagicINFO servers to deploy the Mirai botnet. These attacks leverage command injection and path traversal flaws.

Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign

A recent investigation by Anthropic has uncovered a sophisticated misuse of its Claude AI chatbot in a commercial “influence-as-a-service” operation. This campaign involved the creation of over 100 politically-aligned fake personas on Facebook and X.

Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers

Storm-1977 has been targeting cloud tenants in the education sector through password spraying attacks using AzureChecker.exe. The campaign led to the compromise of accounts and the deployment of over 200 containers for illicit cryptocurrency mining.

Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers

Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully exploited, could enable attackers to gain unauthorized access to files, inject malicious data, and tamper with logs.

Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals

The Darcula phishing-as-a-service (PhaaS) platform has introduced generative AI (GenAI) capabilities, significantly enhancing its accessibility and effectiveness for cybercriminals.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags