Skip to content
N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto

N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto

Jul 31, 2025Ravie LakshmananCryptocurrency / Malware The North Korea-linked threat actor known as UNC4899 has been attributed to attacks targeting two different organizations by approaching their employees via LinkedIn and Telegram. “Under the guise of… 

UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud

UNC2891 Breaches ATM Network via 4G Raspberry Pi, Tries CAKETAP Rootkit for Fraud

Jul 31, 2025Ravie Lakshmanan The financially motivated threat actor known as UNC2891 has been observed targeting Automatic Teller Machine (ATM) infrastructure using a 4G-equipped Raspberry Pi as part of a covert attack. The cyber-physical attack… 

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs

Alert Fatigue, Data Overload, and the Fall of Traditional SIEMs

Jul 31, 2025The Hacker NewsSecurity Operations / Threat Detection Security Operations Centers (SOCs) are stretched to their limits. Log volumes are surging, threat landscapes are growing more complex, and security teams are chronically understaffed. Analysts… 

Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install

Hackers Exploit Critical WordPress Theme Flaw to Hijack Sites via Remote Plugin Install

Jul 31, 2025Ravie LakshmananVulnerability / Website Security Threat actors are actively exploiting a critical security flaw in “Alone – Charity Multipurpose Non-profit WordPress Theme” to take over susceptible sites. The vulnerability, tracked as CVE-2025-5394, carries… 

Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

Jul 30, 2025Ravie LakshmananCryptocurrency / Browser Security Cybersecurity researchers are calling attention to an ongoing campaign that distributes fake cryptocurrency trading apps to deploy a compiled V8 JavaScript (JSC) malware called JSCEAL that can capture… 

FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant

FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant

Jul 30, 2025Ravie LakshmananEncryption / Ransomware Cybersecurity experts have released a decryptor for a ransomware strain called FunkSec, allowing victims to recover access to their files for free. “Because the ransomware is now considered dead,… 

Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits

Critical Dahua Camera Flaws Enable Remote Hijack via ONVIF and File Upload Exploits

Jul 30, 2025Ravie LakshmananFirmware Security / Vulnerability Cybersecurity researchers have disclosed now-patched critical security flaws in the firmware of Dahua smart cameras that, if left unaddressed, could allow attackers to hijack control of susceptible devices.… 

Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage Tools

Chinese Firms Linked to Silk Typhoon Filed 15+ Patents for Cyber Espionage Tools

Jul 30, 2025Ravie LakshmananEndpoint Security / Cyber Espionage Chinese companies linked to the state-sponsored hacking group known as Silk Typhoon (aka Hafnium) have been identified as behind over a dozen technology patents, shedding light on…