Skip to content
hacker news Page 45

hacker news

Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts

Adobe Commerce Flaw CVE-2025-54236 Lets Hackers Take Over Customer Accounts

Sep 10, 2025Ravie LakshmananVulnerability / Software Security Adobe has warned of a critical security flaw in its Commerce and Magento Open Source platforms that, if successfully exploited, could allow attackers to take control of customer… 

SAP Patches Critical NetWeaver (CVSS Up to 10.0) and Previously Exploited S/4HANA Flaws

SAP Patches Critical NetWeaver (CVSS Up to 10.0) and Previously Exploited S/4HANA Flaws

Sep 10, 2025Ravie LakshmananSoftware Security / Vulnerability SAP on Tuesday released security updates to address multiple security flaws, including three critical vulnerabilities in SAP Netweaver that could result in code execution and the upload arbitrary… 

Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks

Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks

Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft’s Direct Send feature to form a “highly efficient attack pipeline” in recent phishing campaigns, according to new findings from ReliaQuest. “Axios user… 

RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities

RatOn Android Malware Detected With NFC Relay and ATS Banking Fraud Capabilities

Sep 09, 2025Ravie LakshmananMobile Security / Threat Intelligence A new Android malware called RatOn has evolved from a basic tool capable of conducting Near Field Communication (NFC) relay attacks to a sophisticated remote access trojan… 

[Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them

[Webinar] Shadow AI Agents Multiply Fast — Learn How to Detect and Control Them

Sep 09, 2025The Hacker NewsArtificial Intelligence / Threat Detection ⚠️ One click is all it takes. An engineer spins up an “experimental” AI Agent to test a workflow. A business unit connects to automate reporting.… 

New Malware Campaigns Highlight Rising AI and Phishing Risks

New Malware Campaigns Highlight Rising AI and Phishing Risks

Cybersecurity researchers have disclosed details of a phishing campaign that delivers a stealthy banking malware-turned-remote access trojan called MostereRAT. The phishing attack incorporates a number of advanced evasion techniques to gain complete control over compromised… 

TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs

TOR-Based Cryptojacking Attack Expands Through Misconfigured Docker APIs

Cybersecurity researchers have discovered a variant of a recently disclosed campaign that abuses the TOR network for cryptojacking attacks targeting exposed Docker APIs. Akamai, which discovered the latest activity last month, said it’s designed to…