Skip to main content

Posts

Showing posts with the label The Hacker News: THN Weekly recap

The Hacker News: THN Weekly Recap.

"THN Weekly Recap:  iOS Zero-Days, 4Chan Breach, NTLM exploits, and WhatsApp spyware." Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.  Accessed on 21 April 2025, 1402 UTC. Content and Source:  https://www.thehackernews.com. Please check link or scroll down to read your selections.  Thanks for joining us today. Russ Roberts (https://www.hawaiicybersecurityjournal.net).   Can a harmless click really lead to a full-blown cyberattack? Surprisingly, yes — and that’s exactly what we saw in last week’s activity. Hackers are getting better at hiding inside everyday actions: opening a file, running a project, or logging in like normal. No loud alerts. No obvious red flags. Just quiet entry through small gaps — like a misconfigured pipeline, a trusted browser feature, or reused login tokens. These aren’t just tech issues — they’re habits being exploited. Let’s walk through the biggest updates from the week and what...

The Hacker News: THN Weekly Recap

"THN Weekly Recap:  GitHub supply chain attack, AI malware, BYOVD tactics." Views expessed in this cybersecurity, cyber crime, and security update are those of the reporters and correspondents.  Accessed on 24 March 2025, 1527 UTC. Content and Source:  https://thehackernew.com. Please check link or scroll down to read your selections.  Thanks for joining us today. Russ Roberts (https://www.hawaiicybersecurityjournal.net).   A quiet tweak in a popular open-source tool opened the door to a supply chain breach—what started as a targeted attack quickly spiraled, exposing secrets across countless projects. That wasn’t the only stealth move. A new all-in-one malware is silently stealing passwords, crypto, and control—while hiding in plain sight. And over 300 Android apps joined the chaos, running ad fraud at scale behind innocent-looking icons. Meanwhile, ransomware gangs are getting smarter—using stolen drivers to shut down defenses—and threat groups are quietly shif...