The Hacker News - Latest News and Information
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Technology Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
The Hacker News

The Hacker News

Publication
0 followers

Security incidents, policy, threats impacting gov/defense.

Recent Posts

Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026
News•Feb 20, 2026

Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026

Identity cyber scores are emerging as the primary metric insurers use to underwrite cyber‑insurance policies in 2026. Insurers now scrutinize password hygiene, privileged‑access management and MFA coverage, linking weak identity controls to higher breach likelihood and premium costs. The global average data‑breach cost hit $4.4 million in 2025, prompting tighter underwriting and a shift toward demonstrable identity‑posture maturity. Organizations that can prove active monitoring of credentials and comprehensive MFA stand to secure lower premiums and more favorable policy terms.

By The Hacker News
Former Google Engineers Indicted Over Trade Secret Transfers to Iran
News•Feb 20, 2026

Former Google Engineers Indicted Over Trade Secret Transfers to Iran

Two former Google engineers and a spouse were indicted for allegedly stealing trade secrets related to Google’s Tensor processor and other hardware designs, then transferring the data to Iran. The defendants used personal devices, messaging channels, and manual photographs to...

By The Hacker News
INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown
News•Feb 19, 2026

INTERPOL Operation Red Card 2.0 Arrests 651 in African Cybercrime Crackdown

INTERPOL’s Operation Red Card 2.0, conducted from Dec 8 2025 to Jan 30 2026, resulted in 651 arrests across 16 African nations and the seizure of more than $4.3 million. The eight‑week crackdown exposed scams responsible for roughly $45 million in losses and identified 1,247 victims worldwide....

By The Hacker News
3 Ways to Start Your Intelligent Workflow Program
News•Feb 18, 2026

3 Ways to Start Your Intelligent Workflow Program

Security, IT and engineering teams face pressure to accelerate outcomes while extracting AI value, yet 88% of AI proofs‑of‑concept never reach production despite 70% of workers seeking time‑saving automation. The Hacker News article outlines three pre‑built intelligent‑workflow use cases—automated phishing response,...

By The Hacker News
SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer
News•Feb 17, 2026

SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer

Researchers have uncovered a new SmartLoader campaign that distributes a trojanized Oura Health Model Context Protocol (MCP) server to install the StealC infostealer. The malicious server is hosted in fabricated GitHub repositories and submitted to the MCP Market registry, exploiting...

By The Hacker News
Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations
News•Feb 13, 2026

Google Links China, Iran, Russia, North Korea to Coordinated Defense Sector Cyber Operations

Google Threat Intelligence Group disclosed a coordinated campaign by state‑sponsored actors from China, Iran, Russia and North Korea targeting the defense industrial base. The operations concentrate on battlefield technologies used in the Russia‑Ukraine war, recruitment‑process infiltration, edge‑device entry points, and...

By The Hacker News
Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History
News•Feb 13, 2026

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

Researchers uncovered a wave of malicious Chrome extensions that siphon data from corporate tools, social platforms, AI assistants, and general browsing activity. The CL Suite add‑on steals Meta Business Suite credentials and analytics, while VK‑styled extensions hijacked roughly 500,000 VKontakte...

By The Hacker News
Npm’s Update to Harden Their Supply Chain, and Points to Consider
News•Feb 13, 2026

Npm’s Update to Harden Their Supply Chain, and Points to Consider

npm completed a major authentication overhaul in December 2025, revoking classic long‑lived tokens and moving to short‑lived session tokens with MFA default for publishing. The changes also promote OIDC Trusted Publishing, giving CI systems per‑run credentials. However, MFA phishing attacks...

By The Hacker News
Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments
News•Feb 11, 2026

Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments

Pentera Labs identified nearly 2,000 publicly exposed training applications across cloud platforms, with about 60% hosted on AWS, Azure or GCP. Roughly one‑fifth of these instances contained crypto‑mining scripts, web‑shells or persistence tools, indicating active exploitation. The vulnerable apps were...

By The Hacker News
ZAST.AI Raises $6M Pre-A to Scale "Zero False Positive" AI-Powered Code Security
News•Feb 10, 2026

ZAST.AI Raises $6M Pre-A to Scale "Zero False Positive" AI-Powered Code Security

ZAST.AI announced a $6 million Pre‑Series A round led by Hillhouse Capital, bringing total funding near $10 million. The Seattle‑based startup claims its AI‑driven platform delivers “zero false‑positive” code security by automatically generating and validating proof‑of‑concept exploits. In 2025 the company uncovered...

By The Hacker News
How Samsung Knox Helps Stop Your Network Security Breach
News•Feb 6, 2026

How Samsung Knox Helps Stop Your Network Security Breach

Samsung Knox introduces a per‑app firewall and Zero‑Trust Network Access (ZTNA) that extend traditional enterprise security to mobile devices. The firewall provides granular, app‑specific rules and detailed logging, shrinking investigation times from days to hours. Knox ZTNA works alongside existing...

By The Hacker News
Compromised dYdX Npm and PyPI Packages Deliver Wallet Stealers and RAT Malware
News•Feb 6, 2026

Compromised dYdX Npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Security researchers uncovered a supply‑chain attack on dYdX's official npm package @dydxprotocol/v4-client-js and its PyPI counterpart dydx‑v4‑client. The compromised versions, published with legitimate maintainer credentials, embed wallet‑stealing code and, in the Python case, a remote‑access trojan. dYdX acknowledged the breach,...

By The Hacker News
AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
News•Feb 5, 2026

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

The AISURU/Kimwolf botnet launched a record‑setting DDoS attack in November 2025, peaking at 31.4 Tbps and lasting just 35 seconds. Cloudflare, which automatically mitigated the traffic, said the attack is part of a surge in hyper‑volumetric HTTP assaults, with average sizes...

By The Hacker News
The Buyer’s Guide to AI Usage Control
News•Feb 5, 2026

The Buyer’s Guide to AI Usage Control

Enterprises are grappling with an explosion of AI tools embedded in SaaS, browsers, and shadow applications, yet most security programs still rely on legacy, perimeter‑focused controls. The new Buyer’s Guide for AI Usage Control highlights that AI risk resides in...

By The Hacker News
The First 90 Seconds: How Early Decisions Shape Incident Response Investigations
News•Feb 4, 2026

The First 90 Seconds: How Early Decisions Shape Incident Response Investigations

Eric Zimmerman of the SANS Institute argues that incident response failures stem more from early‑stage decisions than from tool gaps. He defines the "first 90 seconds" as a repeatable decision window that recurs each time a new system enters scope,...

By The Hacker News
When Cloud Outages Ripple Across the Internet
News•Feb 3, 2026

When Cloud Outages Ripple Across the Internet

Recent high‑profile outages at AWS, Azure and Cloudflare have shown that cloud failures ripple far beyond compute, crippling the identity layer that underpins authentication and authorization. When shared services such as DNS, load balancers or managed databases go down, even...

By The Hacker News
Securing the Mid-Market Across the Complete Threat Lifecycle
News•Feb 2, 2026

Securing the Mid-Market Across the Complete Threat Lifecycle

Mid‑market firms face tight budgets and lean security teams, making traditional, siloed tools costly and inefficient. The article advocates a full‑lifecycle approach—prevention, protection, detection, and response—delivered through integrated platforms such as Bitdefender GravityZone. By unifying endpoint, cloud, identity, and network...

By The Hacker News
Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm
News•Feb 2, 2026

Open VSX Supply Chain Attack Used Compromised Dev Account to Spread GlassWorm

Researchers uncovered a supply‑chain breach of the Open VSX Registry where a legitimate developer’s credentials were hijacked to publish malicious updates of four popular extensions. The poisoned versions, released on Jan 30 2026, embedded the GlassWorm loader and were downloaded over 22,000...

By The Hacker News
Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
News•Jan 31, 2026

Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms

Mandiant reports a surge in ShinyHunters‑style vishing campaigns that harvest SSO credentials and MFA codes to infiltrate SaaS environments. The attacks, attributed to UNC6661, UNC6671, and UNC6240, impersonate IT staff and use fake credential‑harvesting sites to enroll attackers’ devices for...

By The Hacker News
Badges, Bytes and Blackmail
News•Jan 30, 2026

Badges, Bytes and Blackmail

Orange Cyberdefense compiled a dataset of 418 publicly announced law‑enforcement actions against cybercrime from 2021 to mid‑2025. The analysis shows extortion, malware distribution and hacking as the most frequently targeted offenses, with arrests accounting for 29% of responses. The United...

By The Hacker News
ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories
News•Jan 29, 2026

ThreatsDay Bulletin: New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

The FBI’s seizure of the RAMP cybercrime forum underscores law‑enforcement pressure on underground marketplaces, while Meta confronts a U.S. lawsuit alleging unauthorized access to WhatsApp messages. CISA published its first list of post‑quantum cryptography‑compatible products, urging organizations to prepare for...

By The Hacker News
3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026
News•Jan 29, 2026

3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026

Enterprises face escalating operational downtime risk, prompting CISOs to prioritize three strategic decisions. First, adopt STIX/TAXII‑compatible threat intelligence feeds that deliver fresh, high‑quality indicators, boosting detection rates by up to 58 %. Second, eliminate noisy false positives to protect analysts from...

By The Hacker News
Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware
News•Jan 28, 2026

Fake Moltbot AI Coding Assistant on VS Code Marketplace Drops Malware

Moltbot, an open‑source AI coding assistant with over 85,000 GitHub stars, has no official Visual Studio Code extension, yet a counterfeit "ClawdBot Agent – AI Coding Assistant" appeared on the Marketplace. Published on January 27 2026, the malicious extension automatically runs on IDE launch...

By The Hacker News
From Triage to Threat Hunts: How AI Accelerates SecOps
News•Jan 28, 2026

From Triage to Threat Hunts: How AI Accelerates SecOps

AI‑driven SOC agents are moving from hype to practical augmentation, handling every alert with human‑level accuracy. By automatically correlating telemetry from EDR, identity, cloud and network sources, they eliminate the triage bottleneck and achieve near‑zero dwell time. The continuous investigation...

By The Hacker News
Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan
News•Jan 28, 2026

Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan

Researchers uncovered two malicious PyPI packages, spellcheckerpy and spellcheckpy, that pretended to be spell‑checking tools but delivered a Python‑based remote‑access trojan. The packages were downloaded just over 1,000 times before being removed, with version 1.2.0 adding an execution trigger that runs...

By The Hacker News

Page 2 of 3

← Prev123Next →