- CrowdStrike Named a Leader in The Forrester Wave™: Managed Detection and Response Services in Europe, Q3 2025by Austin Murphy on September 4, 2025 at 5:00 am
- EMBER2024: Advancing the Training of Cybersecurity ML Models Against Evasive Malwareby Phil Roth on September 3, 2025 at 5:00 am
- Secure AI at Machine Speed: Defending the Growing Attack Surfaceby Dr. Beth Williams - Grace Ural on September 2, 2025 at 5:00 am
- CrowdStrike to Acquire Onum to Transform How Data Powers the Agentic SOCby Michael Sentonas on August 27, 2025 at 5:00 am
- CrowdStrike Named a Leader in 2025 IDC MarketScape for Worldwide Incident Response Servicesby Max Gebhardt on August 27, 2025 at 5:00 am
darkreading Public RSS feed
- How Has IoT Security Changed Over the Past 5 Years?by Arielle Waldman on September 5, 2025 at 8:46 pm
Experts agree there have been subtle improvements, with new laws and applied best practices, but there is still a long way to go.
- Critical SAP S/4HANA Vulnerability Under Attack, Patch Nowby Rob Wright on September 5, 2025 at 8:11 pm
Exploitation of CVE-2025-42957 requires "minimal effort" and can result in a complete compromise of the SAP system and host OS, according to researchers.
- Anyone Using Agentic AI Needs to Understand Toxic Flowsby Ericka Chickowski, Contributing Writer on September 5, 2025 at 7:34 pm
The biggest vulnerabilities may lie at the boundaries of where the AI agent connects with the enterprise system.
- Secretive MaaS Group 'TAG-150' Develops Novel 'CastleRAT'by Nate Nelson, Contributing Writer on September 5, 2025 at 6:28 pm
TAG-150 is running a multifaceted and relatively successful malware-as-a-service operation, without advertising itself on the Dark Web.
- Scammers Are Using Grok to Spread Malicious Links on Xby Nate Nelson, Contributing Writer on September 5, 2025 at 3:41 pm
It's called "grokking," and gives spammers a way to skirt X's ban on links in promoted posts and reach larger audiences than ever before.
The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to admin@thehackernews.com
- Noisy Bear Targets Kazakhstan Energy Sector With BarrelFire Phishing Campaignby info@thehackernews.com (The Hacker News) on September 6, 2025 at 3:13 pm
A threat actor possibly of Russian origin has been attributed to a new set of attacks targeting the energy sector in Kazakhstan. The activity, codenamed Operation BarrelFire, is tied to a new threat group tracked by Seqrite Labs as Noisy Bear. The threat actor has been active since at least April 2025. "The campaign is targeted towards employees of KazMunaiGas or KMG where the threat entity
- Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keysby info@thehackernews.com (The Hacker News) on September 6, 2025 at 6:42 am
A new set of four malicious packages have been discovered in the npm package registry with capabilities to steal cryptocurrency wallet credentials from Ethereum developers. "The packages masquerade as legitimate cryptographic utilities and Flashbots MEV infrastructure while secretly exfiltrating private keys and mnemonic seeds to a Telegram bot controlled by the threat actor," Socket researcher
- CISA Orders Immediate Patch of Critical Sitecore Vulnerability Under Active Exploitationby info@thehackernews.com (The Hacker News) on September 5, 2025 at 4:08 pm
Federal Civilian Executive Branch (FCEB) agencies are being advised to update their Sitecore instances by September 25, 2025, following the discovery of a security flaw that has come under active exploitation in the wild. The vulnerability, tracked as CVE-2025-53690, carries a CVSS score of 9.0 out of a maximum of 10.0, indicating critical severity. "Sitecore Experience Manager (XM), Experience
- TAG-150 Develops CastleRAT in Python and C, Expanding CastleLoader Malware Operationsby info@thehackernews.com (The Hacker News) on September 5, 2025 at 2:07 pm
The threat actor behind the malware-as-a-service (MaaS) framework and loader called CastleLoader has also developed a remote access trojan known as CastleRAT. "Available in both Python and C variants, CastleRAT's core functionality consists of collecting system information, downloading and executing additional payloads, and executing commands via CMD and PowerShell," Recorded Future Insikt Group
- SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wildby info@thehackernews.com (The Hacker News) on September 5, 2025 at 10:59 am
A critical security vulnerability impacting SAP S/4HANA, an Enterprise Resource Planning (ERP) software, has come under active exploitation in the wild. The command injection vulnerability, tracked as CVE-2025-42957 (CVSS score: 9.9), was fixed by SAP as part of its monthly updates last month. "SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module