Cybersecurity

Nov 05, 2025The Hacker NewsMobile Security / Enterprise IT Raise your hand if you've heard the myth, "Android isn't secure." Android phones, such as the Samsung Galaxy, unlock new ways of working. But, as an IT admin, you...
On paper, it sounds so simple: you prepare for the real thing by running simulations. After all, the same principle applies to countless disciplines: sports, the military, transport, crisis preparedness, and many more. And, of course,...

BlueNoroff’s latest campaigns: GhostCall and GhostHire

Introduction Primarily focused on financial gain since its appearance, BlueNoroff (aka. Sapphire Sleet, APT38, Alluring Pisces, Stardust Chollima, and TA444) has adopted new infiltration strategies...

Identifying “research” and bug bounty related scans?

This week, I noticed some new HTTP request headers that I had not seen before: X-Request-Purpose: Research and X-Hackerone-Research: plusultra X-Bugcrowd-Ninja: plusultra X-Bug-Hunter: true The purpose of these headers appears...

Spam text scammer fined £200,000 for targeting people in debt, after sending nearly one million messages

The UK Information Commissioner’s Office (ICO) has levied a fine of £200,000 (US $260,000) against a sole trader who sent almost one million spam...

MG – Darknet Diaries

Full Transcript In this episode we talk with MG (https://x.com/MG), the brilliant (and notorious) hacker and hardware engineer behind the OMG...

Preventing business disruption and building cyber-resilience with MDR

Given the serious financial and reputational risks of incidents that grind business...

How We (Almost) Found Chromium’s Bug via Crash Reports to Report URI

Tracking down bugs in software is a pain that all of us...

F5 network compromised – Sophos News

On October 15, 2025, F5 reported that a nation-state threat actor had gained long-term access to some F5 systems and exfiltrated data, including source...

Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack

The ransomware group known as Qilin (aka Agenda, Gold Feather, and Water Galura) has claimed more than 40 victims every month since the start...

Rubrik & Sophos Enhance Cyber Resilience for Microsoft 365 – Sophos News

Cybersecurity attacks are rising sharply in 2025, and Microsoft has been one among many prominent targets. Research shows that 70 percent of M365 tenants...

The BetterBank DeFi protocol exploited for reward minting

Executive summary From August 26 to 27, 2025, BetterBank, a decentralized finance (DeFi) protocol operating on the PulseChain network, fell victim to a sophisticated exploit...

Phishing Cloud Account for Information

Over the past two months, my outlook account has been receiving phishing email regarding cloud storage payments, mostly in French and some English with...

How to hack a prison, and the hidden threat of online checkouts • Graham Cluley

A literal insider threat: we head to a Romanian prison where “self-service” web kiosks allowed inmates...

Recent articles