Home News

News

News from the cyber security world and abroad. Enjoy current affairs of the cyber underground and more. Browse popular news articles covering hackers and cybercrimnals alike. Discover new vulnerabilities and emerging threats that we cover. Looking for Malware or data breach related articles? Than the cyber post has all the cybersecurity information you can take in!

In addition to current affairs, we like to educate our readers. For instance, we have a learning section. Head over to our educational section and enjoy. Read some great tips and articles for securing your accounts and data. Protect yourself from phishing and basic password vulnerabilities. Looking for something more exciting to read? Than maybe some darknet stories will tickle your fancy. But sit back and enjoy exciting cybercrime stories from the darkweb. Learn of arrests and the data that carders and fraudsters peddle in.

Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacks

0
Jun 11, 2025Ravie LakshmananRansomware / Cybercrime Former members tied to the Black Basta ransomware operation have been observed sticking to their tried-and-tested approach of email bombing and Microsoft Teams phishing...

Over 70 Organizations Across Multiple Sectors Targeted by China-Linked Cyber Espionage Group

0
Jun 09, 2025Ravie LakshmananGovernment Security / Cyber Espionage The reconnaissance activity targeting American cybersecurity company SentinelOne was part of a broader set of partially-related intrusions into several targets between July...

New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack

0
A critical infrastructure entity within Ukraine was targeted by a previously unseen data wiper malware named PathWiper, according to new findings from Cisco Talos. "The attack was instrumented via a...

Scattered Spider: Understanding Help Desk Scams and How to Defend Your Organization

0
In the wake of high-profile attacks on UK retailers Marks & Spencer and Co-op, Scattered Spider has been all over the media, with coverage spilling over into the mainstream...

China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil

0
May 30, 2025Ravie LakshmananVulnerability / Threat Intelligence The China-linked threat actor behind the recent in-the-wild exploitation of a critical security flaw in SAP NetWeaver has been attributed to a broader...

DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints

0
The threat actors behind the DragonForce ransomware gained access to an unnamed Managed Service Provider's (MSP) SimpleHelp remote monitoring and management (RMM) tool, and then leveraged it to exfiltrate...

Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools

0
Fake installers for popular artificial intelligence (AI) tools like OpenAI ChatGPT and InVideo AI are being used as lures to propagate various threats, such as the CyberLock and Lucky_Gh0$t...

From Infection to Access: A 24-Hour Timeline of a Modern Stealer Campaign

0
May 28, 2025The Hacker NewsIdentity Theft / Enterprise Security Stealer malware no longer just steals passwords. In 2025, it steals live sessions—and attackers are moving faster and more efficiently than...

Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore

0
May 28, 2025Ravie LakshmananRansomware / Data Breach An Iranian national has pleaded guilty in the U.S. over his involvement in an international ransomware and extortion scheme involving the Robbinhood ransomware. Sina...

Hackers Are Calling Your Office: FBI Alerts Law Firms to Luna Moth’s Stealth Phishing...

0
May 27, 2025Ravie LakshmananData Breach / Social Engineering The U.S. Federal Bureau of Investigation (FBI) has warned of social engineering attacks mounted by a criminal extortion actor known as Luna...