MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack

06/05/2026 0 Comments 0 tags

The Iranian state-sponsored hacking group known as MuddyWater (aka Mango Sandstorm, Seedworm, and Static Kitten) has been attributed to a ransomware attack in what has been described as a “false

The Hacker News Launches ‘Cybersecurity Stars Awards 2026’ — Submissions Now Open

06/05/2026 0 Comments 0 tags

For nearly 20 years, we at The Hacker News have mostly told scary stories about cyberspace — big hacks, broken systems, and new threats. But behind every headline, there’s a

Your AI Agents Are Already Inside the Perimeter. Do You Know What They’re Doing?

06/05/2026 0 Comments 0 tags

Analysts recently confirmed what identity security teams have quietly feared: AI agents are being deployed faster than enterprises can govern them. In their inaugural Market Guide for Guardian Agents, Gartner

Google’s Android Apps Get Public Verification to Stop Supply Chain Attacks

06/05/2026 0 Comments 0 tags

Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks. “This new public ledger ensures the Google apps on your device

Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs

06/05/2026 0 Comments 0 tags

Cybersecurity researchers have disclosed details of an intrusion that involved the use of a CloudZ remote access tool (RAT) and a previous undocumented plugin dubbed Pheno with the aim of

Palo Alto PAN-OS Flaw Under Active Exploitation Enables Remote Code Execution

06/05/2026 0 Comments 0 tags

Palo Alto Networks has released an advisory warning that a critical buffer overflow vulnerability in its PAN-OS software has been exploited in the wild. The vulnerability, tracked as CVE-2026-0300, has

Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE

05/05/2026 0 Comments 0 tags

The Apache Software Foundation (ASF) has released security updates to address several security vulnerabilities in the HTTP Server, including a severe vulnerability that could potentially lead to remote code execution

DAEMON Tools Supply Chain Attack Compromises Official Installers with Malware

05/05/2026 0 Comments 0 tags

A newly identified supply chain attack targeting DAEMON Tools software has compromised its installers to serve a malicious payload, according to findings from Kaspersky. “These installers are distributed from the

China-Linked UAT-8302 Targets Governments Using Shared APT Malware Across Regions

05/05/2026 0 Comments 0 tags

A sophisticated China-nexus advanced persistent threat (APT) group has been attributed to attacks targeting government entities in South America since at least late 2024 and government agencies in southeastern Europe

The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closed

05/05/2026 0 Comments 0 tags

Every AI tool, workflow automation, and productivity app your employees connected to Google or Microsoft this year left something behind: a persistent OAuth token with no expiration date, no automatic