News

The Hacker News
thehackernews.com > 2026 > 02 > malicious-chrome-extensions-caught.html

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History

Malicious Chrome Extensions Caught Stealing Business Data, Emails, and Browsing History1+ hour, 44+ min ago   (961+ words) Cybersecurity researchers have discovered a malicious Google Chrome extension that's designed to steal data associated with Meta Business Suite and Facebook Business Manager. The extension, named CL Suite by @CLMasters (ID: jkphinfhmfkckkcnifhjiplhfoiefffl), is marketed as a way to scrape Meta Business…...

The Hacker News
thehackernews.com > 2026 > 02 > npms-update-to-harden-their-supply.html

npm’s Update to Harden Their Supply Chain, and Points to Consider

npm’s Update to Harden Their Supply Chain, and Points to Consider2+ hour, 24+ min ago   (505+ words) In December 2025, in response to the Sha1-Hulud incident, npm completed a major authentication overhaul intended to reduce supply-chain attacks. While the overhaul is a solid step forward, the changes don't make npm projects immune from supply-chain attacks. npm is still…...

The Hacker News
thehackernews.com > 2026 > 02 > researchers-observe-in-wild.html

Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability

Researchers Observe In-the-Wild Exploitation of BeyondTrust CVSS 9.9 Vulnerability4+ hour, 35+ min ago   (773+ words) Threat actors have started to exploit a recently disclosed critical security flaw impacting BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) products, according to watchTowr. "Overnight we observed first in-the-wild exploitation of BeyondTrust across our global sensors," Ryan Dewhurst,…...

The Hacker News
thehackernews.com > 2026 > 02 > google-reports-state-backed-hackers.html

Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support

Google Reports State-Backed Hackers Using Gemini AI for Recon and Attack Support19+ hour, 12+ min ago   (577+ words) Google on Thursday said it observed the North Korea-linked threat actor known as UNC2970 using its generative artificial intelligence (AI) model Gemini to conduct reconnaissance on its targets, as various hacking groups continue to weaponize the tool for accelerating various phases…...

The Hacker News
thehackernews.com > 2026 > 02 > the-ctem-divide-why-84-of-security.html

The CTEM Divide: Why 84% of Security Programs Are Falling Behind

The CTEM Divide: Why 84% of Security Programs Are Falling Behind1+ day, 2+ hour ago   (13+ words) The CTEM Divide: Why 84% of Security Programs Are Falling Behind'The Hacker News...

The Hacker News
thehackernews.com > 2026 > 02 > 83-of-ivanti-epmm-exploits-linked-to.html

83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure

83% of Ivanti EPMM Exploits Linked to Single IP on Bulletproof Hosting Infrastructure1+ day, 5+ hour ago   (390+ words) A significant chunk of the exploitation attempts targeting a newly disclosed security flaw in Ivanti Endpoint Manager Mobile (EPMM) can be traced back to a single IP address on bulletproof hosting infrastructure offered by PROSPERO. Threat intelligence firm GreyNoise said…...

The Hacker News
thehackernews.com > 2026 > 02 > apple-fixes-exploited-zero-day.html

Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices

Apple Fixes Exploited Zero-Day Affecting iOS, macOS, and Apple Devices1+ day, 7+ hour ago   (342+ words) Apple on Wednesday released iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS updates to address a zero-day flaw that it said has been exploited in sophisticated cyber attacks. The vulnerability, tracked as CVE-2026-20700 (CVSS score: N/A), has been described as…...

The Hacker News
thehackernews.com > 2026 > 02 > first-malicious-outlook-add-in-found.html

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials

First Malicious Outlook Add-In Found Stealing 4,000+ Microsoft Credentials1+ day, 19+ hour ago   (666+ words) Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the wild. In this unusual supply chain attack detailed by Koi Security, an unknown attacker claimed the domain associated with a now-abandoned legitimate…...

The Hacker News
thehackernews.com > 2026 > 02 > apt36-and-sidecopy-launch-cross.html

APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities

1+ day, 22+ hour ago   (459+ words) Indian defense sector and government-aligned organizations have been targeted by multiple campaigns that are designed to compromise Windows and Linux environments with remote access trojans capable of stealing sensitive data and ensuring continued access to infected machines. The campaigns are…...

The Hacker News
thehackernews.com > 2026 > 02 > over-60-software-vendors-issue-security.html

Over 60 Software Vendors Issue Security Fixes Across OS, Cloud, and Network Platforms

1+ day, 23+ hour ago   (373+ words) It's Patch Tuesday, which means a number of software vendors have released patches for various security vulnerabilities impacting their products and services. Microsoft issued fixes for 59 flaws, including six actively exploited zero-days in various Windows components that could be abused…...