Tag Google

Google’s AI-Driven OSS-Fuzz Tool Identifies 26 Vulnerabilities in Open Source Projects

Google recently announced that its AI-driven fuzzing tool, OSS-Fuzz, has successfully uncovered 26 vulnerabilities in multiple open-source code repositories. Among these is a medium-severity flaw identified in the widely used OpenSSL cryptographic library. The open-source security team from Google highlighted in a blog post, shared with The Hacker News, that…

Read MoreGoogle’s AI-Driven OSS-Fuzz Tool Identifies 26 Vulnerabilities in Open Source Projects

U.S. Federal Agencies Directed to Address Hundreds of Actively Exploited Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) in the United States has highlighted the urgent need for government agencies to address known cyber vulnerabilities. In a recent announcement, the agency published a comprehensive catalog containing vulnerabilities identified from major tech companies including Apple, Cisco, Microsoft, and Google. These vulnerabilities are…

Read MoreU.S. Federal Agencies Directed to Address Hundreds of Actively Exploited Vulnerabilities

BreachForums Founder, 20, Could Face Up to 5 Years in Prison

In a significant development within the cybersecurity landscape, Conor Brian Fitzpatrick, a 20-year-old who operated the now-defunct BreachForums, has been formally charged with conspiracy to commit access device fraud in the United States. This notable case highlights the growing scrutiny on online platforms facilitating cybercrime. Fitzpatrick, known online as “pompompurin,”…

Read MoreBreachForums Founder, 20, Could Face Up to 5 Years in Prison

Romantic Comedy Uncovers Sophisticated Cyberattacks Targeting Zero-Day Flaws in Firefox and Windows

RomCom Exploits Zero-Day Vulnerabilities in Firefox and Windows A sophisticated cyber operation attributed to the Russia-aligned threat actor known as RomCom has been reported, focusing on the exploitation of two zero-day vulnerabilities—one in Mozilla Firefox and another in Microsoft Windows. These attacks have been designed to deploy RomCom’s proprietary backdoor…

Read MoreRomantic Comedy Uncovers Sophisticated Cyberattacks Targeting Zero-Day Flaws in Firefox and Windows

Russia’s Coldriver Updates Malware to Bypass Detection

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime Russian Intelligence Hackers Adapt Strategies to Avoid Detection Chris Riotta (@chrisriotta) • October 21, 2025 A Russian Federal Security Service officer in assault gear. (Image: SGr/Shutterstock) A state-sponsored cyberespionage group from Russia, known for its targeting of policymakers, has swiftly enhanced its…

Read MoreRussia’s Coldriver Updates Malware to Bypass Detection

F5 Security Breach, Linux Rootkits, Pixnapping Threats, EtherHiding, and More

Recent revelations in cybersecurity highlight the increasing prevalence of long-term breaches, which often go unnoticed until substantial damage is done. A striking example is the incident involving F5, a significant player in the application delivery and security space. On August 9, 2025, F5 announced that unidentified threat actors had infiltrated…

Read MoreF5 Security Breach, Linux Rootkits, Pixnapping Threats, EtherHiding, and More

Hackers Develop New Method to Capture 2-Factor Authentication Codes from Android Devices

Recent reports reveal a concerning new attack method, identified as “Pixnapping,” that exposes vulnerabilities in Android devices, enabling attackers to surreptitiously acquire crucial information such as two-factor authentication codes, location data, and other sensitive details within a mere 30 seconds. The Pixnapping attack originates from a malicious app that must…

Read MoreHackers Develop New Method to Capture 2-Factor Authentication Codes from Android Devices

Hackers Can Access 2FA Codes and Private Messages on Android Devices

New Android Vulnerability Exposes User Data to Attackers Recent research has unveiled a serious vulnerability affecting Android devices, enabling the covert theft of sensitive information, including two-factor authentication codes and user location histories, all within a mere 30 seconds. This attack, termed “Pixnapping,” was developed by a team of academic…

Read MoreHackers Can Access 2FA Codes and Private Messages on Android Devices