Skip to content
-
  • Home
  • About
  • Store
  • Contact
  • Privacy Policy
  • Terms and Conditions
Subscribe to our TAHN & never miss our best posts. Subscribe Now!
The Ash Hacker News

The Ash Hacker News

(TAHN) We Hack, We Educate, We Protect

  • Home
  • Cyber Attacks
  • Vulnerabilities
  • Data Breaches
  • #Trend
  • Contact
  • Facebook
  • Twitter
  • Telegram
  • Instagram
  • Youtube
Subscribe
Top Stories
Malicious PyPI Packages Compromised Cloud Tokens – Over 14,100 Downloads Before Removal
March 15, 2025
Alleged Israeli LockBit Developer Rostislav Panev
Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime
March 15, 2025
Fake CAPTCHA Scam Installs OBSCURE#BAT Malware & Rootkit r77
March 14, 2025
MassJacker Clipper Malwares
New MassJacker Malware Exploits Piracy Users to Hijack Cryptocurrency Transactions
March 14, 2025
Over 400 IPs Exploiting Multiple SSRF Vulnerabilities
Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in a Coordinated Cyber Attack
March 13, 2025
Chinese Hackers Exploit Juniper Networks Routers Using Custom Backdoors and Rootkits
March 13, 2025
Firefox Add-Ons, Security Features
WARNING: Expiring Root Certificate Could Impact Firefox Add-Ons, Security Features, and DRM Playback
March 13, 2025
Meta Warns of FreeType Vulnerability
Meta Issues Warning on FreeType Vulnerability (CVE-2025-27363) Amid Active Exploitation Concerns
March 13, 2025
Pentesters: Is AI Taking Over the Role?
March 12, 2025
URGENT: Microsoft Addresses 57 Security Vulnerabilities, Including Six Actively Exploited Zero-Days
March 12, 2025
Apple Releases Patch for WebKit Zero
Apple Releases Security Patch to Fix WebKit Zero-Day Vulnerability Exploited in Targeted Attacks
March 12, 2025
Google Wallet to Launch in Pakistan on March 12 A Transformational Leap in Digital Payments
March 12, 2025
SideWinder APT: Strategic Cyber Warfare Targeting Critical Sectors Across Asia, the Middle East, and Africa
March 11, 2025
Ragnar Loader: A Key Tool for Persistent Access and Ransomware Operations by Cybercrime Groups
March 8, 2025
Microsoft Issues Warning Over Malvertising Attack Affecting Over 1 Million Devices Worldwide
March 8, 2025
Introducing The Stargate Project
March 7, 2025
Safe{Wallet} Reports North Korean TraderTraitor Hackers Responsible for $1.5 Billion Bybit Heist
March 7, 2025
U.S. Charges Employees of China’s iSoon Cybersecurity Firm in Hacking Scheme
March 6, 2025
Identity: The New Cybersecurity Battleground
March 5, 2025
Lotus Panda, a Chinese APT, Strikes Governments with Updated Sagerunex Backdoor Variants
March 5, 2025
Researchers Connect CACTUS Ransomware Strategies to Former Black Basta Affiliates
March 5, 2025
Seven Malicious Go Packages Discovered Deploying Malware on Linux and macOS Systems
March 5, 2025
Google Disables uBlock Origin for More Chrome Users
March 4, 2025
Microsoft 365 Faces New Outage Impacting Teams, Leading to Call Failures
March 4, 2025
U.K. ICO Launches Investigation into TikTok, Reddit, and Imgur Over Protection of Children’s Data
March 4, 2025
Google’s March 2025 Android Security Update Addresses Two Actively Exploited Vulnerabilities
March 4, 2025
Flaws in Cisco, Hitachi, Microsoft, and Progress Software Actively Targeted—CISA Issues Warning
March 4, 2025
The Rise of New Ransomware Groups in 2025
March 3, 2025
Red Report 2025: Analyzing the Top ATT&CK Techniques Used by 93% of Malware
March 3, 2025
Vo1d Botnet Reaches New Heights with Over 1.59 Million Infected Android TVs Across 226 Countries
March 3, 2025
Microsoft is officially shutting down Skype in May
March 1, 2025
Amnesty Reports Cellebrite’s Zero-Day Exploit Used to Access Serbian Activist’s Android Device
March 1, 2025
Mozilla Revises Firefox Terms After Concerns Over Data License Clause
March 1, 2025
12,000+ API Keys and Authentication Credentials Found in Public Datasets for LLM Training: A Critical Security Concern
February 28, 2025
When Will Your Samsung Galaxy Phone Receive the One UI 7 Update?
February 27, 2025
Slack Experiences Service Disruption as Users Report Connectivity Issues
February 27, 2025
Bybit Hack Traced to Safe{Wallet} Supply Chain Exploited by North Korean Hackers
February 27, 2025
elecrama 2025
Eaton Introduces Advanced Smart Power Management Solutions at ELECRAMA 2025
February 24, 2025
Apple Data Protection
Apple Discontinues iCloud’s Advanced Data Protection in the U.K. Following Encryption Backdoor Requests
February 24, 2025
OpenAI Bans Accounts Misusing ChatGPT for Surveillance and Influence Campaigns
February 24, 2025
Data Leak Exposes TopSec’s Involvement in China’s Censorship-as-a-Service Operations
February 22, 2025
Bybit Exchange Hack-Over $1.4 Billion in ETH-Linked Tokens Stolen
February 21, 2025
Cybercriminals Can Clone Any Brand’s Website in Minutes with the New Darcula PhaaS v3
February 21, 2025
Pokémon Go Reportedly Up for Sale with a Price Tag of $3.5 Billion
February 21, 2025
CISA Issues Warning About Critical Vulnerability in Craft CMS- CVE-2025-23209 Under Active Attack
February 21, 2025
grok 3 ai: A Paradigm Shift in Artificial Intelligence
February 20, 2025
Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives
February 20, 2025
North Korean Hackers Exploit Job Scams to Target Freelance Developers with Malware
February 20, 2025
China-Linked Hackers Exploit Check Point Vulnerability to Deploy ShadowPad and Ransomware
February 20, 2025
Posted inCyber Attacks Data Breaches Vulnerabilities

Malicious PyPI Packages Compromised Cloud Tokens – Over 14,100 Downloads Before Removal

Cybersecurity experts have identified a malicious campaign targeting users of the Python Package Index (PyPI) repository. This campaign…
Continue Reading
Posted by Admin March 15, 2025No Comments
Alleged Israeli LockBit Developer Rostislav Panev
Posted inCyber Attacks Data Breaches Vulnerabilities

Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime

Alleged Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime Charges A 51-year-old individual holding both Russian…
Continue Reading
Posted by Admin March 15, 2025No Comments
Posted inCyber Attacks Data Breaches Vulnerabilities

Fake CAPTCHA Scam Installs OBSCURE#BAT Malware & Rootkit r77

OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection A recently identified malware campaign…
Continue Reading
Posted by Admin March 14, 2025No Comments
MassJacker Clipper Malwares
Posted inCyber Attacks Data Breaches Vulnerabilities

New MassJacker Malware Exploits Piracy Users to Hijack Cryptocurrency Transactions

A newly discovered malware campaign is actively targeting individuals searching for pirated software, deploying a previously undocumented clipper…
Continue Reading
Posted by Admin March 14, 2025No Comments
Over 400 IPs Exploiting Multiple SSRF Vulnerabilities
Posted inCyber Attacks Data Breaches Vulnerabilities

Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in a Coordinated Cyber Attack

According to their analysis, over 400 IP addresses have been observed simultaneously targeting multiple SSRF CVEs, indicating a…
Continue Reading
Posted by Admin March 13, 2025No Comments
Posted inCyber Attacks Data Breaches Vulnerabilities

Chinese Hackers Exploit Juniper Networks Routers Using Custom Backdoors and Rootkits

Advanced Backdoor CapabilitiesAccording to a report by Mandiant, a Google-owned cybersecurity firm, these backdoors possess a range of…
Continue Reading
Posted by Admin March 13, 2025No Comments
Today Best Trending Topics
Malicious PyPI Packages Compromised Cloud Tokens – Over 14,100 Downloads Before Removal
Posted inCyber Attacks Data Breaches Vulnerabilities

Malicious PyPI Packages Compromised Cloud Tokens – Over 14,100 Downloads Before Removal

Cybersecurity experts have identified a malicious campaign targeting users of the Python Package Index (PyPI) repository. This campaign…
Read More
Posted by Admin March 15, 2025
Alleged Israeli LockBit Developer Rostislav Panev
Posted inCyber Attacks Data Breaches Vulnerabilities

Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime

Alleged Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime Charges A 51-year-old individual holding both Russian…
Read More
Posted by Admin March 15, 2025
Fake CAPTCHA Scam Installs OBSCURE#BAT Malware & Rootkit r77
Posted inCyber Attacks Data Breaches Vulnerabilities

Fake CAPTCHA Scam Installs OBSCURE#BAT Malware & Rootkit r77

OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection A recently identified malware campaign…
Read More
Posted by Admin March 14, 2025
MassJacker Clipper Malwares
Posted inCyber Attacks Data Breaches Vulnerabilities

New MassJacker Malware Exploits Piracy Users to Hijack Cryptocurrency Transactions

A newly discovered malware campaign is actively targeting individuals searching for pirated software, deploying a previously undocumented clipper…
Read More
Posted by Admin March 14, 2025
Over 400 IPs Exploiting Multiple SSRF Vulnerabilities
Posted inCyber Attacks Data Breaches Vulnerabilities

Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in a Coordinated Cyber Attack

According to their analysis, over 400 IP addresses have been observed simultaneously targeting multiple SSRF CVEs, indicating a…
Read More
Posted by Admin March 13, 2025
Chinese Hackers Exploit Juniper Networks Routers Using Custom Backdoors and Rootkits
Posted inCyber Attacks Data Breaches Vulnerabilities

Chinese Hackers Exploit Juniper Networks Routers Using Custom Backdoors and Rootkits

Advanced Backdoor CapabilitiesAccording to a report by Mandiant, a Google-owned cybersecurity firm, these backdoors possess a range of…
Read More
Posted by Admin March 13, 2025
Firefox Add-Ons, Security Features
Posted inCyber Attacks Data Breaches Vulnerabilities

WARNING: Expiring Root Certificate Could Impact Firefox Add-Ons, Security Features, and DRM Playback

According to Mozilla, a critical root certificate used for verifying signed content and add-ons across multiple Mozilla projects,…
Read More
Posted by Admin March 13, 2025
Meta Warns of FreeType Vulnerability
Posted inCyber Attacks Data Breaches Vulnerabilities

Meta Issues Warning on FreeType Vulnerability (CVE-2025-27363) Amid Active Exploitation Concerns

Meta Issues Warning on FreeType Vulnerability (CVE-2025-27363) Amid Active Exploitation Concerns This vulnerability, identified as CVE-2025-27363, has been…
Read More
Posted by Admin March 13, 2025
Pentesters: Is AI Taking Over the Role?
Posted inCyber Attacks Data Breaches Vulnerabilities

Pentesters: Is AI Taking Over the Role?

For years, the concern has persisted: Is AI poised to replace human jobs? In 2017, McKinsey released a…
Read More
Posted by Admin March 12, 2025
URGENT: Microsoft Addresses 57 Security Vulnerabilities, Including Six Actively Exploited Zero-Days
Posted inVulnerabilities

URGENT: Microsoft Addresses 57 Security Vulnerabilities, Including Six Actively Exploited Zero-Days

Microsoft has rolled out security updates to fix 57 vulnerabilities in its software, including six critical zero-day flaws…
Read More
Posted by Admin March 12, 2025

Posts pagination

1 2 3 … 5 Next page

Recent Posts

  • Malicious PyPI Packages Compromised Cloud Tokens – Over 14,100 Downloads Before Removal
  • Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime
  • Fake CAPTCHA Scam Installs OBSCURE#BAT Malware & Rootkit r77
  • New MassJacker Malware Exploits Piracy Users to Hijack Cryptocurrency Transactions
  • Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in a Coordinated Cyber Attack
You May Have Missed
Posted inCyber Attacks Data Breaches Vulnerabilities

Malicious PyPI Packages Compromised Cloud Tokens – Over 14,100 Downloads Before Removal

Posted by Admin March 15, 2025
Alleged Israeli LockBit Developer Rostislav Panev
Posted inCyber Attacks Data Breaches Vulnerabilities

Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime

Posted by Admin March 15, 2025
Posted inCyber Attacks Data Breaches Vulnerabilities

Fake CAPTCHA Scam Installs OBSCURE#BAT Malware & Rootkit r77

Posted by Admin March 14, 2025
MassJacker Clipper Malwares
Posted inCyber Attacks Data Breaches Vulnerabilities

New MassJacker Malware Exploits Piracy Users to Hijack Cryptocurrency Transactions

Posted by Admin March 14, 2025

The Ash Hacker News (TAHN) is a leading, trusted, widely recognized dedicated cybersecurity news platform with over 7 million monthly readers including IT professionals, researchers, hackers, technologists and fans.
Read More

Copyright 2025 — . All rights reserved.
Scroll to Top