Cybersecurity News
Understand the Threats. Protect What Matters.
- The WIRED Guide to Digital Opsec for Teensby JP Aumasson, Lily Hay Newman on November 29, 2025 at 12:00 pm
Practicing good “operations security” is essential to staying safe online. Here’s a complete guide for teenagers (and anyone else) who wants to button up their digital lives.
- Poems Can Trick AI Into Helping You Make a Nuclear Weaponby Matthew Gault on November 28, 2025 at 10:00 am
It turns out all the guardrails in the world won’t protect a chatbot from meter and rhyme.
- 3 Best VPN for iPhone (2025), Tested and Reviewedby Jacob Roach on November 27, 2025 at 11:30 am
There are dozens of iPhone VPNs at your disposal, but these are the services that will actually keep your browsing safe.
- Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’by BrianKrebs on November 26, 2025 at 5:22 pm
A prolific cybercriminal group that calls itself “Scattered LAPSUS$ Hunters” made headlines regularly this year by stealing data from and publicly mass extorting dozens of major corporations. But the tables seem to have turned somewhat for “Rey,” the moniker chosen by the technical operator and public face of the hacker group: Earlier this week, Rey confirmed his real life identity and agreed to an interview after KrebsOnSecurity tracked him down and contacted his father.
- The Destruction of a Notorious Myanmar Scam Compound Appears to Have Been ‘Performative’by Matt Burgess on November 26, 2025 at 4:33 pm
Myanmar’s military has been blowing up parts of the KK Park scam compound. Experts say the actions are likely for show.
The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to [email protected]
- Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packagesby [email protected] (The Hacker News) on November 28, 2025 at 4:27 pm
Cybersecurity researchers have discovered vulnerable code in legacy Python packages that could potentially pave the way for a supply chain compromise on the Python Package Index (PyPI) via a domain takeover attack. Software supply chain security company ReversingLabs said it found the “vulnerability” in bootstrap files provided by a build and deployment automation tool named “zc.buildout.” “The
- North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malwareby [email protected] (The Hacker News) on November 28, 2025 at 4:18 pm
The North Korean threat actors behind the Contagious Interview campaign have continued to flood the npm registry with 197 more malicious packages since last month. According to Socket, these packages have been downloaded over 31,000 times, and are designed to deliver a variant of OtterCookie that brings together the features of BeaverTail and prior versions of OtterCookie. Some of the
- Why Organizations Are Turning to RPAMby [email protected] (The Hacker News) on November 28, 2025 at 11:09 am
As IT environments become increasingly distributed and organizations adopt hybrid and remote work at scale, traditional perimeter-based security models and on-premises Privileged Access Management (PAM) solutions no longer suffice. IT administrators, contractors and third-party vendors now require secure access to critical systems from any location and on any device, without compromising
- MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenantsby [email protected] (The Hacker News) on November 28, 2025 at 8:33 am
Cybersecurity researchers have shed light on a cross-tenant blind spot that allows attackers to bypass Microsoft Defender for Office 365 protections via the guest access feature in Teams. “When users operate as guests in another tenant, their protections are determined entirely by that hosting environment, not by their home organization,” Ontinue security researcher Rhys Downing said in a report
- Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistanby [email protected] (The Hacker News) on November 27, 2025 at 6:13 pm
The threat actor known as Bloody Wolf has been attributed to a cyber attack campaign that has targeted Kyrgyzstan since at least June 2025 with the goal of delivering NetSupport RAT. As of October 2025, the activity has expanded to also single out Uzbekistan, Group-IB researchers Amirbek Kurbanov and Volen Kayo said in a report published in collaboration with Ukuk, a state enterprise under the





.png)




