The attacker crafts a malicious serialized payload designed to abuse the deserialization routine, a technique commonly used to trigger arbitrary object instantiation or method invocation on a server. The payload is sent via an HTTP …
Hackers
Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials
Ravie LakshmananApr 02, 2026Vulnerability / Threat Intelligence A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection vector to steal database credentials, SSH private keys, Amazon Web …
Iran-Linked Hackers Breach FBI Director’s Personal Email, Hit Stryker With Wiper Attack
Threat actors with ties to Iran successfully broke into the personal email account of Kash Patel, the director of the U.S. Federal Bureau of Investigation (FBI), and leaked a cache …
Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker – Krebs on Security
A hacktivist group with links to Iran’s intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of …
Security hole could let hackers take over Juniper Networks PTX core routers
Another option is to disable the service by entering request pfe anomalies disable in the operating system’s command line. Sharma said Juniper vulnerabilities have attracted a lot of attention from …
The cyber domain has become increasingly important in national defense, with cyber espionage supporting military operations in regional conflicts and cyberattacks increasingly being used against defense firms and other members …
Konni Hackers Deploy AI-Generated PowerShell Backdoor Against Blockchain Developers
Ravie LakshmananJan 26, 2026Malware / Endpoint Security The North Korean threat actor known as Konni has been observed using PowerShell malware generated using artificial intelligence (AI) tools to target developers …
Google Identifies Three New Russian Malware Families Created by COLDRIVER Hackers
Oct 21, 2025Ravie LakshmananCyber Espionage / Threat Intelligence A new malware attributed to the Russia-linked hacking group known as COLDRIVER has undergone numerous developmental iterations since May 2025, suggesting an …
Critical Exploit Lets Hackers Bypass Authentication in WordPress Service Finder Theme
Oct 09, 2025Ravie LakshmananVulnerability / Website Security Threat actors are actively exploiting a critical security flaw impacting the Service Finder WordPress theme that makes it possible to gain unauthorized access …