Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive

Nov 03, 2025Ravie LakshmananCryptocurrency / Threat Intelligence Cybersecurity researchers have flagged a new malicious extension in the Open VSX registry that harbors a remote access trojan called SleepyDuck. According to Secure Annex’s John Tuckner, the extension in question, juan-bianco.solidity-vlang (version 0.0.7), was first published on October 31, 2025, as a completely benign library that was […]

Continue Reading

Palantir tops estimates, boosts fourth-quarter guidance on AI adoption

Alex Karp, chief executive officer of Palantir Technologies Inc., speaks during the AIPCon conference in Palo Alto, California, US, on March 13, 2025. David Paul Morris | Bloomberg | Getty Images Palantir reported quarterly results that topped analysts’ estimates and issued better-than-expected guidance for the fourth quarter, attributing much of its strength to artificial intelligence. […]

Continue Reading

Lambda, Microsoft agree to multibillion-dollar AI infrastructure deal with Nvidia chips

Cloud computing startup Lambda announced on Monday a multibillion-dollar deal with Microsoft for artificial intelligence infrastructure powered by tens of thousands of Nvidia chips. The agreement comes as Lambda benefits from surging consumer demand for AI-powered services, including AI chatbots and assistants, CEO Stephen Balaban told CNBC’s “Money Movers” on Monday. “We’re in the middle […]

Continue Reading

India’s Smartphone Shipments Grew 5 Percent YoY in Q3 2025; Apple Enters List of Top 5 Phone Makers: Counterpoint

India’s smartphone market witnessed a year-on-year (YoY) growth of 5 percent by volume and 18 percent by value in the third quarter (Q3) of 2025, according to Counterpoint Research’s Monthly India Smartphone Tracker. The report highlights that this marks a value-led shift in consumer behaviour. Moreover, Apple has entered the list of the top five […]

Continue Reading

The Evolution of SOC Operations: How Continuous Exposure Management Transforms Security Operations

Nov 03, 2025The Hacker NewsSOC Operations / Exposure Management Security Operations Centers (SOC) today are overwhelmed. Analysts handle thousands of alerts every day, spending much time chasing false positives and adjusting detection rules reactively. SOCs often lack the environmental context and relevant threat intelligence needed to quickly verify which alerts are truly malicious. As a […]

Continue Reading

Cybercriminals Exploit Remote Monitoring Tools to Infiltrate Logistics and Freight Networks

Nov 03, 2025Ravie LakshmananCybercrime / Supply Chain Attack Bad actors are increasingly training their sights on trucking and logistics companies with an aim to infect them with remote monitoring and management (RMM) software for financial gain and ultimately steal cargo freight. The threat cluster, believed to be active since at least June 2025 according to […]

Continue Reading

⚡ Weekly Recap: Lazarus Hits Web3, Intel/AMD TEEs Cracked, Dark Web Leak Tool & More

Nov 03, 2025Ravie LakshmananCybersecurity / Hacking News Cyberattacks are getting smarter and harder to stop. This week, hackers used sneaky tools, tricked trusted systems, and quickly took advantage of new security problems—some just hours after being found. No system was fully safe. From spying and fake job scams to strong ransomware and tricky phishing, the […]

Continue Reading

Researchers Uncover BankBot-YNRK and DeliveryRAT Android Trojans Stealing Financial Data

Cybersecurity researchers have shed light on two different Android trojans called BankBot-YNRK and DeliveryRAT that are capable of harvesting sensitive data from compromised devices. According to CYFIRMA, which analyzed three different samples of BankBot-YNRK, the malware incorporates features to sidestep analysis efforts by first checking its running within a virtualized or emulated environment, and then […]

Continue Reading

New HttpTroy Backdoor Poses as VPN Invoice in Targeted Cyberattack on South Korea

Nov 03, 2025Ravie LakshmananCybersecurity / Malware The North Korea-linked threat actor known as Kimsuky has distributed a previously undocumented backdoor codenamed HttpTroy as part of a likely spear-phishing attack targeting a single victim in South Korea. Gen Digital, which disclosed details of the activity, did not reveal any details on when the incident occurred, but […]

Continue Reading