Author: VanshTheHacker

  • MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack

    MuddyWater Uses Microsoft Teams to Steal Credentials in False Flag Ransomware Attack

    The Iranian state-sponsored hacking group known as MuddyWater (aka Mango Sandstorm, Seedworm, and Static Kitten) has been attributed to a ransomware attack in what has been described as a “false flag” operation.
    The attack, observed by Rapid7 in early 2026, has been found to leverage social engineering techniques via Microsoft Teams to initiate the infection sequence. Although the incident

  • The Hacker News Launches ‘Cybersecurity Stars Awards 2026’ — Submissions Now Open

    The Hacker News Launches ‘Cybersecurity Stars Awards 2026’ — Submissions Now Open

    For nearly 20 years, we at The Hacker News have mostly told scary stories about cyberspace — big hacks, broken systems, and new threats.
    But behind every headline, there’s a quieter, better story.
    It’s the story of leaders making tough calls under pressure, teams building smarter defenses, and security products that keep hunting threats 24/7 — even when it’s hard.
    Most of the time, this work is

  • Your AI Agents Are Already Inside the Perimeter. Do You Know What They’re Doing?

    Your AI Agents Are Already Inside the Perimeter. Do You Know What They’re Doing?

    Analysts recently confirmed what identity security teams have quietly feared: AI agents are being deployed faster than enterprises can govern them. In their inaugural Market Guide for Guardian Agents, Gartner states that “enterprise adoption of AI agents is accelerating, outpacing maturity of governance policy controls.” Enterprise leaders can request access to the Gartner Market Guide for

  • Google’s Android Apps Get Public Verification to Stop Supply Chain Attacks

    Google’s Android Apps Get Public Verification to Stop Supply Chain Attacks

    Google has announced expanded Binary Transparency for Android as a way to safeguard the ecosystem from supply chain attacks.
    “This new public ledger ensures the Google apps on your device are exactly what we intended to build and distribute,” Google’s product and security teams said.
    The initiative builds upon the foundation of Pixel Binary Transparency, which Google introduced in October 2021

  • Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs

    Windows Phone Link Exploited by CloudZ RAT to Steal Credentials and OTPs

    Cybersecurity researchers have disclosed details of an intrusion that involved the use of a CloudZ remote access tool (RAT) and a previous undocumented plugin dubbed Pheno with the aim of facilitating credential theft.
    “According to the functionalities of the CloudZ RAT and Pheno plugin, this was with the intention of stealing victims’ credentials and potentially one-time passwords (OTPs),”

  • The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closed

    The Back Door Attackers Know About — and Most Security Teams Still Haven’t Closed

    Every AI tool, workflow automation, and productivity app your employees connected to Google or Microsoft this year left something behind: a persistent OAuth token with no expiration date, no automatic cleanup, and in most organizations, no one watching it. Your perimeter controls don’t see it. Your MFA doesn’t stop it. And when an attacker gets hold of one, they don’t need a password.
    OAuth

  • MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks

    MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks

    Threat actors are actively exploiting a critical security flaw impacting an open-source content management system (CMS) known as MetInfo, according to new findings from VulnCheck.
    The vulnerability in question is CVE-2026-29014 (CVSS score: 9.8), a code injection flaw that could result in arbitrary code execution.
    “MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code

  • We Scanned 1 Million Exposed AI Services. Here’s How Bad the Security Actually Is

    We Scanned 1 Million Exposed AI Services. Here’s How Bad the Security Actually Is

    While the software industry has made genuine strides over the past few decades to deliver products securely, the furious pace of AI adoption is putting that progress at risk. Businesses are moving fast to self-host LLM infrastructure, drawn by the promise of AI as a force multiplier and the pressure to deliver more value faster. But speed is coming at the expense of security.
    In the wake of the

  • ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

    ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and Windows

    The North Korea-aligned state-sponsored hacking group known as ScarCruft has compromised a video game platform in a supply chain espionage attack, trojanizing its components with a backdoor called BirdCallto likely target ethnic Koreans residing in China.
    While prior versions of the backdoor have primarily targeted Windows users only, the supply chain attack is assessed to have enabled the

  • Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API

    Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API

    A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come under active exploitation in the wild.
    The vulnerability (CVE-2026-22679, CVSS score: 9.8) relates to a case of unauthenticated remote code execution affecting Weaver E-cology 10.0 versions prior to 20260312. The issue resides in the “/papi/esearch/data/devops/