Malicious Solana PyPI Package Steals Code

Malicious Solana PyPI Package Steals Code

Discovery of the Rogue Library Late last month security analysts at ReversingLabs stumbled on an impostor Python package hiding in plain sight on the official Python Package Index (PyPI). The file was uploaded under the name “solana-token,” hinting that it could help programmers interact with the…


0 Comments7 Minutes

ASUS Patches Serious Security Bugs in DriverHub

ASUS Patches Serious Security Bugs in DriverHub

Vulnerabilities Could Let Hackers Run Malicious Code on Targeted Systems ASUS has released a critical security update for its DriverHub utility after security experts uncovered two significant vulnerabilities that could put users at risk. If exploited, these flaws could allow attackers to remotely…


0 Comments5 Minutes

Europol Pulls the Plug on Major DDoS-for-Hire Rings

Europol Pulls the Plug on Major DDoS-for-Hire Rings

Young Suspects Caught in Poland, Web Domains Grabbed in the U.S. Four Polish citizens between 19 and 22 years old have been taken into custody after an international probe into paid-for cyber-attacks. At the same time, U.S. agents seized nine web addresses that once fronted bogus “stress-testing”…


0 Comments2 Minutes

NETXLOADER Opens the Door for a Fresh Qilin Ransomware Surge

A Hidden Loader Comes to Light Trend Micro has lifted the curtain on a stealthy .NET program they have christened NETXLOADER. First spotted in attacks during November 2024, the loader works hand-in-hand with SmokeLoader to unleash the Agenda ransomware (better known as Qilin). Packed with the…


0 Comments3 Minutes

URGENT! Android’s May 2025 Security Patch

URGENT! Android’s May 2025 Security Patch

The Big Deal: CVE‑2025‑27363 Google’s latest May 2025 Security Patch tackles 46 security issues, but the one getting all the buzz is CVE‑2025‑27363. It lives in Android’s System component and comes from a bug in the popular FreeType font library. In simple terms, a specially crafted font file can…


0 Comments3 Minutes

Golden Chickens Hackers Launch New Malware

Golden Chickens Hackers Launch New Malware

A hacking group called Golden Chickens (also known as Venom Spider) has been spotted using two new malware programs—TerraStealerV2 and TerraLogger. These tools are designed to steal sensitive information and record everything victims type on their keyboards. You might be interested in: WordPress…


0 Comments3 Minutes

WordPress Plugin Gives Attackers Full Control

WordPress Plugin Gives Attackers Full Control

Fake Plugin Gives Attackers Full Control of Infected Websites Security experts have uncovered a dangerous new malware campaign targeting WordPress plugins. Hackers are tricking site owners by hiding malicious code inside what appears to be a security plugin. How the Fake Plugin Works The malware,…


0 Comments3 Minutes

TikTok Fined €530 Million for Breaking EU Data Rules

Irish Watchdog Orders TikTok to Stop Sending User Data to China Ireland's Data Protection Commission (DPC) has hit TikTok with a massive €530 million ($601 million) fine for failing to protect European users' data. The regulator found that the video-sharing app broke strict EU privacy laws by…


1 Comment2 Minutes

CISA Adds Critical Flaws to Must-Patch List

CISA Adds Critical Flaws to Must-Patch List

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new warning about two dangerous security vulnerabilities that cybercriminals are actively exploiting in the wild. These flaws affect widely used products from Broadcom and Commvault, putting businesses and government…


0 Comments5 Minutes

Router Security: How to Protect Your Wi-Fi Network from Hackers

Router Security: How to Protect Your Wi-Fi Network from Hackers

Your router is the front door to your digital life—and if it’s not secure, cybercriminals can waltz right in. Think about it: your Wi-Fi network connects everything—smartphones, laptops, smart TVs, even security cameras. If a hacker breaches your router, they can spy on your online activity, steal…


0 Comments5 Minutes

Zero spam, just good stuff

A weekly newsletter delivered straight to your inbox

Sign Up Now!

© 2024 Rhyno Cybersecurity. All rights reserved. Privacy Policy | Terms of Use

Privacy Preference Center