๐จ Suspected Chinese state-sponsored hackers breached the U.S. Treasury via a compromised API key from BeyondTrust, a third-party vendor.
๐ก Hereโs what happened:
ยป Attackers gained access to a key securing BeyondTrustโs cloud-based remote support service.
ยป They bypassed security to remotely access Treasury workstations and unclassified documents.
ยป CVE-2024-12356, a critical vulnerability (CVSS 9.8), was actively exploited.
โก๏ธ Read More: https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html
๐ก Hereโs what happened:
ยป Attackers gained access to a key securing BeyondTrustโs cloud-based remote support service.
ยป They bypassed security to remotely access Treasury workstations and unclassified documents.
ยป CVE-2024-12356, a critical vulnerability (CVSS 9.8), was actively exploited.
โก๏ธ Read More: https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html
๐ฅ31๐คฏ9โก5๐4๐2๐ค2
๐ Department of Justice has finalized a rule blocking bulk transfers of Americansโ sensitive personal data to adversarial nations like China, Russia, and North Korea.
ยป Data like Social Security numbers, geolocation, biometrics, and health information is now protected.
ยป These countries have used such data for espionage, AI development, and suppressing freedoms.
Read full story here ๐ https://thehackernews.com/2024/12/new-us-doj-rule-halts-bulk-data.html
ยป Data like Social Security numbers, geolocation, biometrics, and health information is now protected.
ยป These countries have used such data for espionage, AI development, and suppressing freedoms.
Read full story here ๐ https://thehackernews.com/2024/12/new-us-doj-rule-halts-bulk-data.html
๐24๐10๐ฅ7๐3
The U.S. Treasury just sanctioned two major entitiesโone Iranian and one Russianโfor meddling in the 2024 presidential election through AI-powered disinformation campaigns.
Hereโs what they did:
๐ ๏ธ Created deepfakes and synthetic content using AI.
๐ Built a network of 100+ fake news sites to spread misinformation.
๐ฐ Backed by intelligence agencies like Iran's IRGC and Russia's GRU.
Learn the latest tactics ๐ https://thehackernews.com/2025/01/iranian-and-russian-entities-sanctioned.html
Hereโs what they did:
๐ ๏ธ Created deepfakes and synthetic content using AI.
๐ Built a network of 100+ fake news sites to spread misinformation.
๐ฐ Backed by intelligence agencies like Iran's IRGC and Russia's GRU.
Learn the latest tactics ๐ https://thehackernews.com/2025/01/iranian-and-russian-entities-sanctioned.html
๐22๐10๐ฑ8๐ค3๐คฏ1
โ ๏ธ Click. Click. Hacked?
DoubleClickjacking: A new clickjacking variant that stealthily exploits timing gaps between clicks to hijack accounts.
This attack bypasses protections like X-Frame-Options and SameSite cookies.
Read the article: https://thehackernews.com/2025/01/new-doubleclickjacking-exploit-bypasses.html
DoubleClickjacking: A new clickjacking variant that stealthily exploits timing gaps between clicks to hijack accounts.
This attack bypasses protections like X-Frame-Options and SameSite cookies.
Read the article: https://thehackernews.com/2025/01/new-doubleclickjacking-exploit-bypasses.html
๐คฏ42๐ฅ16๐6๐3
๐จ Three Russian-German nationals charged with espionage and sabotage by German prosecutors.
One suspect, Dieter S., allegedly scouted military sites and planned attacks to disrupt Germany's support for Ukraine.
Learn more: https://thehackernews.com/2025/01/three-russian-german-nationals-charged.html
One suspect, Dieter S., allegedly scouted military sites and planned attacks to disrupt Germany's support for Ukraine.
Learn more: https://thehackernews.com/2025/01/three-russian-german-nationals-charged.html
๐16๐4๐ฅ3
๐ A new npm package poses as a vulnerability detector for Ethereum smart contracts but silently installs Quasar RATโa remote access trojan that gives attackers:
๐ฅ๏ธ Full control over your system
๐ก๏ธ Persistence via Windows Registry tweaks
๐ก Command-and-Control connections to steal data
๐ Read the full analysis: https://thehackernews.com/2025/01/malicious-obfuscated-npm-package.html
๐ฅ๏ธ Full control over your system
๐ก๏ธ Persistence via Windows Registry tweaks
๐ก Command-and-Control connections to steal data
๐ Read the full analysis: https://thehackernews.com/2025/01/malicious-obfuscated-npm-package.html
๐30๐ฑ8
โก Did you know? Cross-domain attackers often stay hidden for weeks before escalating privileges.
Why do attackers thrive? Because fragmented security tools leave gapsโand adversaries like FAMOUS CHOLLIMA are exploiting every one of them.
๐ฌ Question: Are your identity systems truly secure, or just compliant?
๐ก Expert Take: A unified platform transforms identity systems into secure perimeters by:
ยป Closing blind spots with end-to-end visibility.
ยป Integrating seamlessly across cloud, SaaS, and on-prem environments.
ยป Accelerating threat detection for proactive defense.
๐ Learn how to level up your defenses: https://thehackernews.com/2025/01/cross-domain-attacks-growing-threat-to.html
Attackers move fastโyour defenses need to be faster.
Why do attackers thrive? Because fragmented security tools leave gapsโand adversaries like FAMOUS CHOLLIMA are exploiting every one of them.
๐ฌ Question: Are your identity systems truly secure, or just compliant?
๐ก Expert Take: A unified platform transforms identity systems into secure perimeters by:
ยป Closing blind spots with end-to-end visibility.
ยป Integrating seamlessly across cloud, SaaS, and on-prem environments.
ยป Accelerating threat detection for proactive defense.
๐ Learn how to level up your defenses: https://thehackernews.com/2025/01/cross-domain-attacks-growing-threat-to.html
Attackers move fastโyour defenses need to be faster.
๐17๐ฅ15
โ ๏ธ Researchers have uncovered details of now-patched vulnerabilities in Dynamics 365 and Power Apps Web API that exposed sensitive user data, including emails, financial information, and password hashes.
๐ Learn more: https://thehackernews.com/2025/01/severe-security-flaws-patched-in.html
๐ Learn more: https://thehackernews.com/2025/01/severe-security-flaws-patched-in.html
๐18๐7๐ฅ6๐5โก3
๐ Apple will pay $95M to settle claims that Siri accidentally recorded and shared private conversations with third parties.
๐ Key Details:
ยป Covers Siri-enabled devices from 2014 to 2024.
ยป Claim up to $20 per device (max 5).
ยป Apple introduced new privacy settings, but is it enough?
๐ Get the full story: https://thehackernews.com/2025/01/apple-to-pay-siri-users-20-per-device.html
๐ Key Details:
ยป Covers Siri-enabled devices from 2014 to 2024.
ยป Claim up to $20 per device (max 5).
ยป Apple introduced new privacy settings, but is it enough?
๐ Get the full story: https://thehackernews.com/2025/01/apple-to-pay-siri-users-20-per-device.html
๐ฅ29๐13๐9โก2๐ค1
๐จ Critical Update: With Edgio services shutting down, Microsoft is migrating all .NET workloads to Azure Front Door CDNs.
๐ก Deadline: January 7, 2025.
๐ Scan your codebase and update references today to avoid downtime.
Learn more: https://thehackernews.com/2025/01/critical-deadline-update-old-net.html
๐ก Deadline: January 7, 2025.
๐ Scan your codebase and update references today to avoid downtime.
Learn more: https://thehackernews.com/2025/01/critical-deadline-update-old-net.html
๐18๐6
๐จ Critical Flaws in LDAP Exploited!
A new proof-of-concept exploit, LDAPNightmare, crashes unpatched Windows Servers with one crafted request.
Even worse? RCE attacks are possible with minor tweaks.
ยป CVE-2024-49113 causes DoS attacks.
ยป CVE-2024-49112 allows remote code execution.
What can you do?
โ Patch ASAP with Microsoftโs December 2024 updates.
โ Monitor RPC calls and suspicious LDAP activity.
๐ Read more: https://thehackernews.com/2025/01/ldapnightmare-poc-exploit-crashes-lsass.html
A new proof-of-concept exploit, LDAPNightmare, crashes unpatched Windows Servers with one crafted request.
Even worse? RCE attacks are possible with minor tweaks.
ยป CVE-2024-49113 causes DoS attacks.
ยป CVE-2024-49112 allows remote code execution.
What can you do?
โ Patch ASAP with Microsoftโs December 2024 updates.
โ Monitor RPC calls and suspicious LDAP activity.
๐ Read more: https://thehackernews.com/2025/01/ldapnightmare-poc-exploit-crashes-lsass.html
๐ฅ27๐คฏ10๐8๐3
๐จ ALERT: New multi-turn jailbreaking attack, Bad Likert Judge, cleverly bypasses AI safety measures across six major platforms, including AWS, Google, and NVIDIA.
ยป Attack success rates spike by 60% using this technique.
ยป Tested across major platformsโOpenAI, Google, and more.
ยป Categories impacted: hate speech, malware, even weapons.
๐ Explore expert findings: https://thehackernews.com/2025/01/new-ai-jailbreak-method-bad-likert.html
ยป Attack success rates spike by 60% using this technique.
ยป Tested across major platformsโOpenAI, Google, and more.
ยป Categories impacted: hate speech, malware, even weapons.
๐ Explore expert findings: https://thehackernews.com/2025/01/new-ai-jailbreak-method-bad-likert.html
๐ฅ32๐5๐ค3
๐จ The U.S. Treasury just sanctioned Integrity Technology Group, a Beijing-based cybersecurity firm, for enabling state-sponsored cyberattacks on U.S. entities.
โช Linked to Flax Typhoon (aka RedJuliett)
โช Exploited IoT vulnerabilities.
โช Targeted government agencies, telecoms, and universities.
๐ Read the details: https://thehackernews.com/2025/01/us-treasury-sanctions-beijing.html
โช Linked to Flax Typhoon (aka RedJuliett)
โช Exploited IoT vulnerabilities.
โช Targeted government agencies, telecoms, and universities.
๐ Read the details: https://thehackernews.com/2025/01/us-treasury-sanctions-beijing.html
๐18๐9๐คฏ1
shrinked-malware-execution-ezgif.com-optimize.gif
16.2 MB
โ ๏ธ ALERT: PLAYFULGHOST Targets VPN Users!
This powerful backdoor malware deceives users by trojanizing legitimate VPN apps, enabling keylogging, screen/audio capture, and remote shell access.
Learn more: https://thehackernews.com/2025/01/playfulghost-delivered-via-phishing-and.html
This powerful backdoor malware deceives users by trojanizing legitimate VPN apps, enabling keylogging, screen/audio capture, and remote shell access.
Learn more: https://thehackernews.com/2025/01/playfulghost-delivered-via-phishing-and.html
๐24โก5๐ค4๐ฑ3
This media is not supported in your browser
VIEW IN TELEGRAM
๐จ A severe flaw in Nuclei (CVE-2024-43405) could let attackers bypass signature checks and inject malicious code. This impacts all versions after 3.0.0โscoring a 7.4 CVSS.
Read the analysis and secure your systems ๐https://thehackernews.com/2025/01/researchers-uncover-nuclei.html
Read the analysis and secure your systems ๐https://thehackernews.com/2025/01/researchers-uncover-nuclei.html
โก16๐ฑ9๐ฅ5๐4
FireScam malware is targeting Android devices by disguising itself as a fake โTelegram Premiumโ app. Once installed, it:
โช Steals sensitive data (messages, notifications, call logs, credentials)
โช Blocks legitimate app updates to remain undetected
This malware uses advanced techniques to spy on users and maintain control over devicesโposing a major threat to personal and organizational data.
Get all the details ๐ https://thehackernews.com/2025/01/firescam-android-malware-poses-as.html
โช Steals sensitive data (messages, notifications, call logs, credentials)
โช Blocks legitimate app updates to remain undetected
This malware uses advanced techniques to spy on users and maintain control over devicesโposing a major threat to personal and organizational data.
Get all the details ๐ https://thehackernews.com/2025/01/firescam-android-malware-poses-as.html
๐20๐ฅ10๐ฑ4๐ค3๐2
๐ Critical Alert: Malicious npm packages are impersonating Hardhat tools to steal private keys and mnemonics.
โช Over 1,000 downloads of a single fake package, active for over a year.
โช Data is exfiltrated using hardcoded Ethereum addresses.
Open-source dependency complexity is a hackerโs dreamโmanual reviews are becoming impossible.
๐ง What You Can Do:
โ Double-check every dependency.
โ Use tools to audit npm packages.
โ Build robust supply chain defenses.
๐ Read the details: https://thehackernews.com/2025/01/russian-speaking-attackers-target.html
โช Over 1,000 downloads of a single fake package, active for over a year.
โช Data is exfiltrated using hardcoded Ethereum addresses.
Open-source dependency complexity is a hackerโs dreamโmanual reviews are becoming impossible.
๐ง What You Can Do:
โ Double-check every dependency.
โ Use tools to audit npm packages.
โ Build robust supply chain defenses.
๐ Read the details: https://thehackernews.com/2025/01/russian-speaking-attackers-target.html
๐ฅ13๐7๐คฏ4๐3๐ฑ1
๐จ Every second in 2024, cybercriminals attempted 7,000 password attacksโup 75% from last year! Phishing surged 58%, leading to $3.5 billion in losses.
Learn the top strategies to protect your SaaS environment from these relentless threats.
Read here: https://thehackernews.com/2025/01/from-22m-in-ransom-to-100m-stolen.html
Learn the top strategies to protect your SaaS environment from these relentless threats.
Read here: https://thehackernews.com/2025/01/from-22m-in-ransom-to-100m-stolen.html
๐ฅ15๐6โก3๐ค2
India proposes draft Digital Personal Data Protection (DPDP) Rules to empower citizens with data erasure rights, enforce strict security mandates for companies, and impose penalties for non-compliance.
๐ Your Rights:
โ Erase data on demand ๐๏ธ
โ Consent control for how your data is used ๐
โ Parental consent for minorsโ data ๐ถ
โ๏ธ Business Compliance:
โ 72-hour breach reporting โฑ๏ธ
โ Annual audits & impact assessments ๐
โ Data security: encryption, backups, and access control ๐
๐ธ Penalties โ Up to โน250 crore (~$30M) for non-compliance or misuse โ ๏ธ
Explore the details: https://thehackernews.com/2025/01/india-proposes-digital-data-rules-with.html
๐ Your Rights:
โ Erase data on demand ๐๏ธ
โ Consent control for how your data is used ๐
โ Parental consent for minorsโ data ๐ถ
โ๏ธ Business Compliance:
โ 72-hour breach reporting โฑ๏ธ
โ Annual audits & impact assessments ๐
โ Data security: encryption, backups, and access control ๐
๐ธ Penalties โ Up to โน250 crore (~$30M) for non-compliance or misuse โ ๏ธ
Explore the details: https://thehackernews.com/2025/01/india-proposes-digital-data-rules-with.html
๐38๐13๐ฅ8๐ค8๐7
๐จ Two vulnerabilities (CVE-2024-9138, CVE-2024-9140) impact Moxa's routers, with CVSS scores of 8.6 and 9.3โallowing root access and unauthorized command execution.
๐ Patch to version 3.14+ immediately.
You can protect your network by:
๐ Isolating devices from the internet.
๐ Limiting SSH access to trusted IPs.
๐ก Enabling strict firewall rules.
โก๏ธ Find out now: https://thehackernews.com/2025/01/moxa-alerts-users-to-high-severity.html
๐ Patch to version 3.14+ immediately.
You can protect your network by:
๐ Isolating devices from the internet.
๐ Limiting SSH access to trusted IPs.
๐ก Enabling strict firewall rules.
โก๏ธ Find out now: https://thehackernews.com/2025/01/moxa-alerts-users-to-high-severity.html
๐10๐5๐3
โ ๏ธ CISA says thereโs no evidence other federal systems were impacted in the Treasury cyberattackโbut the investigation is ongoing.
Attackers exploited BeyondTrustโs Remote Support SaaS API key to access Treasury systems.
๐ Learn More: https://thehackernews.com/2025/01/cisa-no-wider-federal-impact-from.html
Attackers exploited BeyondTrustโs Remote Support SaaS API key to access Treasury systems.
๐ Learn More: https://thehackernews.com/2025/01/cisa-no-wider-federal-impact-from.html
๐11๐ฅ5๐3