ππ For the first time ever, the European Commission has been fined (Just β¬400) for violating its own data privacy laws.
The breach involved sending an EU citizen's dataβincluding IP address and browser metadataβto Meta's servers in the U.S. via "Sign in with Facebook."
Learn more: https://thehackernews.com/2025/01/eu-commission-fined-for-transferring.html
The breach involved sending an EU citizen's dataβincluding IP address and browser metadataβto Meta's servers in the U.S. via "Sign in with Facebook."
Learn more: https://thehackernews.com/2025/01/eu-commission-fined-for-transferring.html
π67π±8π7π6β‘5
β οΈ Warning: Over 23,800 GFI KerioControl firewalls are vulnerable to a 1-click RCE flaw (CVE-2024-52875) that gives attackers root access.
π‘οΈ Update to v9.4.5 Patch 1 and audit your firewall access points immediately.
π Full details here: https://thehackernews.com/2025/01/critical-rce-flaw-in-gfi-keriocontrol.html
π‘οΈ Update to v9.4.5 Patch 1 and audit your firewall access points immediately.
π Full details here: https://thehackernews.com/2025/01/critical-rce-flaw-in-gfi-keriocontrol.html
β‘10π5π4
π China-linked MirrorFace has targeted Japanβs security and tech sectors in over 4 years of persistent attacks, says NPA & NCSC.
These attackers use spear-phishing, exploit device vulnerabilities, and evade antivirus detection by operating in Windows Sandboxβleaving no trace behind.
π Learn the tactics attackers use and how to counter them: https://thehackernews.com/2025/01/mirrorface-leverages-anel-and-noopdoor.html
These attackers use spear-phishing, exploit device vulnerabilities, and evade antivirus detection by operating in Windows Sandboxβleaving no trace behind.
π Learn the tactics attackers use and how to counter them: https://thehackernews.com/2025/01/mirrorface-leverages-anel-and-noopdoor.html
π₯10π5β‘4π2π2
Advance your skills in strategic security design with Georgetownβs Online Certificate in Cybersecurity Strategy.
Learn more: https://thn.news/cybersecurity-strategy-ig
Learn more: https://thn.news/cybersecurity-strategy-ig
π₯16π5π1
π¨ New Threat Alert: Banshee Stealer!
The latest variant targets macOS users and hides its tracks using Apple-inspired encryption.
π» Targets victims via phishing websites disguised as Google Chrome & Telegram
πΈ Offered to hackers for $3,000/month under a Malware-as-a-Service model
π Read more: https://thehackernews.com/2025/01/new-banshee-stealer-variant-bypasses.html
The latest variant targets macOS users and hides its tracks using Apple-inspired encryption.
π» Targets victims via phishing websites disguised as Google Chrome & Telegram
πΈ Offered to hackers for $3,000/month under a Malware-as-a-Service model
π Read more: https://thehackernews.com/2025/01/new-banshee-stealer-variant-bypasses.html
π16β‘4π4
π¨ Critical flaws found in major platforms:
β€· SonicWall: SSLVPN bypass (CVSS 8.2) & privilege escalation.
β€· Palo Alto Networks: SQL injection exposes passwords & API keys (CVSS 7.8).
β€· Aviatrix: Max severity flaw (CVSS 10.0) allows remote code execution.
π Full details: https://thehackernews.com/2025/01/major-vulnerabilities-patched-in.html
Patch systems to secure your organization.
β€· SonicWall: SSLVPN bypass (CVSS 8.2) & privilege escalation.
β€· Palo Alto Networks: SQL injection exposes passwords & API keys (CVSS 7.8).
β€· Aviatrix: Max severity flaw (CVSS 10.0) allows remote code execution.
π Full details: https://thehackernews.com/2025/01/major-vulnerabilities-patched-in.html
Patch systems to secure your organization.
π22β‘4π₯4π€2π€―2
β οΈ Hackers are impersonating cybersecurity giant CrowdStrike, tricking victims into downloading a cryptominer disguised as a recruitment tool.
π In a separate campaign, cybercriminals are targeting researchers with a fake PoC for the LDAPNightmare vulnerability (CVE-2024-49113).
π Stay informed and learn more: https://thehackernews.com/2025/01/crowdstrike-warns-of-phishing-scam.html
π In a separate campaign, cybercriminals are targeting researchers with a fake PoC for the LDAPNightmare vulnerability (CVE-2024-49113).
π Stay informed and learn more: https://thehackernews.com/2025/01/crowdstrike-warns-of-phishing-scam.html
β‘8π5π4
π¨ China-linked RedDelta hackers are targeting Southeast Asia, Mongolia & Taiwan with custom PlugX backdoors in a series of espionage attacks.
β€· New tactic: Using Cloudflare CDN to mask malicious traffic
β€· Spyware deployed: Custom PlugX backdoor
Read: https://thehackernews.com/2025/01/reddelta-deploys-plugx-malware-to.html
β€· New tactic: Using Cloudflare CDN to mask malicious traffic
β€· Spyware deployed: Custom PlugX backdoor
Read: https://thehackernews.com/2025/01/reddelta-deploys-plugx-malware-to.html
π15β‘5π3π€2
β οΈ A high-severity vulnerability in Samsung's Monkey's Audio decoder (CVE-2024-49415) is putting millions of devices at risk.
π΄ No user interaction needed β attackers can exploit this flaw remotely, allowing them to execute arbitrary code on your phone.
Update your Samsung device immediately to patch this flaw.
Read details here: https://thehackernews.com/2025/01/google-project-zero-researcher-uncovers.html
π΄ No user interaction needed β attackers can exploit this flaw remotely, allowing them to execute arbitrary code on your phone.
Update your Samsung device immediately to patch this flaw.
Read details here: https://thehackernews.com/2025/01/google-project-zero-researcher-uncovers.html
π₯14π6β‘5π€―3π±2
This media is not supported in your browser
VIEW IN TELEGRAM
π¨ Shadow AI is hereβand itβs putting your company at risk as employees secretly use AI tools like ChatGPT, transcription apps, and customer support bots.
Identify which apps and AI tools are in use across your organization with Recoβs detection solutionβbefore they lead to a security incident.
Start securing your apps now: https://thehackernews.com/2025/01/product-review-how-reco-discovers.html
Identify which apps and AI tools are in use across your organization with Recoβs detection solutionβbefore they lead to a security incident.
Start securing your apps now: https://thehackernews.com/2025/01/product-review-how-reco-discovers.html
π12β‘5
β‘ FunkSec, a rising ransomware group, has already hit 85+ victims, demanding ransoms as low as $10,000. Whatβs worse? Theyβre leveraging AI to rapidly evolve their attacks.
With targets like the U.S. and India, FunkSec's motives go beyond moneyβthey are blurring the lines between hacktivism and cybercrime.
π Learn more: https://thehackernews.com/2025/01/ai-driven-ransomware-funksec-targets-85.html
With targets like the U.S. and India, FunkSec's motives go beyond moneyβthey are blurring the lines between hacktivism and cybercrime.
π Learn more: https://thehackernews.com/2025/01/ai-driven-ransomware-funksec-targets-85.html
β‘11π8π₯5
Kick off 2025 with a game plan to grow your MSPβs revenue and deliver outstanding value to your clients.
Join us on January 15 to "10x Your MSP Profits in 2025 with Automated Network Pentesting" and discover how vPenTest can help you set the tone for a successful year.
Save your spot: https://thn.news/webinar-automated-pentesting-2025
Join us on January 15 to "10x Your MSP Profits in 2025 with Automated Network Pentesting" and discover how vPenTest can help you set the tone for a successful year.
Save your spot: https://thn.news/webinar-automated-pentesting-2025
π6π₯5β‘3π2π1
π Reporting is broken! Is YOUR cybersecurity reporting still a βcheck the boxβ task?
Clients donβt want to hear about firewall logsβthey want to understand how YOU are safeguarding their business.
Find out how to improve it here: https://thehackernews.com/2025/01/taking-pain-out-of-cybersecurity.html
Clients donβt want to hear about firewall logsβthey want to understand how YOU are safeguarding their business.
Find out how to improve it here: https://thehackernews.com/2025/01/taking-pain-out-of-cybersecurity.html
β‘7π₯4π±3π2π1
π° How One U.S. Health System Cut Security Costs by 76% ...
π The system deployed Elisity with just 2 staff members per site, compared to 14 for traditional segmentation.
β‘ Elisity is a seamless, lightweight solution that integrates with existing switches and works with Cisco, Juniper, and Arista devices, taking less than 30 minutes to deploy without any network downtime.
Get the full details here: https://thehackernews.com/2025/01/hands-on-walkthrough-microsegmentation.html
π The system deployed Elisity with just 2 staff members per site, compared to 14 for traditional segmentation.
β‘ Elisity is a seamless, lightweight solution that integrates with existing switches and works with Cisco, Juniper, and Arista devices, taking less than 30 minutes to deploy without any network downtime.
Get the full details here: https://thehackernews.com/2025/01/hands-on-walkthrough-microsegmentation.html
β‘11π7π₯5π5π€5
π U.S. Justice Department indicts 3 Russian nationals involved in laundering millions through cryptocurrency mixers Blender`io and Sinbad`io.
Full details inside: https://thehackernews.com/2025/01/doj-indicts-three-russians-for.html
Full details inside: https://thehackernews.com/2025/01/doj-indicts-three-russians-for.html
β‘19π10π±6π₯3
π₯ Microsoft has taken legal action against hackers using stolen Azure credentials to exploit AI services like OpenAI and DALL-E for malicious purposes.
Read the full story: https://thehackernews.com/2025/01/microsoft-sues-hacking-group-exploiting.html
Read the full story: https://thehackernews.com/2025/01/microsoft-sues-hacking-group-exploiting.html
π44π25π₯13π€7β‘1π€―1
π Over 4,000 web backdoors hijackedβby registering abandoned domains for as little as $20.
π Researchers gained control of backdoors targeting government & academic networks in Bangladesh, China, Nigeria, South Korea, and more!
Read now: https://thehackernews.com/2025/01/expired-domains-allowed-control-over.html
π Researchers gained control of backdoors targeting government & academic networks in Bangladesh, China, Nigeria, South Korea, and more!
Read now: https://thehackernews.com/2025/01/expired-domains-allowed-control-over.html
π24π12β‘8π₯8
π¨ New Vulnerability Alert!
CISA has added another critical BeyondTrust flaw to its "Known Exploited Vulnerabilities" catalogβthis time, impacting Privileged Remote Access (PRA) and Remote Support (RS).
Attackers are actively exploiting it β CVE-2024-12686.
Read more: https://thehackernews.com/2025/01/cisa-adds-new-beyondtrust-flaw-to-kev.html
CISA has added another critical BeyondTrust flaw to its "Known Exploited Vulnerabilities" catalogβthis time, impacting Privileged Remote Access (PRA) and Remote Support (RS).
Attackers are actively exploiting it β CVE-2024-12686.
Read more: https://thehackernews.com/2025/01/cisa-adds-new-beyondtrust-flaw-to-kev.html
π15π4
β οΈ VMware vCenter = Goldmine for Attackers.
Attackers are exploiting root-level access with the βvpxuserβ account to control ESXi infrastructure. If itβs breached, everything is at risk.
π Discover expert tips on strengthening your defenses and preventing catastrophic breaches: https://thehackernews.com/2025/01/ransomware-on-esxi-mechanization-of.html
Attackers are exploiting root-level access with the βvpxuserβ account to control ESXi infrastructure. If itβs breached, everything is at risk.
π Discover expert tips on strengthening your defenses and preventing catastrophic breaches: https://thehackernews.com/2025/01/ransomware-on-esxi-mechanization-of.html
π17π3π€―1
A new credit card skimmer targeting WordPress e-commerce sites has been discovered.
β€· Malicious JavaScript code is injected into WordPress databases.
β€· It activates ONLY on checkout pages to steal sensitive payment info.
β€· This stealthy malware evades traditional detection tools, making it a serious threat.
This attack is incredibly difficult to spot, putting your customers' data and your reputation at risk.
π Read more: https://thehackernews.com/2025/01/wordpress-skimmers-evade-detection-by.html
β€· Malicious JavaScript code is injected into WordPress databases.
β€· It activates ONLY on checkout pages to steal sensitive payment info.
β€· This stealthy malware evades traditional detection tools, making it a serious threat.
This attack is incredibly difficult to spot, putting your customers' data and your reputation at risk.
π Read more: https://thehackernews.com/2025/01/wordpress-skimmers-evade-detection-by.html
π₯20π11π€―8
β οΈ WARNING: Zero-Day Exploit Likely Behind Fortinet Attack.
Attackers created super admin accounts, hijacked SSL VPNs, and moved laterally through networks to extract credentials.
Learn more in the full article: https://thehackernews.com/2025/01/zero-day-vulnerability-suspected-in.html
Attackers created super admin accounts, hijacked SSL VPNs, and moved laterally through networks to extract credentials.
Learn more in the full article: https://thehackernews.com/2025/01/zero-day-vulnerability-suspected-in.html
π€―23π8π₯8π€3