π£ CISA BOD 25-01 is here.
This latest directive outlines requirements to ensure that Microsoft 365 cloud environments and SaaS applications are safe and secure.
Get prepared to meet those essential compliance deadlines.
π Learn how federal civilian agencies can ensure SCuBA policy alignment: https://thn.news/o8o8sp2s
This latest directive outlines requirements to ensure that Microsoft 365 cloud environments and SaaS applications are safe and secure.
Get prepared to meet those essential compliance deadlines.
π Learn how federal civilian agencies can ensure SCuBA policy alignment: https://thn.news/o8o8sp2s
π14π4π₯1
β‘ Cloudflareβs latest report reveals the largest DDoS attack ever recorded β 5.6 Terabits per second!
β€· Originated from over 13,000 IoT devices
β€· The attack targeted an ISP in Eastern Asia
π Learn more: https://thehackernews.com/2025/01/mirai-botnet-launches-record-56-tbps.html
β€· Originated from over 13,000 IoT devices
β€· The attack targeted an ISP in Eastern Asia
π Learn more: https://thehackernews.com/2025/01/mirai-botnet-launches-record-56-tbps.html
π±17π15β‘10π6π₯6π1
β οΈ Oracle has released its Critical Patch Update for January 2025, addressing a massive 318 security vulnerabilities across its products.
The most severe flaw could give attackers full control over affected systems.
Read the full update: https://thehackernews.com/2025/01/oracle-releases-january-2025-patch-to.html
The most severe flaw could give attackers full control over affected systems.
Read the full update: https://thehackernews.com/2025/01/oracle-releases-january-2025-patch-to.html
π10β‘4π₯1
π¨ Alert: A previously unknown China-linked APT group, PlushDaemon, has been linked to a 2023 supply chain attack targeting a South Korean VPN provider.
From screen recording to browser password harvesting β this backdoor does it all.
Read more: https://thehackernews.com/2025/01/plushdaemon-apt-targets-south-korean.html
From screen recording to browser password harvesting β this backdoor does it all.
Read more: https://thehackernews.com/2025/01/plushdaemon-apt-targets-south-korean.html
β‘8π4π₯2
π€ 65% of security teams rely solely on pentest vendors for their reports. What happens when you canβt verify those reports?
β€· HackGATE fixes this by offering real-time visibility into pentest activities.
β€· Gain deeper insight into every test phase, ensuring quality and accountability.
Donβt just trust the reportβverify it!
β‘ See how HackGATE can help: https://thehackernews.com/2025/01/hackgate-setting-new-standards-for.html
β€· HackGATE fixes this by offering real-time visibility into pentest activities.
β€· Gain deeper insight into every test phase, ensuring quality and accountability.
Donβt just trust the reportβverify it!
β‘ See how HackGATE can help: https://thehackernews.com/2025/01/hackgate-setting-new-standards-for.html
π9π₯3π€2
βοΈ U.S. President Trump pardons Ross Ulbricht, creator of the Silk Road darkweb marketplace, after 11 years behind bars.
Ulbrichtβs life sentence for trafficking and hacking is now officially void.
π Read the full article: https://thehackernews.com/2025/01/president-trump-pardons-silk-road.html
Ulbrichtβs life sentence for trafficking and hacking is now officially void.
π Read the full article: https://thehackernews.com/2025/01/president-trump-pardons-silk-road.html
π€―32π24π12π€11π8π₯4
π°π΅ North Korean malware #InvisibleFerret uses fake tech job interviews
It's target: corporate info, crypto data, source code π―
Read comprehensive technical analysis of this threat from @AnyRun_app
https://thn.news/invisibleferret-tech-analysis
It's target: corporate info, crypto data, source code π―
Read comprehensive technical analysis of this threat from @AnyRun_app
https://thn.news/invisibleferret-tech-analysis
β‘10π€―7π₯6π3π2
π New FREE Risk Assessment for Security Teams!
As GenAI and SaaS apps become essential, your organizationβs security risks are growing. Employees' browser behavior could be leaking sensitive data.
π Gain actionable insights and uncover hidden risks with this customized risk assessment: https://thehackernews.com/2025/01/discover-hidden-browsing-threats-free.html
As GenAI and SaaS apps become essential, your organizationβs security risks are growing. Employees' browser behavior could be leaking sensitive data.
π Gain actionable insights and uncover hidden risks with this customized risk assessment: https://thehackernews.com/2025/01/discover-hidden-browsing-threats-free.html
π₯11β‘2
π Zero-Day Exploit in Cambium Routers!
Threat actors are exploiting this flaw to deploy the AIRASHI botnet, carrying out powerful DDoS attacks of up to 3 Tbps.
Take action to secure your IoT devices before itβs too late.
Learn more here: https://thehackernews.com/2025/01/hackers-exploit-zero-day-in-cnpilot.html
Threat actors are exploiting this flaw to deploy the AIRASHI botnet, carrying out powerful DDoS attacks of up to 3 Tbps.
Take action to secure your IoT devices before itβs too late.
Learn more here: https://thehackernews.com/2025/01/hackers-exploit-zero-day-in-cnpilot.html
π14π€―9β‘1
π₯ The Trump administration has just terminated all DHS advisory committee memberships, including the key Cyber Safety Review Board (CSRB).
CSRB's past work included:
β€· Reporting on Log4Shell and LAPSUS$ intrusions
β€· Holding tech firms accountable for cybersecurity lapses
β€· Investigating Salt Typhoon, a Chinese hacking group targeting U.S. telecoms
Read β https://thehackernews.com/2025/01/trump-terminates-dhs-advisory-committee.html
CSRB's past work included:
β€· Reporting on Log4Shell and LAPSUS$ intrusions
β€· Holding tech firms accountable for cybersecurity lapses
β€· Investigating Salt Typhoon, a Chinese hacking group targeting U.S. telecoms
Read β https://thehackernews.com/2025/01/trump-terminates-dhs-advisory-committee.html
π€―38π±20π16π9π9π₯8β‘5π€1
π Google uncovers "TRIPLESTRENGTH," a financially motivated hacker group targeting cloud environments for cryptojacking and ransomware.
Their extensive reach includes Google Cloud, AWS, and Microsoft Azure.
π Read the full report: https://thehackernews.com/2025/01/triplestrength-targets-cloud-platforms.html
Their extensive reach includes Google Cloud, AWS, and Microsoft Azure.
π Read the full report: https://thehackernews.com/2025/01/triplestrength-targets-cloud-platforms.html
π25π₯1
π¨ Critical Cisco Flaw Exposes Admin Access!
A new vulnerability in Cisco Meeting Management (CVE-2025-20156) could allow attackers to gain full administrator control. π
Also, CISA and FBI issue a warning on Ivanti exploit chainsβtargeting government and private sector networks.
Learn more: https://thehackernews.com/2025/01/cisco-fixes-critical-privilege.html
A new vulnerability in Cisco Meeting Management (CVE-2025-20156) could allow attackers to gain full administrator control. π
Also, CISA and FBI issue a warning on Ivanti exploit chainsβtargeting government and private sector networks.
Learn more: https://thehackernews.com/2025/01/cisco-fixes-critical-privilege.html
π19π₯1
β οΈ A new BackConnect (BC) malware linked to QakBot is out, and it's evolving FAST.
Both QakBot and Black Basta are using this shared tool to ramp up their attacks, affecting thousands.
Find out: https://thehackernews.com/2025/01/qakbot-linked-bc-malware-adds-enhanced.html
Both QakBot and Black Basta are using this shared tool to ramp up their attacks, affecting thousands.
Find out: https://thehackernews.com/2025/01/qakbot-linked-bc-malware-adds-enhanced.html
π15π₯2
π Is your website tracking users more than necessary?
π¨ 45% of third-party apps on websites access sensitive user data unnecessarily.
Take steps to secure your siteβget actionable tips in the full report: https://thehackernews.com/2025/01/new-research-state-of-web-exposure-2025.html
π¨ 45% of third-party apps on websites access sensitive user data unnecessarily.
Take steps to secure your siteβget actionable tips in the full report: https://thehackernews.com/2025/01/new-research-state-of-web-exposure-2025.html
π12β‘4π3π₯1π€1
π 50-80% of enterprise breaches are due to credential & user-based attacks.
Legacy authentication methods are outdated and vulnerable, but cutting-edge authentication systems are now making attacks impossible.
Learn how to upgrade your security today: https://thehackernews.com/2025/01/eliminate-identity-based-threats.html
Legacy authentication methods are outdated and vulnerable, but cutting-edge authentication systems are now making attacks impossible.
Learn how to upgrade your security today: https://thehackernews.com/2025/01/eliminate-identity-based-threats.html
β‘7π4π₯2
Did you know security teams can now enforce MFA on user accounts directly in their web browser β even for apps that donβt allow mandatory MFA enforcement?
With Push Security, spend less time chasing users to configure MFA or trying to manually enforce it across hundreds of apps.
https://thn.news/mfa-enforce-other
With Push Security, spend less time chasing users to configure MFA or trying to manually enforce it across hundreds of apps.
https://thn.news/mfa-enforce-other
π7β‘3π3π₯2π1
π HellCat & Morpheus Ransomware Sharing Identical Code!
Cybercriminals are using the same payload for attacksβjust with victim-specific tweaks. Smaller, more agile groups like these may dominate the threat landscape moving forward.
π Read analysis: https://thehackernews.com/2025/01/experts-find-shared-codebase-linking.html
Cybercriminals are using the same payload for attacksβjust with victim-specific tweaks. Smaller, more agile groups like these may dominate the threat landscape moving forward.
π Read analysis: https://thehackernews.com/2025/01/experts-find-shared-codebase-linking.html
π₯12β‘4π4
π΄ A new malware campaign is exploiting fake CAPTCHA verifications to spread Lumma Stealer, affecting global organizations.
Targets are being tricked into downloading malware outside of the browser context.
Read the full report: https://thehackernews.com/2025/01/beware-fake-captcha-campaign-spreads.html
Targets are being tricked into downloading malware outside of the browser context.
Read the full report: https://thehackernews.com/2025/01/beware-fake-captcha-campaign-spreads.html
π20π€7π₯3π1
β οΈ URGENT: Security Flaws Found in Palo Alto Networks Firewalls
β€· BootHole CVE-2020-10713: Secure Boot bypass
β€· LogoFAIL & PixieFail: Code execution via firmware & network stack vulnerabilities
β€· Misconfigured SPI flash access in PA-415
π Read: https://thehackernews.com/2025/01/palo-alto-firewalls-found-vulnerable-to.html
β€· BootHole CVE-2020-10713: Secure Boot bypass
β€· LogoFAIL & PixieFail: Code execution via firmware & network stack vulnerabilities
β€· Misconfigured SPI flash access in PA-415
π Read: https://thehackernews.com/2025/01/palo-alto-firewalls-found-vulnerable-to.html
π11π8π±7π4π₯1
π΅οΈββοΈ J-magic Campaign </>
A New Breed of Malware β Attackers are using "magic packets" to remotely control Juniper routers and deploying a variant of the publicly available backdoor "cd00r" into enterprise networks.
Find out more: https://thehackernews.com/2025/01/custom-backdoor-exploiting-magic-packet.html
A New Breed of Malware β Attackers are using "magic packets" to remotely control Juniper routers and deploying a variant of the publicly available backdoor "cd00r" into enterprise networks.
Find out more: https://thehackernews.com/2025/01/custom-backdoor-exploiting-magic-packet.html
π24π€6β‘3π₯2
π¨ Urgent Alert: CVE-2020-11023 is back in the spotlight!
CISA adds this jQuery flaw to its Known Exploited Vulnerabilities list after active exploitation was detected.
Learn more: https://thehackernews.com/2025/01/cisa-adds-five-year-old-jquery-xss-flaw.html
Review your jQuery versions and update immediately.
CISA adds this jQuery flaw to its Known Exploited Vulnerabilities list after active exploitation was detected.
Learn more: https://thehackernews.com/2025/01/cisa-adds-five-year-old-jquery-xss-flaw.html
Review your jQuery versions and update immediately.
π13β‘10