๐จ Cyberattacks on cloud infrastructures are evolving fast, and your current security measures may not be enough.
AI-driven workflows and massive data migrations are expanding attack surfaces. Cloud security isnโt just about detection anymore โ itโs about prevention.
Read how cloud security will transform in 2025 and beyond: https://thehackernews.com/2025/02/watch-out-for-these-8-cloud-security.html
AI-driven workflows and massive data migrations are expanding attack surfaces. Cloud security isnโt just about detection anymore โ itโs about prevention.
Read how cloud security will transform in 2025 and beyond: https://thehackernews.com/2025/02/watch-out-for-these-8-cloud-security.html
๐10๐4๐ฅ3โก1
โ ๏ธ FERRET malware targets macOS users through job scam.
North Korean hackers pose as recruiters on LinkedIn to lure victims. A fake "software update" compromises your system, steals data, and drains your crypto wallet.
Learn more: https://thehackernews.com/2025/02/north-korean-hackers-deploy-ferret.html
North Korean hackers pose as recruiters on LinkedIn to lure victims. A fake "software update" compromises your system, steals data, and drains your crypto wallet.
Learn more: https://thehackernews.com/2025/02/north-korean-hackers-deploy-ferret.html
๐ฅ11๐5๐4
๐ Russian cybercriminals are exploiting new 7-Zip vulnerability (CVE-2025-0411) to target Ukrainian organizations.
This flaw bypasses Windows' MotW protections, allowing remote code execution via malicious archives.
Learn more about the exploit: https://thehackernews.com/2025/02/russian-cybercrime-groups-exploiting-7.html
This flaw bypasses Windows' MotW protections, allowing remote code execution via malicious archives.
Learn more about the exploit: https://thehackernews.com/2025/02/russian-cybercrime-groups-exploiting-7.html
๐ฅ25๐ค8๐1
Python vs. no-code for security automation - a side-by-side breakdown ๐
Security teams sometimes debate whether to write custom Python scripts or use a no-code platform like Tines for SOAR. Both have their advantages - but how do they compare in real-world automation?
In this blog post, security researcher Conor Dunne shares:
๐ก The security, maintenance, and performance trade-offs of each approach
๐ก A side-by-side comparison of core automation components - HTTP requests, webhooks, scheduling, and more
๐ก A real-world case study: automating a Slack news feed
Read the blog post: https://thn.news/tines-python-automation-fb
Security teams sometimes debate whether to write custom Python scripts or use a no-code platform like Tines for SOAR. Both have their advantages - but how do they compare in real-world automation?
In this blog post, security researcher Conor Dunne shares:
๐ก The security, maintenance, and performance trade-offs of each approach
๐ก A side-by-side comparison of core automation components - HTTP requests, webhooks, scheduling, and more
๐ก A real-world case study: automating a Slack news feed
Read the blog post: https://thn.news/tines-python-automation-fb
๐ค7๐4๐คฏ4๐2
๐จ Alert! A malicious package targeting the Go ecosystem has backdoored countless systemsโgiving hackers remote access.
Despite changes to the original GitHub repository, the malicious version persisted, targeting unsuspecting developers.
๐ Learn more: https://thehackernews.com/2025/02/malicious-go-package-exploits-module.html
Despite changes to the original GitHub repository, the malicious version persisted, targeting unsuspecting developers.
๐ Learn more: https://thehackernews.com/2025/02/malicious-go-package-exploits-module.html
๐ฑ17๐9โก5๐ค5๐3๐ฅ1
โ ๏ธ A newly disclosed vulnerability in Microsoft SharePoint connector could have allowed attackers to harvest user credentials and launch attacks across Power Automate, Power Apps, and Copilot 365.
Learn more: https://thehackernews.com/2025/02/microsoft-sharepoint-connector-flaw.html
Learn more: https://thehackernews.com/2025/02/microsoft-sharepoint-connector-flaw.html
๐ฅ18๐คฏ6๐5๐3โก2๐ค1
๐ด CISA warns of critical actively exploited security flaws in popular enterprise software.
This includes high-severity vulnerabilities in Apache OFBiz, Microsoft .NET Framework, and Paessler PRTG Network Monitor.
Act before itโs too late.
Read: https://thehackernews.com/2025/02/cisa-adds-four-actively-exploited.html
This includes high-severity vulnerabilities in Apache OFBiz, Microsoft .NET Framework, and Paessler PRTG Network Monitor.
Act before itโs too late.
Read: https://thehackernews.com/2025/02/cisa-adds-four-actively-exploited.html
๐10๐8๐คฏ4๐ฅ2
โ ๏ธ Managing Active Directory (AD) and Entra ID in hybrid environments? You might be exposing your organization to critical vulnerabilities. Hereโs why:
โคท Privilege Sprawl from mergers, mobility, and acquisitions
โคท Standing Privileges create unmonitored opportunities for attackers to exploit
โคท Manual systems can't keep up with the growing complexity
๐ง Automate your identity managementโsave time and reduce human error.
๐ Get the Full Guide: https://thehackernews.com/expert-insights/2025/02/using-roles-and-attributes-to-protect.html
โคท Privilege Sprawl from mergers, mobility, and acquisitions
โคท Standing Privileges create unmonitored opportunities for attackers to exploit
โคท Manual systems can't keep up with the growing complexity
๐ง Automate your identity managementโsave time and reduce human error.
๐ Get the Full Guide: https://thehackernews.com/expert-insights/2025/02/using-roles-and-attributes-to-protect.html
๐8๐ฅ8๐2โก1
๐จ ALERT: AsyncRAT Strikes Using Dropbox & TryCloudflare
โคท Phishing emails start the chain, leading to AsyncRAT and other malware.
โคท Hackers are now using Dropbox URLs and TryCloudflare tunnels to hide malicious activity.
โคท Python payloads launch a multi-stage attack, making detection nearly impossible.
Check out details: https://thehackernews.com/2025/02/asyncrat-campaign-uses-python-payloads.html
โคท Phishing emails start the chain, leading to AsyncRAT and other malware.
โคท Hackers are now using Dropbox URLs and TryCloudflare tunnels to hide malicious activity.
โคท Python payloads launch a multi-stage attack, making detection nearly impossible.
Check out details: https://thehackernews.com/2025/02/asyncrat-campaign-uses-python-payloads.html
๐10๐ค7โก1๐1
๐จ Vulnerability Assessments Soar in 2024. 24% of organizations now conduct assessments more than 4 times a yearโup from 15% in 2023!
This shift to continuous monitoring means faster responses to threats and stronger defenses.
How is your organization keeping up? ๐ Explore the full report now: https://thehackernews.com/2025/02/navigating-future-key-it-vulnerability.html
This shift to continuous monitoring means faster responses to threats and stronger defenses.
How is your organization keeping up? ๐ Explore the full report now: https://thehackernews.com/2025/02/navigating-future-key-it-vulnerability.html
๐10โก3๐1
๐ Security Alert for Veeam Users! CVE-2025-23114 has a CVSS score of 9.0.
This new critical Man-in-the-Middle attack could allow hackers to execute arbitrary code on your servers.
โ Fix is Available! Check out the details here: https://thehackernews.com/2025/02/new-veeam-flaw-allows-arbitrary-code.html
This new critical Man-in-the-Middle attack could allow hackers to execute arbitrary code on your servers.
โ Fix is Available! Check out the details here: https://thehackernews.com/2025/02/new-veeam-flaw-allows-arbitrary-code.html
๐8โก2๐ค2
๐ Silent Lynx's Multi-Stage Attack Exposed: Targeting Embassies, Law Firms, and Banking Institutions
The group leverages RAR files, C++ binaries, and PowerShell scripts to infiltrate systems and exfiltrate sensitive data.
Read the full article here: https://thehackernews.com/2025/02/silent-lynx-using-powershell-golang-and.html
The group leverages RAR files, C++ binaries, and PowerShell scripts to infiltrate systems and exfiltrate sensitive data.
Read the full article here: https://thehackernews.com/2025/02/silent-lynx-using-powershell-golang-and.html
๐คฏ9โก6
๐ Hackers are exploiting tools like Axios and Node Fetch to take over Microsoft 365 accountsโtargeting high-value employees across industries like finance, healthcare, and IT.
Attack volume spiked to over 13 million login attempts in one password spraying campaign.
Read the full report: https://thehackernews.com/2025/02/cybercriminals-use-axios-and-node-fetch.html
Attack volume spiked to over 13 million login attempts in one password spraying campaign.
Read the full report: https://thehackernews.com/2025/02/cybercriminals-use-axios-and-node-fetch.html
๐8๐ฅ7โก5๐ฑ3
๐จ WARNING: Infamous North Korea-linked Lazarus Group is using fake job offers to spread cross-platform malwareโtargeting crypto and travel industries.
๐กโ๏ธ Fake recruiter offers remote positions in crypto/travel
๐ Victims send personal info (CVs, GitHub links)
โผ๏ธ Attackers deploy a JavaScript data stealer and Python backdoor
This is a complex attack chain that can give attackers persistent remote access to your systems.
Learn more: https://thehackernews.com/2025/02/cross-platform-javascript-stealer.html
๐กโ๏ธ Fake recruiter offers remote positions in crypto/travel
๐ Victims send personal info (CVs, GitHub links)
โผ๏ธ Attackers deploy a JavaScript data stealer and Python backdoor
This is a complex attack chain that can give attackers persistent remote access to your systems.
Learn more: https://thehackernews.com/2025/02/cross-platform-javascript-stealer.html
๐14๐คฏ11โก8๐6
๐ด Hacktivism has evolved โ from political protest to full-blown cyber warfare. The latest surge in DDoS attacks is shaking both the public and private sectors.
These attacks are not just about disruptionโthey're designed to manipulate public opinion and disrupt elections. Now's the time to be aware.
Want to know how geopolitics is shaping the cyber landscape? Read the full analysis now:
https://thehackernews.com/expert-insights/2025/02/hacking-in-name-of.html
These attacks are not just about disruptionโthey're designed to manipulate public opinion and disrupt elections. Now's the time to be aware.
Want to know how geopolitics is shaping the cyber landscape? Read the full analysis now:
https://thehackernews.com/expert-insights/2025/02/hacking-in-name-of.html
๐ฅ20๐10๐4โก2๐ค2
๐ Cisco just patched two critical vulnerabilities in Identity Services Engine (ISE) that could allow attackers to execute arbitrary commands and escalate privileges remotely.
โ ๏ธ CVE-2025-20124 & CVE-2025-20125 carry CVSS scores of 9.9 and 9.1.
Read โ https://thehackernews.com/2025/02/cisco-patches-critical-ise.html
โ ๏ธ CVE-2025-20124 & CVE-2025-20125 carry CVSS scores of 9.9 and 9.1.
Read โ https://thehackernews.com/2025/02/cisco-patches-critical-ise.html
๐17๐ฅ4๐2๐1
๐ North Korea-linked Kimsuky hacking group now using forceCopy, a new info-stealer malware targeting browser credentials.
Spear-phishing emails trick victims into opening disguised Windows shortcut files. PowerShell and mshta.exe trigger malware download, leading to deeper infection.
๐ Read More: https://thehackernews.com/2025/02/north-korean-apt-kimsuky-uses-lnk-files.html
Spear-phishing emails trick victims into opening disguised Windows shortcut files. PowerShell and mshta.exe trigger malware download, leading to deeper infection.
๐ Read More: https://thehackernews.com/2025/02/north-korean-apt-kimsuky-uses-lnk-files.html
๐8๐ค7โก3๐3๐1
๐จ New malware campaign "SparkCat" has been discovered on Apple and Google app stores, using OCR to target crypto wallet recovery phrases.
Read the full report: https://thehackernews.com/2025/02/sparkcat-malware-uses-ocr-to-extract.html
Read the full report: https://thehackernews.com/2025/02/sparkcat-malware-uses-ocr-to-extract.html
๐ค12๐คฏ6๐4๐1
Ransomware is hitting harder in 2025. Hackers demand millionsโand paying up doesnโt guarantee youโll get your data back.
LockBit, Lynx, and Virlockโransomware groups are evolving, targeting everyone from small businesses to critical infrastructure.
Get the full breakdown on how to defend against these threats.: https://thehackernews.com/2025/02/top-3-ransomware-threats-active-in-2025.html
LockBit, Lynx, and Virlockโransomware groups are evolving, targeting everyone from small businesses to critical infrastructure.
Get the full breakdown on how to defend against these threats.: https://thehackernews.com/2025/02/top-3-ransomware-threats-active-in-2025.html
๐14โก8๐ค3๐ฅ2
PAM isnโt just a cybersecurity tool. Itโs a game-changer for operational efficiency, compliance & security.
โข Enforces the principle of least privilege
โข Boosts regulatory compliance
โข Protects from evolving threats
Donโt miss out on this essential shift in cybersecurity leadership.
Read: https://thehackernews.com/2025/02/the-evolving-role-of-pam-in.html
โข Enforces the principle of least privilege
โข Boosts regulatory compliance
โข Protects from evolving threats
Donโt miss out on this essential shift in cybersecurity leadership.
Read: https://thehackernews.com/2025/02/the-evolving-role-of-pam-in.html
๐8๐ฅ7๐1๐คฏ1
โ ๏ธ Big names like LockBit and BlackCat are collapsing, but smaller players are multiplying. Cybercriminals raked in $813.5M from ransomware in 2024โa sharp drop from $1.25B in 2023.
Smaller, faster, and more dangerousโransomware just got a whole lot trickier.
Get the full insights: https://thehackernews.com/2025/02/ransomware-extortion-drops-to-8135m-in.html
Smaller, faster, and more dangerousโransomware just got a whole lot trickier.
Get the full insights: https://thehackernews.com/2025/02/ransomware-extortion-drops-to-8135m-in.html
๐คฏ11๐4๐ฅ2๐ฑ1