Russian-aligned threat actors are using malicious QR codes to hijack Signal accounts via the appβs legitimate βlinked devicesβ feature.
Once compromised, threat actors gain real-time access to victim messages, enabling persistent surveillance.
Learn how these attacks work: https://thehackernews.com/2025/02/hackers-exploit-signals-linked-devices.html
Once compromised, threat actors gain real-time access to victim messages, enabling persistent surveillance.
Learn how these attacks work: https://thehackernews.com/2025/02/hackers-exploit-signals-linked-devices.html
π₯23π11π€―11π3β‘2π€2π1
π¨ Microsoft has issued high-severity security updates for Bing (CVE-2025-21355) and Power Pages (CVE-2025-24989), addressing two serious flaws.
One of these vulnerabilities is already being exploited in the wild.
Read more: https://thehackernews.com/2025/02/microsoft-patches-actively-exploited.html
One of these vulnerabilities is already being exploited in the wild.
Read more: https://thehackernews.com/2025/02/microsoft-patches-actively-exploited.html
π₯13π6π€5π4
Citrix has patched a severe flaw in NetScaler Console & Agent (CVE-2024-12284) with a CVSS score of 8.8.
This privilege escalation bug could allow authenticated attackers to execute unauthorized actions.
UPDATE immediately to the latest versions.
Read: https://thehackernews.com/2025/02/citrix-releases-security-fix-for.html
This privilege escalation bug could allow authenticated attackers to execute unauthorized actions.
UPDATE immediately to the latest versions.
Read: https://thehackernews.com/2025/02/citrix-releases-security-fix-for.html
β‘9π6π€2π₯1
π UPDATE: Researchers reveal tech details on credential coercion vulnerabilities (CVE-2024-13159-13161, 10811) in Ivanti EPM. Attackers could compromise servers via relay attacks.
β‘ Patch urgently if you havenβt done so alreadyβPoC exploit now in the wild.
https://thehackernews.com/2025/01/researcher-uncovers-critical-flaws-in.html
β‘ Patch urgently if you havenβt done so alreadyβPoC exploit now in the wild.
https://thehackernews.com/2025/01/researcher-uncovers-critical-flaws-in.html
π12π€6π3π2
π
Mark your calendars!
Microsoft Exchange 2016 and 2019 support ends on October 14, 2025. This means no more security patches or technical support.
π Without updates, these versions will be prime targets for cybercriminals.
Get the full details on your migration options in the article: https://thehackernews.com/2025/02/microsoft-end-of-support-for-exchange-2016-and-exchange-2019.html
Microsoft Exchange 2016 and 2019 support ends on October 14, 2025. This means no more security patches or technical support.
π Without updates, these versions will be prime targets for cybercriminals.
Get the full details on your migration options in the article: https://thehackernews.com/2025/02/microsoft-end-of-support-for-exchange-2016-and-exchange-2019.html
π18π₯5π2π1π€1
Cybercriminals are using the Eclipse Foundationβs jarsigner tool to distribute XLoader malware, exploiting DLL side-loading techniques.
The malware now employs complex encryption at runtime, making signature-based defenses less effective.
Read more: https://thehackernews.com/2025/02/cybercriminals-use-eclipse-jarsigner-to.html
The malware now employs complex encryption at runtime, making signature-based defenses less effective.
Read more: https://thehackernews.com/2025/02/cybercriminals-use-eclipse-jarsigner-to.html
π±10π4π€2π1
π The Green Nailao campaign deployed NailaoLocker ransomware, locking files and demanding Bitcoin payments.
Attackers exploited a Check Point flaw to steal credentials and escalate via RDP.
π Learn more: https://thehackernews.com/2025/02/chinese-linked-attackers-exploit-check.html
Attackers exploited a Check Point flaw to steal credentials and escalate via RDP.
π Learn more: https://thehackernews.com/2025/02/chinese-linked-attackers-exploit-check.html
π₯12π3π2π€1π€―1
By March 31, 2025, all businesses handling cardholder data must implement PCI DSS 4.0 DMARC β No exceptions.
Failure to comply could cost you $5K-$100K in penaltiesβand thatβs just the start.
Read the full article now: https://thehackernews.com/2025/02/pci-dss-40-mandates-dmarc-by-31st-march.html
Failure to comply could cost you $5K-$100K in penaltiesβand thatβs just the start.
Read the full article now: https://thehackernews.com/2025/02/pci-dss-40-mandates-dmarc-by-31st-march.html
π11π₯6π5π€1π±1
π¨ Freelance developers are under attack.
North Korean hackers use fake job interviews on Upwork and GitHub to infect crypto developers with BeaverTail and InvisibleFerret malware, stealing credentials and funds.
π Get the full story: https://thehackernews.com/2025/02/north-korean-hackers-target-freelance.html
North Korean hackers use fake job interviews on Upwork and GitHub to infect crypto developers with BeaverTail and InvisibleFerret malware, stealing credentials and funds.
π Get the full story: https://thehackernews.com/2025/02/north-korean-hackers-target-freelance.html
π23π±11β‘9π6π€3π₯1
The CISA has flagged a critical vulnerability in Craft CMS, prompting urgent action.
CVE-2025-23209 carries a high CVSS score of 8.1βindicating significant risk to any organization still using outdated versions.
This code injection flaw opens the door to remote code execution, potentially exposing sensitive user security keys.
Learn more: https://thehackernews.com/2025/02/cisa-flags-craft-cms-vulnerability-cve.html
CVE-2025-23209 carries a high CVSS score of 8.1βindicating significant risk to any organization still using outdated versions.
This code injection flaw opens the door to remote code execution, potentially exposing sensitive user security keys.
Learn more: https://thehackernews.com/2025/02/cisa-flags-craft-cms-vulnerability-cve.html
π12π€5π3π1
A Chinese threat group, Salt Typhoon, has infiltrated major U.S. telecoms by exploiting CVE-2018-0171, a critical security flaw.
The attackers maintained access for over three years, showcasing their patience and sophistication.
Read more to learn: https://thehackernews.com/2025/02/cisco-confirms-salt-typhoon-exploited.html
The attackers maintained access for over three years, showcasing their patience and sophistication.
Read more to learn: https://thehackernews.com/2025/02/cisco-confirms-salt-typhoon-exploited.html
π19π±9π₯4π3π2π€2β‘1π€―1
AI-powered algorithms are changing the way we consume news, creating digital echo chambers.
One in five Americans now get their news from social media, fueling polarized viewpoints.
Read the full article to explore the rise of AI-driven misinformation: https://thehackernews.com/2025/02/ai-powered-deception-is-menace-to-our.html
One in five Americans now get their news from social media, fueling polarized viewpoints.
Read the full article to explore the rise of AI-driven misinformation: https://thehackernews.com/2025/02/ai-powered-deception-is-menace-to-our.html
π₯7π3π2π€1π±1
Darcula v3 enables fraudsters to clone any websiteβs landing page with easeβno technical expertise required.
In just 10 minutes, attackers can create a phishing site with a brandβs exact look and feel, targeting unsuspecting users.
Read this article: https://thehackernews.com/2025/02/cybercriminals-can-now-clone-any-brands.html
In just 10 minutes, attackers can create a phishing site with a brandβs exact look and feel, targeting unsuspecting users.
Read this article: https://thehackernews.com/2025/02/cybercriminals-can-now-clone-any-brands.html
π₯12π7π2π€1
Weak identity security is a major threat to your business in 2025. If your strategy isnβt evolving, it might already be too late.
Watch this webinar for actionable strategies to defend against modern cyber threats: https://thehackernews.com/2025/02/webinar-learn-how-to-identify-high-risk.html
Watch this webinar for actionable strategies to defend against modern cyber threats: https://thehackernews.com/2025/02/webinar-learn-how-to-identify-high-risk.html
π13π€2
A leaked data cache from Chinese cybersecurity firm TopSec reveals shocking details about its censorship-as-a-service offerings.
The leak reveals a "Cloud Monitoring Service" contract to detect and remove politically sensitive content.
Read: https://thehackernews.com/2025/02/data-leak-exposes-topsecs-role-in.html
The leak reveals a "Cloud Monitoring Service" contract to detect and remove politically sensitive content.
Read: https://thehackernews.com/2025/02/data-leak-exposes-topsecs-role-in.html
π16π€―8π₯5π€1
Apple removes Advanced Data Protection (ADP) for iCloud in the U.K. following pressure from the government to build a backdoor into encrypted data.
This undermines end-to-end encryption and could set a dangerous precedent globally.
Read more: https://thehackernews.com/2025/02/apple-drops-iclouds-advanced-data.html
This undermines end-to-end encryption and could set a dangerous precedent globally.
Read more: https://thehackernews.com/2025/02/apple-drops-iclouds-advanced-data.html
π€―73π13π₯11π±9π6π€2β‘1
OpenAI has taken action against a network using ChatGPT to develop an AI-powered surveillance tool targeting anti-China protests.
The tool, believed to be linked to Chinese authorities, analyzes social media content from platforms like X, Facebook, and Reddit to gather real-time data.
Read the full article: https://thehackernews.com/2025/02/openai-bans-accounts-misusing-chatgpt.html
The tool, believed to be linked to Chinese authorities, analyzes social media content from platforms like X, Facebook, and Reddit to gather real-time data.
Read the full article: https://thehackernews.com/2025/02/openai-bans-accounts-misusing-chatgpt.html
π₯22π15π4β‘3π2π€2π€―2
Over $1.46 billion worth of cryptocurrency was stolen from Bybit's Ethereum cold wallet in the largest crypto heist to date, reportedly orchestrated by the Lazarus Group.
The attack masked the signing interface, tricking the wallet into transferring funds to an unknown address.
Learn more: https://thehackernews.com/2025/02/bybit-confirms-record-breaking-146.html
The attack masked the signing interface, tricking the wallet into transferring funds to an unknown address.
Learn more: https://thehackernews.com/2025/02/bybit-confirms-record-breaking-146.html
π±86π20π₯18π15π€5β‘4
Australia has banned Kaspersky software due to national security risks. The Australian government cites threats like foreign interference and espionage as reasons for the ban.
Read the full article: https://thehackernews.com/2025/02/australia-bans-kaspersky-software-over.html
Read the full article: https://thehackernews.com/2025/02/australia-bans-kaspersky-software-over.html
π49π25π₯8π±6π€5β‘3π€―3π2
Get hands-on tips on optimizing your SOC at a webinar on Feb 26, 3:00 PM GMT
Experts will demonstrate best practices for faster and more effective triage, incident response, and threat hunting.
Don't miss it: https://thn.news/better-soc-malware-sandbox-tg
Experts will demonstrate best practices for faster and more effective triage, incident response, and threat hunting.
Don't miss it: https://thn.news/better-soc-malware-sandbox-tg
β‘10π5π4π€1
Google Cloud introduces quantum-safe digital signatures in Cloud KMS, setting the stage for a future-proof encryption strategy.
This update addresses the quantum risk, aligning with NIST's post-quantum cryptography standards.
Read: https://thehackernews.com/2025/02/google-cloud-kms-adds-quantum-safe.html
This update addresses the quantum risk, aligning with NIST's post-quantum cryptography standards.
Read: https://thehackernews.com/2025/02/google-cloud-kms-adds-quantum-safe.html
π24π€10β‘5π₯5π5