β οΈ Ransomware doesnβt hit all at onceβit unfolds in stages, beginning with subtle signs like deleted backups and escalated privileges. If youβre not monitoring early warning signs, itβs too late by the time encryption locks you out.
π Learn how continuous ransomware validation can help you detect threats early: https://thehackernews.com/2025/02/becoming-ransomware-ready-why.html
π Learn how continuous ransomware validation can help you detect threats early: https://thehackernews.com/2025/02/becoming-ransomware-ready-why.html
π15π€12
Cybersecurity experts are sounding alarms over a new wave of malware leveraging cracked software to spread information stealers like ACR Stealer.
ACR Stealer is using legitimate services like Telegram and Google Slides to hide its malicious command-and-control server.
Read the full story: https://thehackernews.com/2025/02/new-malware-campaign-uses-cracked.html
ACR Stealer is using legitimate services like Telegram and Google Slides to hide its malicious command-and-control server.
Read the full story: https://thehackernews.com/2025/02/new-malware-campaign-uses-cracked.html
π22β‘5π€―5π₯3π€1
π CISA has warned about two vulnerabilities: CVE-2017-3066 and CVE-2024-20953. Despite patches being available, they're flagged due to continued exploitation risks.
π Read the full article: https://thehackernews.com/2025/02/two-actively-exploited-security-flaws.html
π Read the full article: https://thehackernews.com/2025/02/two-actively-exploited-security-flaws.html
π21π±3π€2
A new wave of phishing attacks has targeted industrial organizations across the APAC region, delivering the dangerous FatalRAT malware.
These attacks leverage legitimate cloud services like myqcloud and Youdao Cloud Notes to evade detection.
Read the full story: https://thehackernews.com/2025/02/fatalrat-phishing-attacks-target-apac.html
These attacks leverage legitimate cloud services like myqcloud and Youdao Cloud Notes to evade detection.
Read the full story: https://thehackernews.com/2025/02/fatalrat-phishing-attacks-target-apac.html
β‘17π9π€5π₯1
π¨ A cyber campaign using fake open-source projects on GitHub is stealing personal data and crypto assets.
Malicious tools disguised as game mods and automation scripts have already stolen 5 bitcoins (~$456,600).
Read the full article to learn how this attack works: https://thehackernews.com/2025/02/gitvenom-malware-steals-456k-in-bitcoin.html
Malicious tools disguised as game mods and automation scripts have already stolen 5 bitcoins (~$456,600).
Read the full article to learn how this attack works: https://thehackernews.com/2025/02/gitvenom-malware-steals-456k-in-bitcoin.html
π19π€―8β‘4π₯2π€2π1
π¨ Cyberattackers are using a vulnerable Windows driver to evade detection and deliver the Gh0st RAT malware.
Thousands of modified driver variants, including RogueKillerβs truesight.sys, are now actively bypassing defenses.
π Read the full article: https://thehackernews.com/2025/02/2500-truesightsys-driver-variants.html
Thousands of modified driver variants, including RogueKillerβs truesight.sys, are now actively bypassing defenses.
π Read the full article: https://thehackernews.com/2025/02/2500-truesightsys-driver-variants.html
π€15β‘6π4π±4π₯2
A new malware campaign targets Belarusian activists and the Ukrainian military, using Excel files to deliver PicassoLoader.
The malicious Excel file tricks users into enabling obfuscated macros, which deploy a stealthy RAT and additional payloads.
Read the full article: https://thehackernews.com/2025/02/belarus-linked-ghostwriter-uses.html
The malicious Excel file tricks users into enabling obfuscated macros, which deploy a stealthy RAT and additional payloads.
Read the full article: https://thehackernews.com/2025/02/belarus-linked-ghostwriter-uses.html
π10π₯5π3β‘2π2
Researchers uncover a revamped LightSpy spyware with over 100 commands, targeting Android, iOS, Windows, macOS, and platforms like Facebook and Instagram.
Explore the full details: https://thehackernews.com/2025/02/lightspy-expands-to-100-commands.html
Explore the full details: https://thehackernews.com/2025/02/lightspy-expands-to-100-commands.html
π12β‘4π4π2
π Cybercriminals are using the ClickFix technique to spread the NetSupport RAT in 2025. Embedded in fake CAPTCHA pages, this RAT grants attackers full control, stealing sensitive data and spying in real-time.
Learn how this threat works and how to defend against itβread the full article: https://thehackernews.com/2025/02/5-active-malware-campaigns-in-q1-2025.html
Learn how this threat works and how to defend against itβread the full article: https://thehackernews.com/2025/02/5-active-malware-campaigns-in-q1-2025.html
π14π€8π₯6β‘2
π CISA has just added two critical vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalogβboth actively exploited.
Hook: Microsoft Partner Centerβs CVE-2024-49035 and Synacor ZCSβs CVE-2023-34192 are putting organizations at risk.
Read the full article: https://thehackernews.com/2025/02/cisa-adds-microsoft-and-zimbra-flaws-to.html
Hook: Microsoft Partner Centerβs CVE-2024-49035 and Synacor ZCSβs CVE-2023-34192 are putting organizations at risk.
Read the full article: https://thehackernews.com/2025/02/cisa-adds-microsoft-and-zimbra-flaws-to.html
π12π₯8π€―2π1π±1
β οΈ A malicious Python package, automslc, has been flagged for bypassing Deezer's security to enable unauthorized music downloads.
With over 104,000 downloads, it exploits hardcoded credentials and external servers for illegal music piracy.
Read the full article: https://thehackernews.com/2025/02/malicious-pypi-package-automslc-enables.html
With over 104,000 downloads, it exploits hardcoded credentials and external servers for illegal music piracy.
Read the full article: https://thehackernews.com/2025/02/malicious-pypi-package-automslc-enables.html
π19π13π€―10π₯6β‘2π±2
π¨ Ukraineβs CERT-UA warns of new cyberattacks targeting Notary of Ukraine operations with the DCRat remote access trojan.
Attackers gain access using RDPWRAPPER and steal data with tools like FIDDLER and XWorm.
Read the full article for more insights: https://thehackernews.com/2025/02/cert-ua-warns-of-uac-0173-attacks.html
Attackers gain access using RDPWRAPPER and steal data with tools like FIDDLER and XWorm.
Read the full article for more insights: https://thehackernews.com/2025/02/cert-ua-warns-of-uac-0173-attacks.html
π13π₯5π5π3β‘2π€―2
π¨ A new Linux malware, Auto-Color, is targeting universities and government organizations across North America and Asia.
Unlike traditional malware, it uses encryption and hidden tactics to evade detection, making it harder to remove.
π Read: https://thehackernews.com/2025/02/new-linux-malware-auto-color-grants.html
Unlike traditional malware, it uses encryption and hidden tactics to evade detection, making it harder to remove.
π Read: https://thehackernews.com/2025/02/new-linux-malware-auto-color-grants.html
π24π€―12β‘4π€2
Passwords are under constant attackβfrom brute force to dictionary & rainbow table methods. Strong, complex passwords and MFA are essential to defend against these threats.
Learn how to protect your data from advanced password-cracking techniques: https://thehackernews.com/2025/02/three-password-cracking-techniques-and.html
Learn how to protect your data from advanced password-cracking techniques: https://thehackernews.com/2025/02/three-password-cracking-techniques-and.html
π19π₯6
A massive leak of Black Basta's 200,000+ chat messages reveals their tactics, key players, and internal conflicts.
The group uses QakBot for access, exploits SMB misconfigurations, and faces growing instability.
Get the inside scoop: https://thehackernews.com/2025/02/leaked-black-basta-chat-logs-reveal.html
The group uses QakBot for access, exploits SMB misconfigurations, and faces growing instability.
Get the inside scoop: https://thehackernews.com/2025/02/leaked-black-basta-chat-logs-reveal.html
π±13π6π6π1π€1
Say goodbye to burnout with SOC 3.0βAI-powered security that works smarter, not harder.
Tired of drowning in alerts? SOC 3.0 uses AI to handle the heavy lifting, freeing up analysts to make the big decisions.
Want to see how it all works? Read the full article now: https://thehackernews.com/2025/02/soc-30-evolution-of-soc-and-how-ai-is.html
Tired of drowning in alerts? SOC 3.0 uses AI to handle the heavy lifting, freeing up analysts to make the big decisions.
Want to see how it all works? Read the full article now: https://thehackernews.com/2025/02/soc-30-evolution-of-soc-and-how-ai-is.html
π15π₯5π1
π¨ A severe XSS vulnerability in Krpano, a popular virtual tour framework, has been exploited to inject malicious scripts into over 350 websites.
π Affected sites include government portals, universities, and Fortune 500 companies.
The attack manipulates search results, using SEO poisoning tactics to promote spam ads.
Get the full details: https://thehackernews.com/2025/02/hackers-exploited-krpano-framework-flaw.html
π Affected sites include government portals, universities, and Fortune 500 companies.
The attack manipulates search results, using SEO poisoning tactics to promote spam ads.
Get the full details: https://thehackernews.com/2025/02/hackers-exploited-krpano-framework-flaw.html
π€―14π€6π5π2
Shadow AI is quietly slipping into your organizationβare you prepared to stop it?
AI tools are growing fast, but many are flying under the radar, avoiding standard security checks. This can put sensitive data at risk. Is your security plan ready?
Read the full article to learn how to protect your organization from Shadow AI: https://thehackernews.com/expert-insights/2025/02/shadow-ai-is-here-is-your-security.html
AI tools are growing fast, but many are flying under the radar, avoiding standard security checks. This can put sensitive data at risk. Is your security plan ready?
Read the full article to learn how to protect your organization from Shadow AI: https://thehackernews.com/expert-insights/2025/02/shadow-ai-is-here-is-your-security.html
π22π€―2π€1
β οΈ The FBI confirms Lazarus Group (TraderTraitor) is behind the $1.5B Bybit hack.
The attack originated from a compromised Safe{Wallet} developer machine, allowing a malicious transaction to target Bybitβs multisig cold wallet.
The stolen funds are now being laundered across multiple blockchains.
Read more: https://thehackernews.com/2025/02/bybit-hack-traced-to-safewallet-supply.html
The attack originated from a compromised Safe{Wallet} developer machine, allowing a malicious transaction to target Bybitβs multisig cold wallet.
The stolen funds are now being laundered across multiple blockchains.
Read more: https://thehackernews.com/2025/02/bybit-hack-traced-to-safewallet-supply.html
π30π9π₯6π±4π€3π1
π¨ A new botnet, PolarEdge, is exploiting critical vulnerabilities in Cisco, ASUS, QNAP, and Synology edge devices.
A TLS backdoor lets attackers control infected devices worldwide. Over 2,000 devices are already compromised, targeting outdated routers.
Read the full article for more details: https://thehackernews.com/2025/02/polaredge-botnet-exploits-cisco-and.html
A TLS backdoor lets attackers control infected devices worldwide. Over 2,000 devices are already compromised, targeting outdated routers.
Read the full article for more details: https://thehackernews.com/2025/02/polaredge-botnet-exploits-cisco-and.html
β‘15π7π3π€3
The Android malware TgToxic (ToxicPanda) has evolved, with new features to evade detection and enhance its capabilities.
With improved emulator detection and dynamic C2 server generation, this malware is adapting faster than researchers can track.
Explore the full article: https://thehackernews.com/2025/02/new-tgtoxic-banking-trojan-variant.html
With improved emulator detection and dynamic C2 server generation, this malware is adapting faster than researchers can track.
Explore the full article: https://thehackernews.com/2025/02/new-tgtoxic-banking-trojan-variant.html
π13β‘7π3