Paragon Partition Manager's BioNTdrv.sys driver has a critical vulnerability (CVE-2025-0289) exploited in ransomware attacks.
Attackers with local access can escalate privileges and run malicious code on Windows systems.
Read the full analysis here: https://thehackernews.com/2025/03/hackers-exploit-paragon-partition.html
Attackers with local access can escalate privileges and run malicious code on Windows systems.
Read the full analysis here: https://thehackernews.com/2025/03/hackers-exploit-paragon-partition.html
π±11π8β‘3π₯3π1π1
Is the future of the SOC autonomous?
"Autonomous SOC" has become one of the biggest buzzwords in the post-GPT era. But how much of the hype is real?
In an on-demand webinar, Tines CEO Eoin Hinchy and guest speaker Allie Mellen, Principal Analyst at Forrester, take a deep into the practical applications of AI in security operations.
They explored:
πΈ How SOCs are evolving with AI and workflow orchestration
πΈ Practical applications of AI within the SOC
πΈ How teams can identify areas where AI-driven autonomy makes sense
Watch now: https://thn.news/future-soc-autonomous-fb
"Autonomous SOC" has become one of the biggest buzzwords in the post-GPT era. But how much of the hype is real?
In an on-demand webinar, Tines CEO Eoin Hinchy and guest speaker Allie Mellen, Principal Analyst at Forrester, take a deep into the practical applications of AI in security operations.
They explored:
πΈ How SOCs are evolving with AI and workflow orchestration
πΈ Practical applications of AI within the SOC
πΈ How teams can identify areas where AI-driven autonomy makes sense
Watch now: https://thn.news/future-soc-autonomous-fb
π10π₯3π€―1
The U.K. ICO is investigating TikTok, Reddit, and Imgur for potential child data privacy violations.
The focus is on whether these platforms are using minors' personal data to target content.
Read the full story here: https://thehackernews.com/2025/03/uk-ico-investigates-tiktok-reddit-and.html
The focus is on whether these platforms are using minors' personal data to target content.
Read the full story here: https://thehackernews.com/2025/03/uk-ico-investigates-tiktok-reddit-and.html
π8π€6π4π₯2π2
A new phishing campaign uses the ClickFix technique to launch a multi-stage attack via SharePoint.
It hides behind trusted services and uses the Havoc C2 framework to avoid detection.
Read the full analysis here: https://thehackernews.com/2025/03/hackers-use-clickfix-trick-to-deploy.html
It hides behind trusted services and uses the Havoc C2 framework to avoid detection.
Read the full analysis here: https://thehackernews.com/2025/03/hackers-use-clickfix-trick-to-deploy.html
π13π6π1
A threat group is exploiting AWS misconfigurations to send phishing emails.
TGR-UNK-0011 uses exposed AWS access keys to bypass email security, blending in with trusted communications.
Learn more about their tactics: https://thehackernews.com/2025/03/hackers-exploit-aws-misconfigurations.html
TGR-UNK-0011 uses exposed AWS access keys to bypass email security, blending in with trusted communications.
Learn more about their tactics: https://thehackernews.com/2025/03/hackers-exploit-aws-misconfigurations.html
π21π₯3β‘2π2π€1
β οΈ Googleβs March 2025 Android Security Bulletin warns of 44 vulnerabilities, including two actively exploited flaws: CVE-2024-43093 and CVE-2024-50302, with one tied to a zero-day attack on activists.
Get the full details: https://thehackernews.com/2025/03/googles-march-2025-android-security.html
Get the full details: https://thehackernews.com/2025/03/googles-march-2025-android-security.html
π₯26π€7π2
The U.S. CISA has added five vulnerabilities to its Known Exploited Vulnerabilities (KEV) list, affecting software from Cisco, Microsoft, and Progress WhatsUp Gold.
Learn how this impacts you and how to protect yourself: https://thehackernews.com/2025/03/cisco-hitachi-microsoft-and-progress.html
Learn how this impacts you and how to protect yourself: https://thehackernews.com/2025/03/cisco-hitachi-microsoft-and-progress.html
β‘17π9π€6π€―1
A mass exploitation campaign targets ISPs in China and the U.S. West Coast, affecting over 4,000 IPs with brute-force attacks and malware, including crypto miners and info stealers.
Cybercriminals bypass security and steal data using PowerShell and Telegram.
Read here: https://thehackernews.com/2025/03/over-4000-isp-networks-targeted-in.html
Cybercriminals bypass security and steal data using PowerShell and Telegram.
Read here: https://thehackernews.com/2025/03/over-4000-isp-networks-targeted-in.html
π17π₯5π3π±1
A new phishing campaign targets critical UAE sectors with a Go-based backdoor, Sosano. The attack uses a compromised Indian electronics company to deliver a targeted payload.
Learn more: https://thehackernews.com/2025/03/suspected-iranian-hackers-used.html
Learn more: https://thehackernews.com/2025/03/suspected-iranian-hackers-used.html
π13π4β‘2π₯2
Cyberattacks are getting smarterβare you?
Threat-Led Vulnerability Management (TLVM) helps you focus on the vulnerabilities most likely to be exploited, making your defenses stronger and your resources smarter.
Discover how to optimize your strategy: https://thehackernews.com/expert-insights/2025/03/why-now-is-time-to-adopt-threat-led.html
Threat-Led Vulnerability Management (TLVM) helps you focus on the vulnerabilities most likely to be exploited, making your defenses stronger and your resources smarter.
Discover how to optimize your strategy: https://thehackernews.com/expert-insights/2025/03/why-now-is-time-to-adopt-threat-led.html
π10π₯2π2π€1
β οΈ ALERT: VMware ESXi, Workstation, and Fusion products have critical vulnerabilities that are being actively exploited.
These flaws could allow remote code execution and information disclosure.
Learn more about the vulnerabilities and fixes here: https://thehackernews.com/2025/03/vmware-security-flaws-exploited-in.html
These flaws could allow remote code execution and information disclosure.
Learn more about the vulnerabilities and fixes here: https://thehackernews.com/2025/03/vmware-security-flaws-exploited-in.html
β‘24π€―4π€2π₯1
Credential stuffing is getting harder to stop, but attackers are evolving. Stolen credentials, often just $10, drive 80% of web app attacks, and the threat is growing.
With billions of compromised credentials out there, attacks can spread quickly and widely.
Learn more about this shift in attack strategies: https://thehackernews.com/2025/03/how-new-ai-agents-will-transform.html
With billions of compromised credentials out there, attacks can spread quickly and widely.
Learn more about this shift in attack strategies: https://thehackernews.com/2025/03/how-new-ai-agents-will-transform.html
π€―9π3π2π1
Black Basta and CACTUS ransomware groups now share the same BackConnect module, signaling a shift in attack methods.
The overlap in tactics means cybersecurity professionals must watch for threats across multiple ransomware families.
Read here: https://thehackernews.com/2025/03/researchers-link-cactus-ransomware.html
The overlap in tactics means cybersecurity professionals must watch for threats across multiple ransomware families.
Read here: https://thehackernews.com/2025/03/researchers-link-cactus-ransomware.html
π₯13π6β‘3π±3π1π€―1
Researchers have found a malicious campaign targeting Go developers with fake libraries.
At least 7 typosquatted packages impersonate popular Go modules to deploy loader malware. These can execute remote code, stealing data or credentials on Linux and macOS systems.
Read the full analysis here: https://thehackernews.com/2025/03/seven-malicious-go-packages-found.html
At least 7 typosquatted packages impersonate popular Go modules to deploy loader malware. These can execute remote code, stealing data or credentials on Linux and macOS systems.
Read the full analysis here: https://thehackernews.com/2025/03/seven-malicious-go-packages-found.html
π±11π€―5β‘2π₯2π2π1π€1
Lotus Panda is back, using new Sagerunex variants to target key sectors in Asia.
Now, they're hiding in plain sight, using Dropbox and Zimbra for command-and-controlβmaking detection tougher than ever.
Get the full analysis here: https://thehackernews.com/2025/03/chinese-apt-lotus-panda-targets.html
Now, they're hiding in plain sight, using Dropbox and Zimbra for command-and-controlβmaking detection tougher than ever.
Get the full analysis here: https://thehackernews.com/2025/03/chinese-apt-lotus-panda-targets.html
π₯13π3π€2β‘1π€―1
Identity is the top target for cybercriminalsβ80% of breaches are due to compromised credentials.
With cloud services and fragmented tech stacks, the risk is higher than ever. Securing Identity is crucial to protecting your enterprise.
Learn more about strengthening your security strategy: https://thehackernews.com/2025/03/identity-new-cybersecurity-battleground.html
With cloud services and fragmented tech stacks, the risk is higher than ever. Securing Identity is crucial to protecting your enterprise.
Learn more about strengthening your security strategy: https://thehackernews.com/2025/03/identity-new-cybersecurity-battleground.html
π9β‘1π±1
Google launches AI-powered scam detection for Android, warning users during conversationsβwithout compromising privacy.
Read more: https://thehackernews.com/2025/03/google-rolls-out-ai-scam-detection-for.html
Read more: https://thehackernews.com/2025/03/google-rolls-out-ai-scam-detection-for.html
π20π€5π₯4π3β‘2π€―1π±1
Dark Caracal is targeting Latin American businesses with the Poco RAT trojan. It can upload files, capture screenshots, and run commands.
Discover more about this sophisticated attack: https://thehackernews.com/2025/03/dark-caracal-uses-poco-rat-to-target.html
Discover more about this sophisticated attack: https://thehackernews.com/2025/03/dark-caracal-uses-poco-rat-to-target.html
π€12π₯7π2π2β‘1π1
Silk Typhoon has shifted from exploiting Microsoft Exchange flaws to targeting IT supply chains.
By compromising remote management tools and cloud apps, they gain access to networks, paving the way for large-scale espionage.
Read the full analysis here: https://thehackernews.com/2025/03/china-linked-silk-typhoon-expands-cyber.html
By compromising remote management tools and cloud apps, they gain access to networks, paving the way for large-scale espionage.
Read the full analysis here: https://thehackernews.com/2025/03/china-linked-silk-typhoon-expands-cyber.html
π€―12π₯5π±4β‘2π1
Many organizations rely on 10+ security tools, but they often donβt integrate.
This creates hidden gapsβmisconfigurations and untracked devices. Cybersecurity teams need a unified view to spot these risks and close vulnerabilities before attackers do.
Learn more about strengthening your security: https://thehackernews.com/expert-insights/2025/03/why-aggregating-your-asset-inventory.html
This creates hidden gapsβmisconfigurations and untracked devices. Cybersecurity teams need a unified view to spot these risks and close vulnerabilities before attackers do.
Learn more about strengthening your security: https://thehackernews.com/expert-insights/2025/03/why-aggregating-your-asset-inventory.html
π7π₯3π€3π1
USB drive attacks are a serious cybersecurity threat, using everyday devices to bypass network defenses.
Malware spreads through public drop-offs, mailed USBs, and social engineering, putting organizations at risk of data breaches, financial loss, and downtime.
Read the full analysis here: https://thehackernews.com/2025/03/defending-against-usb-drive-attacks.html
Malware spreads through public drop-offs, mailed USBs, and social engineering, putting organizations at risk of data breaches, financial loss, and downtime.
Read the full analysis here: https://thehackernews.com/2025/03/defending-against-usb-drive-attacks.html
π25π₯7π€6π2β‘1