🚨 Is Your Okta Environment Secure? Even with best practices, misconfigurations and identity sprawl can leave your system exposed.
⚠️ Key risks:
➝ Inactive admin accounts & weak MFA
➝ Misconfigured security settings
➝ Forgotten API tokens granting access
➝ Lingering access for ex-employees
🔗 Learn how to protect your identity infrastructure: https://thehackernews.com/2025/03/how-to-improve-okta-security-in-four.html
⚠️ Key risks:
➝ Inactive admin accounts & weak MFA
➝ Misconfigured security settings
➝ Forgotten API tokens granting access
➝ Lingering access for ex-employees
🔗 Learn how to protect your identity infrastructure: https://thehackernews.com/2025/03/how-to-improve-okta-security-in-four.html
👍9
🛑 New Rules File Backdoor attack lets hackers poison AI-powered tools like GitHub Copilot & Cursor, injecting hidden malicious code into projects.
🔹 Invisible backdoors via Unicode tricks
🔹 Supply chain risk—spreads across repos
🔹 No alerts—developers unknowingly ship compromised code
Review AI-generated code carefully—your “trusted assistant” might be compromised.
🔗 Learn more: https://thehackernews.com/2025/03/new-rules-file-backdoor-attack-lets.html
🔹 Invisible backdoors via Unicode tricks
🔹 Supply chain risk—spreads across repos
🔹 No alerts—developers unknowingly ship compromised code
Review AI-generated code carefully—your “trusted assistant” might be compromised.
🔗 Learn more: https://thehackernews.com/2025/03/new-rules-file-backdoor-attack-lets.html
👍16😁1🤯1
🚨 GitHub Actions are under attack!
A supply chain attack hit tj-actions/changed-files, leaking AWS keys, GitHub PATs & more. CISA confirms active exploitation.
🔹 CVE-2025-30066 (CVSS 8.6)
🔹 Attack spread via another compromised Action
🔹 Sensitive secrets exposed via logs
Details: https://thehackernews.com/2025/03/cisa-warns-of-active-exploitation-in.html
⚠️ Rotate secrets, audit workflows, pin actions to commits—this won’t be the last attack.
A supply chain attack hit tj-actions/changed-files, leaking AWS keys, GitHub PATs & more. CISA confirms active exploitation.
🔹 CVE-2025-30066 (CVSS 8.6)
🔹 Attack spread via another compromised Action
🔹 Sensitive secrets exposed via logs
Details: https://thehackernews.com/2025/03/cisa-warns-of-active-exploitation-in.html
⚠️ Rotate secrets, audit workflows, pin actions to commits—this won’t be the last attack.
🤯18🔥7👍3😁3
🚨 Critical SCADA Flaws — Researchers uncovered 2 critical vulnerabilities (CVSS 9.3) in mySCADA myPRO, allowing attackers to execute system commands & hijack operations.
🔹 CVE-2025-20014 & CVE-2025-20061
🔹 Full Industrial Network Compromise Possible
Details here: https://thehackernews.com/2025/03/critical-myscada-mypro-flaws-could-let.html
🔹 CVE-2025-20014 & CVE-2025-20061
🔹 Full Industrial Network Compromise Possible
Details here: https://thehackernews.com/2025/03/critical-myscada-mypro-flaws-could-let.html
👍17🤯4⚡2🔥1🤔1
🚨 ClearFake Malware Spreading Fast!
Hackers use fake reCAPTCHA & Cloudflare checks to deploy Lumma & Vidar Stealer malware.
🔹 9,300+ infected sites
🔹 200,000+ users exposed (July 2024)
🔹 Now using Binance Smart Chain for stealth
Learn more: https://thehackernews.com/2025/03/clearfake-infects-9300-sites-uses-fake.html
Hackers use fake reCAPTCHA & Cloudflare checks to deploy Lumma & Vidar Stealer malware.
🔹 9,300+ infected sites
🔹 200,000+ users exposed (July 2024)
🔹 Now using Binance Smart Chain for stealth
Learn more: https://thehackernews.com/2025/03/clearfake-infects-9300-sites-uses-fake.html
⚡12👍9🤔8
🛡 Top 7 AI Risk Mitigation Strategies
AI security secrets? Discover the 7 essential concepts, techniques, and mitigation strategies for securing your AI pipelines.
Learn more: https://thn.news/genai-security-cheat-sheet
AI security secrets? Discover the 7 essential concepts, techniques, and mitigation strategies for securing your AI pipelines.
Learn more: https://thn.news/genai-security-cheat-sheet
🔥7👍4⚡2
⚠️ SaaS identity attacks are exploding!
Hackers are stealing credentials, hijacking logins, and abusing privileges—yet most security tools overlook SaaS identity threats.
🛡️ The Fix? Identity Threat Detection & Response (ITDR)
🔗 Secure SaaS now → https://thehackernews.com/2025/03/5-identity-threat-detection-response.html
Hackers are stealing credentials, hijacking logins, and abusing privileges—yet most security tools overlook SaaS identity threats.
🛡️ The Fix? Identity Threat Detection & Response (ITDR)
🔗 Secure SaaS now → https://thehackernews.com/2025/03/5-identity-threat-detection-response.html
😁8👍6😱4👏1
🔥 Russia’s Role in Cybercrime Just Got Exposed!
200,000+ leaked messages expose direct ties between the ransomware gang & Russian officials.
🔹 AI-powered fraud & malware dev
🔹 Leader escaped via a "green corridor"
Read the full story 👇 https://thehackernews.com/2025/03/leaked-black-basta-chats-suggest.html
200,000+ leaked messages expose direct ties between the ransomware gang & Russian officials.
🔹 AI-powered fraud & malware dev
🔹 Leader escaped via a "green corridor"
Read the full story 👇 https://thehackernews.com/2025/03/leaked-black-basta-chats-suggest.html
👍16😁11⚡8🔥5🤔1
🚨 Severe PHP Flaw Under Attack.
Hackers are exploiting CVE-2024-4577 to deploy crypto miners ⛏️ & Quasar RAT on Windows servers.
🔹 54% of attacks target Taiwan
🔹 5% deploy XMRig miner
🔹 PHP CGI mode at risk
Patch NOW before your servers become a battleground.
🔗 Learn more: https://thehackernews.com/2025/03/hackers-exploit-severe-php-flaw-to.html
Hackers are exploiting CVE-2024-4577 to deploy crypto miners ⛏️ & Quasar RAT on Windows servers.
🔹 54% of attacks target Taiwan
🔹 5% deploy XMRig miner
🔹 PHP CGI mode at risk
Patch NOW before your servers become a battleground.
🔗 Learn more: https://thehackernews.com/2025/03/hackers-exploit-severe-php-flaw-to.html
🔥17👏3⚡2👍2😁1
🚨 Hackers are hijacking compromised Signal accounts to spread Dark Crystal RAT malware—targeting Ukraine’s military & defense industry.
🔹 Fake meeting minutes 📄
🔹 Hidden malware inside archives 🦠
🔹 Remote control & data theft
Read more: https://thehackernews.com/2025/03/cert-ua-warns-dark-crystal-rat-targets.html
🔹 Fake meeting minutes 📄
🔹 Hidden malware inside archives 🦠
🔹 Remote control & data theft
Read more: https://thehackernews.com/2025/03/cert-ua-warns-dark-crystal-rat-targets.html
🤔13👍8🔥5⚡4😁1
💀 CISA just flagged this backup flaw as actively exploited!
CVE-2024-48248 | Unauthenticated file read in NAKIVO Backup & Replication exposes sensitive data & credentials.
🔹 Exploit already public
🔹 Update before it’s too late
Details: https://thehackernews.com/2025/03/cisa-adds-nakivo-vulnerability-to-kev.html
CVE-2024-48248 | Unauthenticated file read in NAKIVO Backup & Replication exposes sensitive data & credentials.
🔹 Exploit already public
🔹 Update before it’s too late
Details: https://thehackernews.com/2025/03/cisa-adds-nakivo-vulnerability-to-kev.html
👍11🔥7
🚨 Spyware Alert!
Citizen Lab reports Australia, Canada, Denmark & more may be using Paragon's Graphite spyware—the same tool used to target journalists & activists via WhatsApp.
⚠️ 90+ journalists targeted
⚠️ iPhones & Androids hacked
🔗 Full story: https://thehackernews.com/2025/03/six-governments-likely-use-israeli.html
Citizen Lab reports Australia, Canada, Denmark & more may be using Paragon's Graphite spyware—the same tool used to target journalists & activists via WhatsApp.
⚠️ 90+ journalists targeted
⚠️ iPhones & Androids hacked
🔗 Full story: https://thehackernews.com/2025/03/six-governments-likely-use-israeli.html
😱14👍9🔥4😁3👏1🤯1
The hidden costs of an in-house SOC could surprise you.
A Security Operations Center (SOC) isn’t just salaries and tools—it’s ongoing costs, operational challenges, and talent shortages. Is building your own SOC really the best move?
Use this SOC Cost Calculator to compare in-house vs. Managed SOC expenses and see where you can optimize costs without sacrificing security.
Calculate your in-house vs managed SOC costs: https://thn.news/soc-cost-calculator-tg
A Security Operations Center (SOC) isn’t just salaries and tools—it’s ongoing costs, operational challenges, and talent shortages. Is building your own SOC really the best move?
Use this SOC Cost Calculator to compare in-house vs. Managed SOC expenses and see where you can optimize costs without sacrificing security.
Calculate your in-house vs managed SOC costs: https://thn.news/soc-cost-calculator-tg
👍17🤯3😁2
Two major vendors just patched remote code execution flaws—update NOW before attackers exploit them.
🔴 Veeam Backup (CVE-2025-23120, 9.9/10)
➡️ Affects v12.3.0.310 & earlier
➡️ Allows RCE by authenticated users
➡️ Fixed in v12.3.1 (12.3.1.1139)
🔴 IBM AIX (CVE-2024-56346 & CVE-2024-56347, 10/10 & 9.6/10)
➡️ Affects AIX 7.2 & 7.3
➡️ Exploitable via NIM services
⚠️ No attacks seen yet, but don’t wait—patch immediately.
Full details: https://thehackernews.com/2025/03/veeam-and-ibm-release-patches-for-high.html
🔴 Veeam Backup (CVE-2025-23120, 9.9/10)
➡️ Affects v12.3.0.310 & earlier
➡️ Allows RCE by authenticated users
➡️ Fixed in v12.3.1 (12.3.1.1139)
🔴 IBM AIX (CVE-2024-56346 & CVE-2024-56347, 10/10 & 9.6/10)
➡️ Affects AIX 7.2 & 7.3
➡️ Exploitable via NIM services
⚠️ No attacks seen yet, but don’t wait—patch immediately.
Full details: https://thehackernews.com/2025/03/veeam-and-ibm-release-patches-for-high.html
🔥12👍8👏2😁1
Cloud security isn't automatic—it's a shared battle.
Think your cloud provider handles everything? Think again. Microsoft 365 users must secure their own data, access, and backups.
🚨 No MFA, weak passwords, or no backup? You're at risk.
🔗 See what you must do now: https://thehackernews.com/2025/03/how-to-protect-your-business-from-cyber.html
Think your cloud provider handles everything? Think again. Microsoft 365 users must secure their own data, access, and backups.
🚨 No MFA, weak passwords, or no backup? You're at risk.
🔗 See what you must do now: https://thehackernews.com/2025/03/how-to-protect-your-business-from-cyber.html
🔥11👍6🤔2👏1
🎮 Gamers, beware! That "free cheat" might steal everything.
Hackers are hiding malware in YouTube videos promoting game cheats, infecting PCs with Arcane Stealer.
🕵️ Stealing passwords, crypto wallets, VPN logins, and more.
Full report: https://thehackernews.com/2025/03/youtube-game-cheats-spread-arcane.html
Hackers are hiding malware in YouTube videos promoting game cheats, infecting PCs with Arcane Stealer.
🕵️ Stealing passwords, crypto wallets, VPN logins, and more.
Full report: https://thehackernews.com/2025/03/youtube-game-cheats-spread-arcane.html
😁15🤔4👍3🤯3🔥2😱2
👎 Most SMBs Are Failing Compliance—Are Yours?
📉 60% of U.S. small businesses aren’t fully compliant with security laws like HIPAA, PCI-DSS & GDPR.
💸 Risk: Fines, breaches & reputational damage.
💡 Solution: Continuous compliance monitoring.
MSPs: Turn compliance into profit.
Learn how → https://thehackernews.com/2025/03/why-continuous-compliance-monitoring-is.html
📉 60% of U.S. small businesses aren’t fully compliant with security laws like HIPAA, PCI-DSS & GDPR.
💸 Risk: Fines, breaches & reputational damage.
💡 Solution: Continuous compliance monitoring.
MSPs: Turn compliance into profit.
Learn how → https://thehackernews.com/2025/03/why-continuous-compliance-monitoring-is.html
👍17⚡3😱3🤯1
🔥 Hardcoded admin logins. Leaky debug logs. Cisco Smart Licensing Utility is under fire.
Hackers are actively exploiting CVE-2024-20439 & CVE-2024-20440—both rated 9.8.
Access to admin creds & APIs is on the line.
See the full story 👉 https://thehackernews.com/2025/03/ongoing-cyber-attacks-exploit-critical.html
Hackers are actively exploiting CVE-2024-20439 & CVE-2024-20440—both rated 9.8.
Access to admin creds & APIs is on the line.
See the full story 👉 https://thehackernews.com/2025/03/ongoing-cyber-attacks-exploit-critical.html
😁14👍4🔥4⚡2
🚨 Two hacker groups just joined forces.
Head Mare & Twelve are now working together to hit Russian targets—using WinRAR & Exchange exploits, ransomware like LockBit, and stealthy backdoors.
👉 Full story: https://thehackernews.com/2025/03/kaspersky-links-head-mare-to-twelve.html
Head Mare & Twelve are now working together to hit Russian targets—using WinRAR & Exchange exploits, ransomware like LockBit, and stealthy backdoors.
👉 Full story: https://thehackernews.com/2025/03/kaspersky-links-head-mare-to-twelve.html
😁17👍13🔥9🤔2🤯2
👀 While the world was distracted…
China’s Aquatic Panda ran a 10-month global spy op in 2022—hitting the U.S., France, Taiwan & more.
🕵️ Code-named Operation FishMedley
💻 Used malware like ShadowPad & SodaMaster
💣 Targets: Think tanks, NGOs, governments
See how it worked ⬇️ https://thehackernews.com/2025/03/china-linked-apt-aquatic-panda-10-month.html
China’s Aquatic Panda ran a 10-month global spy op in 2022—hitting the U.S., France, Taiwan & more.
🕵️ Code-named Operation FishMedley
💻 Used malware like ShadowPad & SodaMaster
💣 Targets: Think tanks, NGOs, governments
See how it worked ⬇️ https://thehackernews.com/2025/03/china-linked-apt-aquatic-panda-10-month.html
😁16🔥7🤔7👍5
78% of orgs are vulnerable to a 9.8 CVSS attack—not due to advanced hacks, but basic mDNS spoofing. 👀
Vonahi Security ran 10,000+ internal pentests in 2024. The top risks weren’t zero-days—they were simple, fixable flaws:
• 78% – mDNS spoofing
• 73% – NBNS spoofing
• 66% – LLMNR spoofing
• 50% – misconfigs
• 25% – outdated Windows
• 20% – weak passwords
Most orgs rely on firewalls & SIEMs—but skip real testing.
⚡ Automate it. Stay ahead. Attackers don’t wait. Your security testing shouldn’t either.
👉 Test your network: https://thehackernews.com/2025/03/10-critical-network-pentest-findings-it.html
Vonahi Security ran 10,000+ internal pentests in 2024. The top risks weren’t zero-days—they were simple, fixable flaws:
• 78% – mDNS spoofing
• 73% – NBNS spoofing
• 66% – LLMNR spoofing
• 50% – misconfigs
• 25% – outdated Windows
• 20% – weak passwords
Most orgs rely on firewalls & SIEMs—but skip real testing.
⚡ Automate it. Stay ahead. Attackers don’t wait. Your security testing shouldn’t either.
👉 Test your network: https://thehackernews.com/2025/03/10-critical-network-pentest-findings-it.html
😱6👍4🔥3