π¨ New Malware: RESURGE
China-linked hackers are exploiting Ivanti VPNs via CVE-2025-0282.
π οΈ RESURGE = rootkit + bootkit + web shell
π― Hits critical infrastructure
π Linked to UNC5337 & Silk Typhoon
Patch now | Ivanti <22.7R2.5 is vulnerable
Full CISA alert: https://thehackernews.com/2025/03/resurge-malware-exploits-ivanti-flaw.html
China-linked hackers are exploiting Ivanti VPNs via CVE-2025-0282.
π οΈ RESURGE = rootkit + bootkit + web shell
π― Hits critical infrastructure
π Linked to UNC5337 & Silk Typhoon
Patch now | Ivanti <22.7R2.5 is vulnerable
Full CISA alert: https://thehackernews.com/2025/03/resurge-malware-exploits-ivanti-flaw.html
π16π₯4β‘2π€1
π¨ Russia-linked hackers Gamaredon are using fake war docs to drop Remcos RAT on Ukrainian systems.
πͺ€ ZIP β LNK β PowerShell β DLL side-loading β full access
Meanwhile, another phishing op is posing as the CIA to trick pro-Ukraine Russians into handing over personal info via Google Forms.
Two fronts. One strategy.
Learn more: https://thehackernews.com/2025/03/russia-linked-gamaredon-uses-troop.html
πͺ€ ZIP β LNK β PowerShell β DLL side-loading β full access
Meanwhile, another phishing op is posing as the CIA to trick pro-Ukraine Russians into handing over personal info via Google Forms.
Two fronts. One strategy.
Learn more: https://thehackernews.com/2025/03/russia-linked-gamaredon-uses-troop.html
π€―20π13π₯5π5π4β‘3π±2
β‘ THN Weekly Recap β This Week in Cyber:
β Chrome 0-Day exploited in the wild
β Kubernetes RCE nightmare exposed
β Solar inverters at risk of blackouts
β Rclone-powered leak site breached
β DNS-based phishing just got stealthier
π© Catch up now: https://thehackernews.com/2025/03/weekly-recap-chrome-0-day.html
β Chrome 0-Day exploited in the wild
β Kubernetes RCE nightmare exposed
β Solar inverters at risk of blackouts
β Rclone-powered leak site breached
β DNS-based phishing just got stealthier
π© Catch up now: https://thehackernews.com/2025/03/weekly-recap-chrome-0-day.html
π₯10π3
π¨ AWS doesn't secure your cloudβyou do. Most cloud breaches happen because customers miss what's theirs to protect.
5 silent risks you're likely exposed to:
β’ SSRF attacks
β’ Leaky S3 buckets
β’ Over-permissive IAM
β’ Unpatched EC2
β’ Public-facing services
AWS secures the foundation. You secure the rest.
π Start scanning in minutes β https://thehackernews.com/2025/03/5-impactful-aws-vulnerabilities-youre.html
5 silent risks you're likely exposed to:
β’ SSRF attacks
β’ Leaky S3 buckets
β’ Over-permissive IAM
β’ Unpatched EC2
β’ Public-facing services
AWS secures the foundation. You secure the rest.
π Start scanning in minutes β https://thehackernews.com/2025/03/5-impactful-aws-vulnerabilities-youre.html
π13β‘4
π¨ Hackers are abusing WordPress mu-pluginsβa hidden auto-run directoryβto inject malware, hijack links, and redirect users to scam sites.
Also, add these to the list of 2024's major WordPress threats:
CVE-2024-27956 | SQL injection
CVE-2024-25600 | RCE in Bricks theme
CVE-2024-8353 | PHP injection
CVE-2024-4345 | Arbitrary file upload
If you run a WordPress site, check your mu-plugins folder NOW.
π‘οΈ Full story: https://thehackernews.com/2025/03/hackers-exploit-wordpress-mu-plugins-to.html
Also, add these to the list of 2024's major WordPress threats:
CVE-2024-27956 | SQL injection
CVE-2024-25600 | RCE in Bricks theme
CVE-2024-8353 | PHP injection
CVE-2024-4345 | Arbitrary file upload
If you run a WordPress site, check your mu-plugins folder NOW.
π‘οΈ Full story: https://thehackernews.com/2025/03/hackers-exploit-wordpress-mu-plugins-to.html
π14β‘3π₯3
π¨ A Russian group, Water Gamayun, is abusing a Windows zero-day (CVE-2025-26633) to drop two chilling backdoors: SilentPrism & DarkWisp.
Theyβre hiding in plain sightβusing signed .msi files posing as legit apps like DingTalk & VooV to hijack systems.
π Targets? Your data, credentials, and even crypto wallets.
π Techniques? Living-off-the-land, PowerShell implants, fake WinRAR sitesβpure cyber espionage playbook.
π Learn more: https://thehackernews.com/2025/03/russian-hackers-exploit-cve-2025-26633.html
Theyβre hiding in plain sightβusing signed .msi files posing as legit apps like DingTalk & VooV to hijack systems.
π Targets? Your data, credentials, and even crypto wallets.
π Techniques? Living-off-the-land, PowerShell implants, fake WinRAR sitesβpure cyber espionage playbook.
π Learn more: https://thehackernews.com/2025/03/russian-hackers-exploit-cve-2025-26633.html
π22π€―9β‘4π€4π±3π2
π₯ Apple hit with β¬150M fine for βbiasedβ privacy rules.
France says Appleβs App Tracking Transparency (ATT) gave itself a privacy passβwhile forcing rivals through a double-consent maze.
Regulators call it unfair, confusing, and not truly neutral.
https://thehackernews.com/2025/04/apple-fined-150-million-by-french.html
France says Appleβs App Tracking Transparency (ATT) gave itself a privacy passβwhile forcing rivals through a double-consent maze.
Regulators call it unfair, confusing, and not truly neutral.
https://thehackernews.com/2025/04/apple-fined-150-million-by-french.html
π27π7π5π₯3π€1
A China-linked hacking group, Earth Alux, is hitting key sectors in Asia-Pacific and Latin America with stealthy, advanced cyberattacks.
π Tools & Tactics:
β’ VARGEIT: A backdoor hidden in mspaint.exe, used for spying and data theft
β’ COBEACON (Cobalt Strike): Initial access
β’ MASQLOADER: Evades security detection
β’ Uses 10+ covert communication channels, including Microsoft Outlook drafts
π Learn more: https://thehackernews.com/2025/04/china-linked-earth-alux-uses-vargeit.html
Stay alert. These attacks are live.
π Tools & Tactics:
β’ VARGEIT: A backdoor hidden in mspaint.exe, used for spying and data theft
β’ COBEACON (Cobalt Strike): Initial access
β’ MASQLOADER: Evades security detection
β’ Uses 10+ covert communication channels, including Microsoft Outlook drafts
π Learn more: https://thehackernews.com/2025/04/china-linked-earth-alux-uses-vargeit.html
Stay alert. These attacks are live.
π21π₯9π€1
π₯ 23,958 IPs. 10 days. One target: Palo Alto GlobalProtect.
A massive spike in login scans hints at coordinated reconβand possible exploitation ahead.
If you run GlobalProtect, this is your early warning. Audit & harden exposed portals now.
π Full story: https://thehackernews.com/2025/04/nearly-24000-ips-target-pan-os.html
A massive spike in login scans hints at coordinated reconβand possible exploitation ahead.
If you run GlobalProtect, this is your early warning. Audit & harden exposed portals now.
π Full story: https://thehackernews.com/2025/04/nearly-24000-ips-target-pan-os.html
π15π₯3
π¨ Old iPhones, new threats. Apple just patched 3 exploited zero-daysβand yes, even your dusty iPhone 6s is getting a fix.
π‘οΈ What's at stake?
β’ CVE-2025-24201 (CVSS 8.8): Malicious web content breaking free from Safariβs sandbox
β’ CVE-2025-24085 (7.3): Apps hijacking system privileges
β’ CVE-2025-24200 (4.6): Bypassing USB Restricted Modeβhello physical attacks
π₯ Why now? These bugs are being actively exploited in the wild.
π Full list + device breakdown: https://thehackernews.com/2025/04/apple-backports-critical-fixes-for-3.html
π‘οΈ What's at stake?
β’ CVE-2025-24201 (CVSS 8.8): Malicious web content breaking free from Safariβs sandbox
β’ CVE-2025-24085 (7.3): Apps hijacking system privileges
β’ CVE-2025-24200 (4.6): Bypassing USB Restricted Modeβhello physical attacks
π₯ Why now? These bugs are being actively exploited in the wild.
π Full list + device breakdown: https://thehackernews.com/2025/04/apple-backports-critical-fixes-for-3.html
π21π₯5π4π3π€2
π₯ Your CSRF tokens might already be leaking.
A global retailer dodged a $3.9M breach and GDPR fines up to β¬20Mβall due to one misconfigured Facebook Pixel exposing CSRF tokens.
The kicker? This wasnβt malware. It was human errorβundetectable by blockers.
Protect your site before regulators come knocking.
π Learn what to fix β https://thehackernews.com/2025/04/new-case-study-global-retailer.html
A global retailer dodged a $3.9M breach and GDPR fines up to β¬20Mβall due to one misconfigured Facebook Pixel exposing CSRF tokens.
The kicker? This wasnβt malware. It was human errorβundetectable by blockers.
Protect your site before regulators come knocking.
π Learn what to fix β https://thehackernews.com/2025/04/new-case-study-global-retailer.html
π6π3
π¨ Think SMS phishing is old news? Think again.
A new PhaaS platform called Lucid is hijacking iMessage & Android RCS to dodge filters and hit 169 targets in 88 countries.
π³ Goal? Steal credit cards + PII, at scale.
π Learn more: https://thehackernews.com/2025/04/lucid-phaas-hits-169-targets-in-88.html
A new PhaaS platform called Lucid is hijacking iMessage & Android RCS to dodge filters and hit 169 targets in 88 countries.
π³ Goal? Steal credit cards + PII, at scale.
π Learn more: https://thehackernews.com/2025/04/lucid-phaas-hits-169-targets-in-88.html
π13π₯6π€2π1
This media is not supported in your browser
VIEW IN TELEGRAM
π₯ On its 21st birthday, Google rolls out built-in end-to-end encryption for enterprise Gmail usersβno extensions, no certificate swaps.
π Just click, send, secure. Powered by client-side encryption.
π οΈ Admins hold the keys | Google canβt see a thing.
π See how it works: https://thehackernews.com/2025/04/enterprise-gmail-users-can-now-send-end.html
π Just click, send, secure. Powered by client-side encryption.
π οΈ Admins hold the keys | Google canβt see a thing.
π See how it works: https://thehackernews.com/2025/04/enterprise-gmail-users-can-now-send-end.html
π24π5π€4π2π±2
π₯ 1,500+ PostgreSQL servers hacked for crypto mining.
A threat group tracked as JINX-0126 is exploiting publicly exposed PostgreSQL instances with weak passwords.
Whatβs happening:
β’ Malware: PG_MEM (fileless, evasive)
β’ Goal: Deploy XMRig miner
β’ Victims: Over 1,500 servers, 3 wallets, ~550 miners each
π Full story: https://thehackernews.com/2025/04/over-1500-postgresql-servers.html
A threat group tracked as JINX-0126 is exploiting publicly exposed PostgreSQL instances with weak passwords.
Whatβs happening:
β’ Malware: PG_MEM (fileless, evasive)
β’ Goal: Deploy XMRig miner
β’ Victims: Over 1,500 servers, 3 wallets, ~550 miners each
π Full story: https://thehackernews.com/2025/04/over-1500-postgresql-servers.html
π₯26π7π€5
π AI is attacking AI β and it just got real.
A new worm, Morris II, is targeting AI apps + email assistants.
But hereβs the key: AI can defend us too.
π‘οΈ Zero Trust stops spread
π Smart vuln management cuts real risk
β‘ AI vs AI is the new norm
Donβt wait. AI attacks move fast.
Fight AI with AI β or fall behind π https://thehackernews.com/expert-insights/2025/03/what-it-means-to-fight-ai-with-ai-using.html
A new worm, Morris II, is targeting AI apps + email assistants.
But hereβs the key: AI can defend us too.
π‘οΈ Zero Trust stops spread
π Smart vuln management cuts real risk
β‘ AI vs AI is the new norm
Donβt wait. AI attacks move fast.
Fight AI with AI β or fall behind π https://thehackernews.com/expert-insights/2025/03/what-it-means-to-fight-ai-with-ai-using.html
π17β‘5π4π€―4π€3
π¨ A new wave of stealth malware loaders is hereβmodular, evasive, and cloud-integrated.
𧬠Hijack Loader: API spoofing, anti-VM, Avast evasion
π» SHELBY: GitHub as C2βpayloads & commands via commits
π§ͺ SmokeLoader: .NET Reactor obfuscation + 7-Zip phishing
π Read the full report: https://thehackernews.com/2025/04/new-malware-loaders-use-call-stack.html
𧬠Hijack Loader: API spoofing, anti-VM, Avast evasion
π» SHELBY: GitHub as C2βpayloads & commands via commits
π§ͺ SmokeLoader: .NET Reactor obfuscation + 7-Zip phishing
π Read the full report: https://thehackernews.com/2025/04/new-malware-loaders-use-call-stack.html
π±8π4β‘2π2
π¨ Theyβre back. Russian threat group FIN7 is using Anubisβa lightweight Python backdoor that grants full remote access to Windows machines without leaving detectable files.
It runs entirely in memory, evades most defenses, and can steal passwords, take screenshots, and exfiltrate dataβall masked with Base64 and hosted on compromised SharePoint sites.
π Full analysis: https://thehackernews.com/2025/04/fin7-deploys-anubis-backdoor-to-hijack.html
It runs entirely in memory, evades most defenses, and can steal passwords, take screenshots, and exfiltrate dataβall masked with Base64 and hosted on compromised SharePoint sites.
π Full analysis: https://thehackernews.com/2025/04/fin7-deploys-anubis-backdoor-to-hijack.html
π€―14π₯10π8β‘5π4
π₯ New Linux botnet ALERT!
Outlawβa Romanian-linked groupβis actively hijacking SSH servers to mine crypto via auto-spreading malware.
β Targets servers with weak SSH creds
β Uses BLITZ to self-propagate
β Installs SHELLBOT for remote control, DDoS, and data theft
β Exploits old bugs like Dirty COW (CVE-2016-5195)
π Full report: https://thehackernews.com/2025/04/outlaw-group-uses-ssh-brute-force-to.html
Outlawβa Romanian-linked groupβis actively hijacking SSH servers to mine crypto via auto-spreading malware.
β Targets servers with weak SSH creds
β Uses BLITZ to self-propagate
β Installs SHELLBOT for remote control, DDoS, and data theft
β Exploits old bugs like Dirty COW (CVE-2016-5195)
π Full report: https://thehackernews.com/2025/04/outlaw-group-uses-ssh-brute-force-to.html
π₯12π4π€3
53.5% of websites have weak SSL.
Not firewalls. Not zero-days. Just bad encryption setups.
π Thatβs how attackers walk in the front door.
SSL misconfigs = MITM attacks, eavesdropping & breaches.
π₯ Your attack surface is growing. Fix it before it spreads.
π Learn more: https://thehackernews.com/2025/04/how-ssl-misconfigurations-impact-your.html
Not firewalls. Not zero-days. Just bad encryption setups.
π Thatβs how attackers walk in the front door.
SSL misconfigs = MITM attacks, eavesdropping & breaches.
π₯ Your attack surface is growing. Fix it before it spreads.
π Learn more: https://thehackernews.com/2025/04/how-ssl-misconfigurations-impact-your.html
π8π5β‘4π±4
π₯ 93% of service providers struggle with cybersecurity compliance.
Only 2% feel confident. Thatβs a problemβand an opportunity.
This guide breaks down NIST compliance into clear, doable steps for MSPs & MSSPs.
β Find gaps
β Automate tasks
β Build client trust
β Cut manual work by 70%
Start here β https://thehackernews.com/2025/04/helping-your-clients-achieve-nist.html
Only 2% feel confident. Thatβs a problemβand an opportunity.
This guide breaks down NIST compliance into clear, doable steps for MSPs & MSSPs.
β Find gaps
β Automate tasks
β Build client trust
β Cut manual work by 70%
Start here β https://thehackernews.com/2025/04/helping-your-clients-achieve-nist.html
π7π2
This media is not supported in your browser
VIEW IN TELEGRAM
π New Google Cloud vulnerability exposed private containersβnow patched.
A flaw in Google Cloud Run (ImageRunner) let attackers with limited access pull private images and inject malicious code.
Attackers could exploit this to steal secrets or run malicious containers.
π Learn more: https://thehackernews.com/2025/04/google-fixed-cloud-run-vulnerability.html
A flaw in Google Cloud Run (ImageRunner) let attackers with limited access pull private images and inject malicious code.
Attackers could exploit this to steal secrets or run malicious containers.
π Learn more: https://thehackernews.com/2025/04/google-fixed-cloud-run-vulnerability.html
π9π6π2