π¨ Cybercriminals just got smarter. Did your defenses?
AI isn't just a tool for goodβitβs a weapon in the wrong hands. Deepfake phishing, AI-powered exploits, invisible breachesβtheyβre already here.
If your security hasnβt adapted, youβre already behind. But thereβs a way forward.
π Join us for our next WEBINAR
ποΈ Featuring expert from @Zscaler
π‘ Learn how to outsmart AI-powered threats
Watch now β https://thehackernews.com/2025/04/ai-threats-are-evolving-fast-learn.html
AI isn't just a tool for goodβitβs a weapon in the wrong hands. Deepfake phishing, AI-powered exploits, invisible breachesβtheyβre already here.
If your security hasnβt adapted, youβre already behind. But thereβs a way forward.
π Join us for our next WEBINAR
ποΈ Featuring expert from @Zscaler
π‘ Learn how to outsmart AI-powered threats
Watch now β https://thehackernews.com/2025/04/ai-threats-are-evolving-fast-learn.html
π14π6
Stop patching blindly. Start defending smart.
Threat-Led Vulnerability Management (TLVM) helps you focus on what attackers are actually exploitingβnot just whatβs labeled βcritical.β
In todayβs AI-fueled threat landscape, context > CVSS.
π― Prioritize real risks.
π‘οΈ Strengthen your defenses.
β±οΈ Act before attackers do.
Learn how: https://thehackernews.com/expert-insights/2025/03/why-now-is-time-to-adopt-threat-led.html
Threat-Led Vulnerability Management (TLVM) helps you focus on what attackers are actually exploitingβnot just whatβs labeled βcritical.β
In todayβs AI-fueled threat landscape, context > CVSS.
π― Prioritize real risks.
π‘οΈ Strengthen your defenses.
β±οΈ Act before attackers do.
Learn how: https://thehackernews.com/expert-insights/2025/03/why-now-is-time-to-adopt-threat-led.html
π9
π¨ Microsoft Alert: New tax-season phishing wave hits 2,300+ U.S. Companies!
Hackers are using PDFs, QR codes, and fake DocuSign pages to steal passwords and install malware like Latrodectus and Brute Ratel.
π― Targeted: IT, consulting, and engineering firms
π¦ Malware: Remcos, AHKBot, GuLoader, more
π Full story here: https://thehackernews.com/2025/04/microsoft-warns-of-tax-themed-email.html
Hackers are using PDFs, QR codes, and fake DocuSign pages to steal passwords and install malware like Latrodectus and Brute Ratel.
π― Targeted: IT, consulting, and engineering firms
π¦ Malware: Remcos, AHKBot, GuLoader, more
π Full story here: https://thehackernews.com/2025/04/microsoft-warns-of-tax-themed-email.html
π11π₯5π±1
π¨ Massive new risk for data systems!
CVE-2025-30065 | Apache Parquet Java lib flaw (CVSS 10.0) lets attackers execute arbitrary code via poisoned files.
If your pipelines touch untrusted Parquet files, patch NOW.
Read: https://thehackernews.com/2025/04/critical-flaw-in-apache-parquet-allows.html
CVE-2025-30065 | Apache Parquet Java lib flaw (CVSS 10.0) lets attackers execute arbitrary code via poisoned files.
If your pipelines touch untrusted Parquet files, patch NOW.
Read: https://thehackernews.com/2025/04/critical-flaw-in-apache-parquet-allows.html
π±7π€―5π1π₯1π1
π The cloud never slows down β neither do the threats.
Wiz, now part of Googleβs biggest acquisition ever, can show you in 15 mins how to secure everything from code to runtimeβwithout adding friction.
π See how it works: https://thehackernews.com/videos/2025/03/wiz-15-minute-demo-secure-everything.html
Wiz, now part of Googleβs biggest acquisition ever, can show you in 15 mins how to secure everything from code to runtimeβwithout adding friction.
π See how it works: https://thehackernews.com/videos/2025/03/wiz-15-minute-demo-secure-everything.html
π7π€―3π1
β‘ CERT-UA confirms 3+ attacks on Ukraineβs government and critical systems since Fall 2024 using phishing links (DropMeFiles, Google Drive) to deploy WRECKSTEEL malware.
Cyber threats are escalating.
Read more β https://thehackernews.com/2025/04/cert-ua-reports-cyberattacks-targeting.html
Cyber threats are escalating.
Read more β https://thehackernews.com/2025/04/cert-ua-reports-cyberattacks-targeting.html
π11π€6π4π2
π₯ New Ivanti ZERO-DAY exploited in the wild β China-linked UNC5221 hits Connect Secure (CVE-2025-22457, CVSS 9.0).
π£ Exploits spotted mid-March by Mandiant.
π΅οΈββοΈMalware: TRAILBLAZE, BRUSHFIRE, SPAWN.
π― Persistence. Credential theft. Data exfiltration.
β‘ Patch now | See full story + urgent guidance: https://thehackernews.com/2025/04/critical-ivanti-flaw-actively-exploited.html
π£ Exploits spotted mid-March by Mandiant.
π΅οΈββοΈMalware: TRAILBLAZE, BRUSHFIRE, SPAWN.
π― Persistence. Credential theft. Data exfiltration.
β‘ Patch now | See full story + urgent guidance: https://thehackernews.com/2025/04/critical-ivanti-flaw-actively-exploited.html
π8π4π€4π2
π¨ Hackers arenβt hiding in basements anymore β theyβre students with business plans.
A 19-year-old, Coquettte, used Russian bulletproof hosting to spread malware disguised as antivirus software.
An OPSEC mistake exposed ties to Horrid, a cybercrime group training new hackers.
π Learn more: https://thehackernews.com/2025/04/opsec-failure-exposes-coquetttes.html
A 19-year-old, Coquettte, used Russian bulletproof hosting to spread malware disguised as antivirus software.
An OPSEC mistake exposed ties to Horrid, a cybercrime group training new hackers.
π Learn more: https://thehackernews.com/2025/04/opsec-failure-exposes-coquetttes.html
π₯27π8π4π2
π₯ 10 years ago, Docker changed how we build software.
Today, Chainguard OS changes how we deliver it.
Chainguard OS:
β Secure upstream sources
β Daily updates
β Smaller, safer, faster
Containers evolved. Now software delivery has too.
π Whatβs next: https://thehackernews.com/2025/04/have-we-reached-distroless-tipping-point.html
Today, Chainguard OS changes how we deliver it.
Chainguard OS:
β Secure upstream sources
β Daily updates
β Smaller, safer, faster
Containers evolved. Now software delivery has too.
π Whatβs next: https://thehackernews.com/2025/04/have-we-reached-distroless-tipping-point.html
π8π6π±4π2π€2
π $0 GitHub Action β $B security nightmare.
In Nov 2024, a SpotBugs maintainer accidentally leaked a GitHub access token.
β‘ Attackers exploited itβmoving from SpotBugs β reviewdog β poisoning tj-actions/changed-filesβbefore striking Coinbase in March 2025.
β‘οΈ Details here: https://thehackernews.com/2025/04/spotbugs-access-token-theft-identified.html
In Nov 2024, a SpotBugs maintainer accidentally leaked a GitHub access token.
β‘ Attackers exploited itβmoving from SpotBugs β reviewdog β poisoning tj-actions/changed-filesβbefore striking Coinbase in March 2025.
β‘οΈ Details here: https://thehackernews.com/2025/04/spotbugs-access-token-theft-identified.html
π13π±9π5
DDoS attacks are rising β and gaps in protection are being exposed. π
In 2024, Cloudflare reported 25M+ DDoS attacks, a 53% YoY increase.
Even basic attacks can bypass defenses due to hidden vulnerabilities in security policies β not vendor failures.
Continuous validation is now essential to stay resilient.
Learn more π https://thehackernews.com/expert-insights/2025/03/the-surprising-gap-in-ddos-protections.html
In 2024, Cloudflare reported 25M+ DDoS attacks, a 53% YoY increase.
Even basic attacks can bypass defenses due to hidden vulnerabilities in security policies β not vendor failures.
Continuous validation is now essential to stay resilient.
Learn more π https://thehackernews.com/expert-insights/2025/03/the-surprising-gap-in-ddos-protections.html
π15π3π₯2
π¨ Malicious Python packages on PyPI steal data from 34,000+ users!
Fake libraries (bitcoinlibdbfix, bitcoinlib-dev, disgrasya) hid malware to exfiltrate databases and test stolen credit cards.
π Attackers even joined GitHub discussions to trick users.
π Read: https://thehackernews.com/2025/04/malicious-python-packages-on-pypi.html
Fake libraries (bitcoinlibdbfix, bitcoinlib-dev, disgrasya) hid malware to exfiltrate databases and test stolen credit cards.
π Attackers even joined GitHub discussions to trick users.
π Read: https://thehackernews.com/2025/04/malicious-python-packages-on-pypi.html
π€―24π11π2
π North Korean hackers are hunting developersβright now.
New malware-laced npm packages (5,600+ downloads) are spreading BeaverTail and a new RAT loader, hidden as fake utilities.
π Targets? Your code. Your system. Your data.
Read: https://thehackernews.com/2025/04/north-korean-hackers-deploy-beavertail.html
New malware-laced npm packages (5,600+ downloads) are spreading BeaverTail and a new RAT loader, hidden as fake utilities.
π Targets? Your code. Your system. Your data.
Read: https://thehackernews.com/2025/04/north-korean-hackers-deploy-beavertail.html
π13π₯11π5π€4π±3
π Microsoft Credits EncryptHub β the Hacker Behind 618+ Breaches β for Disclosing Windows Flaws. π
In March 2025, EncryptHub reported 2 critical bugs (CVE-2025-24061 & CVE-2025-24071).
Weeks later, he exploited a zero-day (CVE-2025-26633), hitting hundreds of targets using ChatGPT-built malware.
π Full story: https://thehackernews.com/2025/04/microsoft-credits-encrypthub-hacker.html
In March 2025, EncryptHub reported 2 critical bugs (CVE-2025-24061 & CVE-2025-24071).
Weeks later, he exploited a zero-day (CVE-2025-26633), hitting hundreds of targets using ChatGPT-built malware.
π Full story: https://thehackernews.com/2025/04/microsoft-credits-encrypthub-hacker.html
π19π₯11π10π5β‘3
π¨ PoisonSeed ALERT: Hackers are hijacking CRM platforms like Mailchimp, SendGrid, Hubspot to steal crypto wallets β by sending fake seed phrases in mass spam attacks.
Once inside? They create API keys for stealthy, long-term control β even if passwords are reset.
Learn more β https://thehackernews.com/2025/04/poisonseed-exploits-crm-accounts-to.html
Once inside? They create API keys for stealthy, long-term control β even if passwords are reset.
Learn more β https://thehackernews.com/2025/04/poisonseed-exploits-crm-accounts-to.html
π12π₯7π6β‘1
π Vanity metrics β security
Fortune 500s still chase patch counts and scan ratesβbut real threats slip through.
Real security = measuring impact, not activity.
Gartner predicts CTEM will cut breaches by 66% by 2026.
π Learn more: https://thehackernews.com/2025/04/security-theater-vanity-metrics-keep.html
Fortune 500s still chase patch counts and scan ratesβbut real threats slip through.
Real security = measuring impact, not activity.
Gartner predicts CTEM will cut breaches by 66% by 2026.
π Learn more: https://thehackernews.com/2025/04/security-theater-vanity-metrics-keep.html
π₯7π6
β‘ Threats are moving faster than patches.
This week in THN: VPN exploits, supply chain hacks, insider threats, fake job scams, and malware-laced phones.
Stay ahead β full recap here β‘οΈ https://thehackernews.com/2025/04/weekly-recap-vpn-exploits-oracles.html
This week in THN: VPN exploits, supply chain hacks, insider threats, fake job scams, and malware-laced phones.
Stay ahead β full recap here β‘οΈ https://thehackernews.com/2025/04/weekly-recap-vpn-exploits-oracles.html
π15π€4π3π₯1
π¨ ALERT: Fast Flux networks are backβand more dangerous than ever.
CISA, NSA, FBI + allies (π¦πΊπ¨π¦π³πΏ) warn: hackers like Gamaredon & Raspberry Robin are rapidly rotating domains to evade takedowns and launch malware attacks.
Block, filter, sinkhole, monitor β or risk exposure.
π Read the full advisory: https://thehackernews.com/2025/04/cisa-and-fbi-warn-fast-flux-is-powering.html
CISA, NSA, FBI + allies (π¦πΊπ¨π¦π³πΏ) warn: hackers like Gamaredon & Raspberry Robin are rapidly rotating domains to evade takedowns and launch malware attacks.
Block, filter, sinkhole, monitor β or risk exposure.
π Read the full advisory: https://thehackernews.com/2025/04/cisa-and-fbi-warn-fast-flux-is-powering.html
β‘17π12π€―7π€4π₯1π1
π₯ Google patches 62 security flaws β but 2 were already exploited in the wild.
One (CVE-2024-53197) helped hackers break into a Serbian activistβs phone in Dec 2024.
π Zero user interaction. Remote takeover.
Full story β https://thehackernews.com/2025/04/google-releases-android-update-to-patch.html
One (CVE-2024-53197) helped hackers break into a Serbian activistβs phone in Dec 2024.
π Zero user interaction. Remote takeover.
Full story β https://thehackernews.com/2025/04/google-releases-android-update-to-patch.html
π18π€―9π±7π€3π₯2
CrushFTP flaw (CVE-2025-31161, CVSS 9.8) is being actively exploited.
Full system takeover via authentication bypass (no login needed)
βFirst attacks seen March 30
β815 vulnerable servers
β Targets: marketing, retail, semiconductor sectors
β Malware used: MeshAgent, Telegram bots
FCEB agencies must patch by April 28. Exploit guide is public. Attackers are moving fast.
π See details: https://thehackernews.com/2025/04/cisa-adds-crushftp-vulnerability-to-kev.html
Full system takeover via authentication bypass (no login needed)
βFirst attacks seen March 30
β815 vulnerable servers
β Targets: marketing, retail, semiconductor sectors
β Malware used: MeshAgent, Telegram bots
FCEB agencies must patch by April 28. Exploit guide is public. Attackers are moving fast.
π See details: https://thehackernews.com/2025/04/cisa-adds-crushftp-vulnerability-to-kev.html
π13β‘2π₯2π2
π AI is coding fasterβbut leaking secrets faster too.
New GitGuardian data (2025):
πΉ Copilot repos leak secrets 40% more often.
πΉ 6.4% exposed credentials β 1,200+ cases.
As AI builds, non-human identities are explodingβand attackers are watching.
CISOs must rethink security NOW.
Learn why β https://thehackernews.com/expert-insights/2025/04/the-new-frontier-of-security-risk-ai.html
New GitGuardian data (2025):
πΉ Copilot repos leak secrets 40% more often.
πΉ 6.4% exposed credentials β 1,200+ cases.
As AI builds, non-human identities are explodingβand attackers are watching.
CISOs must rethink security NOW.
Learn why β https://thehackernews.com/expert-insights/2025/04/the-new-frontier-of-security-risk-ai.html
π9π7π6π€4