π¨ Threat ALERT: ResolverRAT is hitting healthcare and pharma sectors hard β phishing, fear-bait, stealth attacks.
π‘οΈ Sophisticated multi-stage RAT
π Localized lures: Hindi, Italian, Turkish + more
π΅οΈββοΈ Advanced evasion: encryption, IP rotation, memory-only payload
π Read: https://thehackernews.com/2025/04/resolverrat-campaign-targets-healthcare.html
π‘οΈ Sophisticated multi-stage RAT
π Localized lures: Hindi, Italian, Turkish + more
π΅οΈββοΈ Advanced evasion: encryption, IP rotation, memory-only payload
π Read: https://thehackernews.com/2025/04/resolverrat-campaign-targets-healthcare.html
π28π₯4π1
π₯ Metaβs AI is coming for your public posts β but you can still opt out.
Starting this week, Meta is using public EU content from Facebook, Instagram & more (comments, posts, AI chats β not DMs).
Regulators approved it after a 1-year pause. Opt-out links are rolling out. Check your app or email.
π Act now β https://thehackernews.com/2025/04/meta-resumes-eu-ai-training-using.html
Starting this week, Meta is using public EU content from Facebook, Instagram & more (comments, posts, AI chats β not DMs).
Regulators approved it after a 1-year pause. Opt-out links are rolling out. Check your app or email.
π Act now β https://thehackernews.com/2025/04/meta-resumes-eu-ai-training-using.html
π€13π7π±2π€―1
π¨ Alert β A 9.0 CVSS flaw in Gladinetβs CentreStack also affects Triofoxβboth used for remote access.
Attackers exploited it as a zero-day in March, hitting 7 orgs by April 11.
π Root cause: Hardcoded crypto keys β enabled RCE via PowerShell + DLL sideloading
π Read: https://thehackernews.com/2025/04/gladinets-triofox-and-centrestack-under.html
Attackers exploited it as a zero-day in March, hitting 7 orgs by April 11.
π Root cause: Hardcoded crypto keys β enabled RCE via PowerShell + DLL sideloading
π Read: https://thehackernews.com/2025/04/gladinets-triofox-and-centrestack-under.html
π16
π¨ Hired by Hackers?
Devs on LinkedIn targeted in stealth malware attacks disguised as job offers.
Slow Pisces, linked to North Koreaβs Bybit hack (Feb 2025), is now luring coders with fake challenges to drop RN Stealerβa macOS info-stealer pulling iCloud, SSH, and cloud config files.
β‘οΈ Learn how it works: https://thehackernews.com/2025/04/crypto-developers-targeted-by-python.html
Devs on LinkedIn targeted in stealth malware attacks disguised as job offers.
Slow Pisces, linked to North Koreaβs Bybit hack (Feb 2025), is now luring coders with fake challenges to drop RN Stealerβa macOS info-stealer pulling iCloud, SSH, and cloud config files.
β‘οΈ Learn how it works: https://thehackernews.com/2025/04/crypto-developers-targeted-by-python.html
π13
π¨ Apache Roller Hit by 10.0 CVSS Flaw!
Old sessions stay active even after a password change (CVE-2025-24859). Hackers can keep access silently.
All versions β€6.1.4 affected.
π Full details: https://thehackernews.com/2025/04/critical-apache-roller-vulnerability.html
π Fixed in v6.1.5. Patch now.
Old sessions stay active even after a password change (CVE-2025-24859). Hackers can keep access silently.
All versions β€6.1.4 affected.
π Full details: https://thehackernews.com/2025/04/critical-apache-roller-vulnerability.html
π Fixed in v6.1.5. Patch now.
π14π5
π¨ Your biggest enterprise risk might be hiding in plain sight β THE BROWSER EXTENSIONS.
π 99% of employees use them
π 53% access sensitive data
π 54% have unknown publishers
π₯ Your entire org could be one extension away from compromise.
π Act now β Audit, assess, and lock down. Learn how: https://thehackernews.com/2025/04/majority-of-browser-extensions-can.html
π 99% of employees use them
π 53% access sensitive data
π 54% have unknown publishers
π₯ Your entire org could be one extension away from compromise.
π Act now β Audit, assess, and lock down. Learn how: https://thehackernews.com/2025/04/majority-of-browser-extensions-can.html
π₯13π10π6
Sophisticated phishing attacks are now routinely bypassing MFA, SSO, and multiple security layers across email, network, and endpoints.
Join the latest webinar from Push Security to learn why phishing attacks are more attractive than ever for attackers in 2025 β and what you can do to stop it.
Register here π https://thn.news/phishing-webinar-it
Join the latest webinar from Push Security to learn why phishing attacks are more attractive than ever for attackers in 2025 β and what you can do to stop it.
Register here π https://thn.news/phishing-webinar-it
π10π2
β οΈ UNC5174 (aka Uteus), tied to China, is quietly breaching Linux & macOS systems using SNOWLIGHT malware + a fake Cloudflare app (VShell).
π Targets: 20+ nations | Sectors: Gov, finance, defense
π Tactics: Open-source tools, fileless payloads, fake authenticator apps
π Risk: Remote control, in-memory attacks, hard-to-trace
π Full details: https://thehackernews.com/2025/04/chinese-hackers-target-linux-systems.html
π Targets: 20+ nations | Sectors: Gov, finance, defense
π Tactics: Open-source tools, fileless payloads, fake authenticator apps
π Risk: Remote control, in-memory attacks, hard-to-trace
π Full details: https://thehackernews.com/2025/04/chinese-hackers-target-linux-systems.html
π21π1
"Your firewall wonβt save you."
Hackers are using ChatGPT to craft phishing lures & scan attack surfaces.
Meanwhile, most orgs still cling to VPNs & 30-year-old security models.
π₯ Zero Trust + AI isnβt hype β itβs survival.
Donβt fall behind: https://thehackernews.com/expert-insights/2025/04/rethinking-cyber-defense-with-zero.html
Hackers are using ChatGPT to craft phishing lures & scan attack surfaces.
Meanwhile, most orgs still cling to VPNs & 30-year-old security models.
π₯ Zero Trust + AI isnβt hype β itβs survival.
Donβt fall behind: https://thehackernews.com/expert-insights/2025/04/rethinking-cyber-defense-with-zero.html
π13π7π€―3
π CRITICAL ALERT β U.S. funding for MITREβs CVE vulnerability database program ends Wednesday.
MITRE warns: no funding = no new CVEs, degraded threat advisories, and slower incident response.
π οΈ CVEs power security tools, alerts, and patching across critical infrastructure.
π Without it, defenders lose a key part of their playbook.
π Full story β https://thehackernews.com/2025/04/us-govt-funding-for-mitres-cve-ends.html
MITRE warns: no funding = no new CVEs, degraded threat advisories, and slower incident response.
π οΈ CVEs power security tools, alerts, and patching across critical infrastructure.
π Without it, defenders lose a key part of their playbook.
π Full story β https://thehackernews.com/2025/04/us-govt-funding-for-mitres-cve-ends.html
π€―38π€7π6π4π₯3π±3β‘2π1
π¨ New Android Phones, Pre-Loaded with Malware?!
Since June 2024, cheap Androids from Chinese brands like SHOWJI come with trojanized WhatsApp/Telegram apps out of the box.
π± Fake models: βS24 Ultraβ, βNote 13 Proβ, etc.
πΈ Malware replaces your crypto wallet address in chats
π§ Scans your images for mnemonic phrases
π° Hackers netted $1.6M+ via 40+ infected apps & 60+ C2 servers
π Check the list & protect your crypto β https://thehackernews.com/2025/04/chinese-android-phones-shipped-with.html
Since June 2024, cheap Androids from Chinese brands like SHOWJI come with trojanized WhatsApp/Telegram apps out of the box.
π± Fake models: βS24 Ultraβ, βNote 13 Proβ, etc.
πΈ Malware replaces your crypto wallet address in chats
π§ Scans your images for mnemonic phrases
π° Hackers netted $1.6M+ via 40+ infected apps & 60+ C2 servers
π Check the list & protect your crypto β https://thehackernews.com/2025/04/chinese-android-phones-shipped-with.html
π12π6π₯3
π¨ BPFDoor is backβwith a stealthy new controller in play.
A fresh wave of BPFDoor attacks has hit telecom, finance & retail sectors in π°π·π²πΎππ°π²π²πͺπ¬ β using a stealth controller that opens reverse shells & moves laterally inside Linux networks.
π Read β https://thehackernews.com/2025/04/new-bpfdoor-controller-enables-stealthy.html
A fresh wave of BPFDoor attacks has hit telecom, finance & retail sectors in π°π·π²πΎππ°π²π²πͺπ¬ β using a stealth controller that opens reverse shells & moves laterally inside Linux networks.
π Read β https://thehackernews.com/2025/04/new-bpfdoor-controller-enables-stealthy.html
π11π₯3
β οΈ Why hack inβ¦ when you can just log in?
80% of breaches stem from SaaS identity misconfigurations.
One compromised account can trigger a chain: Entra ID takeover β GitHub exfiltration β Slack leaks
Wing Security gives full SaaS visibilityβno agents, no blind spots.
β Identity & app mapping
β Real-time threat detection
β Full attack timeline
π See how it works: https://thehackernews.com/2025/04/product-walkthrough-look-inside-wing.html
80% of breaches stem from SaaS identity misconfigurations.
One compromised account can trigger a chain: Entra ID takeover β GitHub exfiltration β Slack leaks
Wing Security gives full SaaS visibilityβno agents, no blind spots.
β Identity & app mapping
β Real-time threat detection
β Full attack timeline
π See how it works: https://thehackernews.com/2025/04/product-walkthrough-look-inside-wing.html
π9π5
β οΈ Hackers are abusing AI tool Gamma to craft fake presentations that lead you to spoofed Microsoft SharePoint loginsβand even fake CAPTCHA pages to dodge security scans.
πDetails: https://thehackernews.com/2025/04/ai-powered-gamma-used-to-host-microsoft.html
πDetails: https://thehackernews.com/2025/04/ai-powered-gamma-used-to-host-microsoft.html
π8π5π2π₯1π€1
π¨ Supply chain cyberattacks are exploding β and hitting where it hurts most: healthcare, retail, energy.
π¦ One breach = millions exposed.
The risk? Vendors are the backdoor. Hackers are walking right in.
Learn whatβs driving this wave and how to stay ahead: https://thehackernews.com/2025/04/from-third-party-vendors-to-us-tariffs.html
π¦ One breach = millions exposed.
The risk? Vendors are the backdoor. Hackers are walking right in.
Learn whatβs driving this wave and how to stay ahead: https://thehackernews.com/2025/04/from-third-party-vendors-to-us-tariffs.html
π10π3π₯2π€―1
π Google blocked 5.1B bad ads and banned 39.2M advertiser accounts in 2024.
AI flagged scams, deepfakes, and fraud at scaleβ700K accounts suspended for impersonating public figures alone.
π 5.1B bad ads blocked
π 9.1B restricted
π« 1.3B pages hit
π€ 5M+ scam accounts suspended
π€ AI flagged 700K deepfake scams
π Full story: https://thehackernews.com/2025/04/google-blocked-51b-harmful-ads-and.html
AI flagged scams, deepfakes, and fraud at scaleβ700K accounts suspended for impersonating public figures alone.
π 5.1B bad ads blocked
π 9.1B restricted
π« 1.3B pages hit
π€ 5M+ scam accounts suspended
π€ AI flagged 700K deepfake scams
π Full story: https://thehackernews.com/2025/04/google-blocked-51b-harmful-ads-and.html
π20π6π₯5β‘1π€1
Over 50% of vulnerabilities are exploited within 7 days of discovery.
Learn how to reduce MTTR and secure your apps with insights from ActiveState's 2025 State of Vulnerability Management & Remediation Report.
π‘οΈ Stay ahead of threatsβdownload now! https://thn.news/vulnerability-management-2025
#DevSecOps #OpenSource
Learn how to reduce MTTR and secure your apps with insights from ActiveState's 2025 State of Vulnerability Management & Remediation Report.
π‘οΈ Stay ahead of threatsβdownload now! https://thn.news/vulnerability-management-2025
#DevSecOps #OpenSource
π11π8
ππ UPDATE β CISA extends funding to prevent a shutdown of the CVE Program.
A new CVE Foundation is also launched to ensure global, independent oversightβjust as ENISA rolls out the EU Vulnerability Database.
Read: https://thehackernews.com/2025/04/us-govt-funding-for-mitres-cve-ends.html#update-cisa-extends-cve-program-contract-amid-funding-crisis
A new CVE Foundation is also launched to ensure global, independent oversightβjust as ENISA rolls out the EU Vulnerability Database.
Read: https://thehackernews.com/2025/04/us-govt-funding-for-mitres-cve-ends.html#update-cisa-extends-cve-program-contract-amid-funding-crisis
π25π9π₯6π€―3π1
π₯ One task away from total takeover?
4 local privilege escalation flaws found in schtasks.exeβa core part of Windows Task Scheduler.
Attackers can:
β’ Bypass UAC
β’ Run SYSTEM-level commands
β’ Erase security logs
β’ Impersonate admins using known passwords.
Fix not yet available.
π Full story β https://thehackernews.com/2025/04/experts-uncover-four-new-privilege.html
4 local privilege escalation flaws found in schtasks.exeβa core part of Windows Task Scheduler.
Attackers can:
β’ Bypass UAC
β’ Run SYSTEM-level commands
β’ Erase security logs
β’ Impersonate admins using known passwords.
Fix not yet available.
π Full story β https://thehackernews.com/2025/04/experts-uncover-four-new-privilege.html
π₯18π12
π¨ Targeted iPhone attacks in the wild.
Apple just patched 2 new zero-daysβbringing 2025βs total to 5 actively exploited flaws.
β One lets hackers run code via malicious audio files
β Another bypasses Pointer Authentication using memory tricks
π Details here: https://thehackernews.com/2025/04/apple-patches-two-actively-exploited.html
Update now: iOS 18.4.1, macOS Sequoia 15.4.1, tvOS, visionOS
Apple just patched 2 new zero-daysβbringing 2025βs total to 5 actively exploited flaws.
β One lets hackers run code via malicious audio files
β Another bypasses Pointer Authentication using memory tricks
π Details here: https://thehackernews.com/2025/04/apple-patches-two-actively-exploited.html
Update now: iOS 18.4.1, macOS Sequoia 15.4.1, tvOS, visionOS
π20π4π₯2π€1
π¨ Actively Exploited SonicWall Flaw Hits CISAβs KEV List.
Remote attackers can execute code via SMA 100 Series bug (CVE-2021-20035, CVSS 7.2).
β‘οΈ Injects OS commands as βnobodyβ user
β‘οΈ Impacts SMA 200β500v on outdated firmware
β‘οΈ FCEB agencies must patch by May 7, 2025
Your VPN gateway could be the backdoor. Patch it
Learn more: https://thehackernews.com/2025/04/cisa-flags-actively-exploited.html
Remote attackers can execute code via SMA 100 Series bug (CVE-2021-20035, CVSS 7.2).
β‘οΈ Injects OS commands as βnobodyβ user
β‘οΈ Impacts SMA 200β500v on outdated firmware
β‘οΈ FCEB agencies must patch by May 7, 2025
Your VPN gateway could be the backdoor. Patch it
Learn more: https://thehackernews.com/2025/04/cisa-flags-actively-exploited.html
π20π₯2