π₯ Microsoft boosts security after major China-backed breach.
βMSA sign-ins moved to Azure confidential VMs
β92% of staff now use phishing-resistant MFA
β81% of code branches protected with proof-of-presence
βNew Quick Machine Recovery auto-fixes Windows boot failures
See details: https://thehackernews.com/2025/04/microsoft-secures-msa-signing-with.html
βMSA sign-ins moved to Azure confidential VMs
β92% of staff now use phishing-resistant MFA
β81% of code branches protected with proof-of-presence
βNew Quick Machine Recovery auto-fixes Windows boot failures
See details: https://thehackernews.com/2025/04/microsoft-secures-msa-signing-with.html
π20π8π1
π¨ Signed by Google. Hosted by Google. Hijacked by Hackers.
π Hackers sent real emails from [email protected] β fully verified, signed, no warnings. Victims handed over passwords, believing it was legit.
βοΈ Real Google email
βοΈ Fake login on Google Sites
βοΈ Passed DKIM, SPF, DMARC
π Full story: https://thehackernews.com/2025/04/phishers-exploit-google-sites-and-dkim.html
π Hackers sent real emails from [email protected] β fully verified, signed, no warnings. Victims handed over passwords, believing it was legit.
βοΈ Real Google email
βοΈ Fake login on Google Sites
βοΈ Passed DKIM, SPF, DMARC
π Full story: https://thehackernews.com/2025/04/phishers-exploit-google-sites-and-dkim.html
π±52π14π₯11π10β‘3π2π€―2
Each user is unique. Their security should be too.
Join Bitdefender on April 23 for the LIVE launch of GravityZone PHASR β a breakthrough in reducing employee attack surfaces by up to 95%.
π Adaptive, user-focused protection
π₯ Live demo + expert insights
π Secure your spot here: https://thn.news/gravityzone-bitdefender-x
Join Bitdefender on April 23 for the LIVE launch of GravityZone PHASR β a breakthrough in reducing employee attack surfaces by up to 95%.
π Adaptive, user-focused protection
π₯ Live demo + expert insights
π Secure your spot here: https://thn.news/gravityzone-bitdefender-x
π10π6π€2π₯1
This media is not supported in your browser
VIEW IN TELEGRAM
π Privilege Escalation in Google Cloud!
A serious bug in Cloud Composer (GCP) let attackers with edit access take control of key services like Cloud Storage and Artifact Registry by uploading malicious code.
π Read this story here: https://thehackernews.com/2025/04/gcp-cloud-composer-bug-let-attackers.html
A serious bug in Cloud Composer (GCP) let attackers with edit access take control of key services like Cloud Storage and Artifact Registry by uploading malicious code.
π Read this story here: https://thehackernews.com/2025/04/gcp-cloud-composer-bug-let-attackers.html
π12π₯5π€3π2
π Browsers are the new battleground. 70% of modern malware starts here, yet most organizations overlook it.
AI tools, phishing, shadow IT, and risky extensions hide in plain sight.
Legacy security is inadequate. Monitor where work happensβthe browser.
π Explore new risks. Read: https://thehackernews.com/2025/04/5-major-concerns-with-employees-using.html
AI tools, phishing, shadow IT, and risky extensions hide in plain sight.
Legacy security is inadequate. Monitor where work happensβthe browser.
π Explore new risks. Read: https://thehackernews.com/2025/04/5-major-concerns-with-employees-using.html
π11π5π₯3
π New Malware Targets Docker β but itβs not about crypto mining anymore.
Hackers are hijacking Docker to run fake nodes on a Web3 network called Teneo. Instead of mining, they farm TENEO tokens by sending fake heartbeat signals.
πΉ 325+ downloads from Docker Hub
Read more β https://thehackernews.com/2025/04/docker-malware-exploits-teneo-web3-node.html
Hackers are hijacking Docker to run fake nodes on a Web3 network called Teneo. Instead of mining, they farm TENEO tokens by sending fake heartbeat signals.
πΉ 325+ downloads from Docker Hub
Read more β https://thehackernews.com/2025/04/docker-malware-exploits-teneo-web3-node.html
π25π₯3π3
π₯ Google pulls the plug on third-party cookie prompts in Chrome.
No more new pop-ups β just Incognito upgrades & IP protection by Q3 2025.
While Firefox & Safari banned 3rd-party cookies in 2020, Google stallsβcaught between privacy & profit.
Read β https://thehackernews.com/2025/04/google-drops-cookie-prompt-in-chrome.html
No more new pop-ups β just Incognito upgrades & IP protection by Q3 2025.
While Firefox & Safari banned 3rd-party cookies in 2020, Google stallsβcaught between privacy & profit.
Read β https://thehackernews.com/2025/04/google-drops-cookie-prompt-in-chrome.html
π23π14π1
π¨ Crypto Devs, Watch Out!
Ripple's xrpl.js library was backdoored to steal private keys! Over 2.9M downloads, 135K devs at risk.
ποΈ Malicious versions: 4.2.1β4.2.4, 2.14.2
π‘οΈ Safe versions: 4.2.5, 2.14.3
π€ Hacker hijacked a Ripple dev's npm account on April 21, 2025.
π Learn more: https://thehackernews.com/2025/04/ripples-xrpljs-npm-package-backdoored.html
Ripple's xrpl.js library was backdoored to steal private keys! Over 2.9M downloads, 135K devs at risk.
ποΈ Malicious versions: 4.2.1β4.2.4, 2.14.2
π‘οΈ Safe versions: 4.2.5, 2.14.3
π€ Hacker hijacked a Ripple dev's npm account on April 21, 2025.
π Learn more: https://thehackernews.com/2025/04/ripples-xrpljs-npm-package-backdoored.html
π16π€―5β‘1
π¨ New Tactics from Russian Hackers!
Since March 2025, Russian threat groups UTA0352 & UTA0355 are targeting Ukraine-linked orgs via Microsoft 365 OAuth abuse.
No fake sitesβjust official Microsoft URLs, real Signal/WhatsApp invites, and compromised Ukrainian Gov accounts.
π Learn more: https://thehackernews.com/2025/04/russian-hackers-exploit-microsoft-oauth.html
Since March 2025, Russian threat groups UTA0352 & UTA0355 are targeting Ukraine-linked orgs via Microsoft 365 OAuth abuse.
No fake sitesβjust official Microsoft URLs, real Signal/WhatsApp invites, and compromised Ukrainian Gov accounts.
π Learn more: https://thehackernews.com/2025/04/russian-hackers-exploit-microsoft-oauth.html
π15π€4π3π€―2π1
π Phishing isn't just an email problem anymore!
2025's #1 breach method? Identity attacks β phishing + stolen creds now top software exploits. MFA? Often bypassed. Detection? Too slow.
Real-time browser-based defense is the future. Stop attacks before passwords are stolen.
Learn more: https://thehackernews.com/2025/04/three-reasons-why-browser-is-best-for.html
2025's #1 breach method? Identity attacks β phishing + stolen creds now top software exploits. MFA? Often bypassed. Detection? Too slow.
Real-time browser-based defense is the future. Stop attacks before passwords are stolen.
Learn more: https://thehackernews.com/2025/04/three-reasons-why-browser-is-best-for.html
π10π5π€2π€―1
β οΈ Target: Russian Military!
Android.Spy.1292.origin spyware steals data via fake Alpine Quest apps.
β Spread via fake Telegram & Rus. app stores
β Steals loc., contacts, files
β Sends data to Telegram bot, runs hidden malware
Doctor Web says it mimics Alpine Quest Pro, widely used in military zones.
Read: https://thehackernews.com/2025/04/android-spyware-disguised-as-alpine.html
π Kaspersky found a Windows backdoor in fake ViPNet updates targeting Russian government, finance, and industry.
Android.Spy.1292.origin spyware steals data via fake Alpine Quest apps.
β Spread via fake Telegram & Rus. app stores
β Steals loc., contacts, files
β Sends data to Telegram bot, runs hidden malware
Doctor Web says it mimics Alpine Quest Pro, widely used in military zones.
Read: https://thehackernews.com/2025/04/android-spyware-disguised-as-alpine.html
π Kaspersky found a Windows backdoor in fake ViPNet updates targeting Russian government, finance, and industry.
π21π8π€―4π€2
πΌ Dream Job? Or Cyber Trap?
Iranian hackers UNC2428 lured Israelis with fake jobs at defense giant Rafael. Victims downloaded βRafaelConnect.exeβ β a trap that secretly installed the MURKYTOUR backdoor, giving attackers full access.
Read now β https://thehackernews.com/2025/04/iran-linked-hackers-target-israel-with.html
Iranian hackers UNC2428 lured Israelis with fake jobs at defense giant Rafael. Victims downloaded βRafaelConnect.exeβ β a trap that secretly installed the MURKYTOUR backdoor, giving attackers full access.
Read now β https://thehackernews.com/2025/04/iran-linked-hackers-target-israel-with.html
π₯27π€―7π6π5π€3π1
DPRK hackers are inside Web3βstealing crypto to fund WMDs.
In 2023, $137M stolen in 1 day via phishing. In 2024, they used deepfakes to win real jobs & extort firms. 12 fake identities at one US firm alone.
Learn more: https://thehackernews.com/2025/04/dprk-hackers-steal-137m-from-tron-users.html
In 2023, $137M stolen in 1 day via phishing. In 2024, they used deepfakes to win real jobs & extort firms. 12 fake identities at one US firm alone.
Learn more: https://thehackernews.com/2025/04/dprk-hackers-steal-137m-from-tron-users.html
π€―19π8π4π€3π2
π WhatsApp rolls out Advanced Chat Privacy!
πΈ Blocks chat exports, auto-downloads, & AI use in sensitive convos.
πΈ Still allows screenshots & manual media saves.
πΈ Available now for all users on the latest update.
Update to try it π https://thehackernews.com/2025/04/whatsapp-adds-advanced-chat-privacy-to.html
πΈ Blocks chat exports, auto-downloads, & AI use in sensitive convos.
πΈ Still allows screenshots & manual media saves.
πΈ Available now for all users on the latest update.
Update to try it π https://thehackernews.com/2025/04/whatsapp-adds-advanced-chat-privacy-to.html
π29π12π€10π€―2π1
π₯ Critical Exploit Alert!
A 9.0 CVSS flaw in Commvault Command Center lets hackers run code without logging in.
π― Targets versions 11.38.0β11.38.19
π₯ Pre-auth SSRF β Remote Code Execution
Learn more about CVE-2025-34028 here: https://thehackernews.com/2025/04/critical-commvault-command-center-flaw.html
A 9.0 CVSS flaw in Commvault Command Center lets hackers run code without logging in.
π― Targets versions 11.38.0β11.38.19
π₯ Pre-auth SSRF β Remote Code Execution
Learn more about CVE-2025-34028 here: https://thehackernews.com/2025/04/critical-commvault-command-center-flaw.html
π11π€―3π±1
π 133M patient records breached in 2024. Now, hackers target devices that save livesβnot just data.
Zero Trust is mandatory. New HIPAA rules demand it.
Main Line Health secured their network with Armis + Elisityβin hours, not months.
π See how microsegmentation protects both patients & systems: https://thehackernews.com/2025/04/automating-zero-trust-in-healthcare.html
Zero Trust is mandatory. New HIPAA rules demand it.
Main Line Health secured their network with Armis + Elisityβin hours, not months.
π See how microsegmentation protects both patients & systems: https://thehackernews.com/2025/04/automating-zero-trust-in-healthcare.html
π8π€4π±4π1
π¨ New Threat Alert: Phishing just got an AI upgrade.
Darcula PhaaS now uses GenAI to help anyone build phishing sites in minutes β no tech skills needed. Smishing attacks just leveled up.
Learn more: https://thehackernews.com/2025/04/darcula-adds-genai-to-phishing-toolkit.html
Darcula PhaaS now uses GenAI to help anyone build phishing sites in minutes β no tech skills needed. Smishing attacks just leveled up.
Learn more: https://thehackernews.com/2025/04/darcula-adds-genai-to-phishing-toolkit.html
π€―13π6π2
π New Linux Rootkit Exploits io_uring, Evades Detection
ARMOβs Curing rootkit uses io_uring to bypass system call monitoringβFalco, Tetragon, and even Microsoft Defender canβt see it.
Attackers can run commands without triggering system calls.
Read β https://thehackernews.com/2025/04/linux-iouring-poc-rootkit-bypasses.html
ARMOβs Curing rootkit uses io_uring to bypass system call monitoringβFalco, Tetragon, and even Microsoft Defender canβt see it.
Attackers can run commands without triggering system calls.
Read β https://thehackernews.com/2025/04/linux-iouring-poc-rootkit-bypasses.html
π20π€3
β οΈ 159 Bugs Exploited in 90 Days!
1 in 4 breaches now starts with a CVE exploit. In Q1 2025, 159 flaws hit in the wildβ28% within 24 hours of disclosure.
Top targets: CMSes, edge devices, Windows.
π Learn more: https://thehackernews.com/2025/04/159-cves-exploited-in-q1-2025-283.html
1 in 4 breaches now starts with a CVE exploit. In Q1 2025, 159 flaws hit in the wildβ28% within 24 hours of disclosure.
Top targets: CMSes, edge devices, Windows.
π Learn more: https://thehackernews.com/2025/04/159-cves-exploited-in-q1-2025-283.html
π15β‘6
β‘ Lazarus Group strikes South Koreaβagain.
6 major industries breached via watering hole attacks + zero-days in Cross EX & Innorix Agent.
Malware used: ThreatNeedle & more.
π Supply chains are the target.
Learn more π https://thehackernews.com/2025/04/lazarus-hits-6-south-korean-firms-via.html
6 major industries breached via watering hole attacks + zero-days in Cross EX & Innorix Agent.
Malware used: ThreatNeedle & more.
π Supply chains are the target.
Learn more π https://thehackernews.com/2025/04/lazarus-hits-6-south-korean-firms-via.html
π₯18π±8π6π3
The ActiveState team is heading to RSA 2025, and weβre kicking things off with a Zero-Vulnerability Happy Hour! π»
π When: Tuesday, April 29th @ 6:00 PM
π Where: Local Tap SF
Join us for great drinks, meaningful conversations, and networking with DevSecOps leaders. Letβs talk open source security, vulnerability management, and the future of secure software supply chains.
Spaces are limitedβsecure your spot today! π https://thn.news/zero-vulnerability-rsa-happy-hour
#RSAC2025 #DevSecOps #OpenSource #CyberSecurity #ZeroVulnerability
π When: Tuesday, April 29th @ 6:00 PM
π Where: Local Tap SF
Join us for great drinks, meaningful conversations, and networking with DevSecOps leaders. Letβs talk open source security, vulnerability management, and the future of secure software supply chains.
Spaces are limitedβsecure your spot today! π https://thn.news/zero-vulnerability-rsa-happy-hour
#RSAC2025 #DevSecOps #OpenSource #CyberSecurity #ZeroVulnerability
π10π₯2π1