β‘ Lazarus Group strikes South Koreaβagain.
6 major industries breached via watering hole attacks + zero-days in Cross EX & Innorix Agent.
Malware used: ThreatNeedle & more.
π Supply chains are the target.
Learn more π https://thehackernews.com/2025/04/lazarus-hits-6-south-korean-firms-via.html
6 major industries breached via watering hole attacks + zero-days in Cross EX & Innorix Agent.
Malware used: ThreatNeedle & more.
π Supply chains are the target.
Learn more π https://thehackernews.com/2025/04/lazarus-hits-6-south-korean-firms-via.html
π₯18π±8π6π3
The ActiveState team is heading to RSA 2025, and weβre kicking things off with a Zero-Vulnerability Happy Hour! π»
π When: Tuesday, April 29th @ 6:00 PM
π Where: Local Tap SF
Join us for great drinks, meaningful conversations, and networking with DevSecOps leaders. Letβs talk open source security, vulnerability management, and the future of secure software supply chains.
Spaces are limitedβsecure your spot today! π https://thn.news/zero-vulnerability-rsa-happy-hour
#RSAC2025 #DevSecOps #OpenSource #CyberSecurity #ZeroVulnerability
π When: Tuesday, April 29th @ 6:00 PM
π Where: Local Tap SF
Join us for great drinks, meaningful conversations, and networking with DevSecOps leaders. Letβs talk open source security, vulnerability management, and the future of secure software supply chains.
Spaces are limitedβsecure your spot today! π https://thn.news/zero-vulnerability-rsa-happy-hour
#RSAC2025 #DevSecOps #OpenSource #CyberSecurity #ZeroVulnerability
π10π₯2π1
π¨ New Ivanti ICS Attacks Detected!
DslogdRAT malware used in real-world attacks after hackers exploited CVE-2025-0282 (zero-day).
First hit Japan π―π΅ in Dec 2024 β now global scanning surges 9X in 24 hrs.
πΉ 270+ IPs scanning Ivanti
πΉ 255 confirmed malicious
πΉ Top targets: US, Germany, Netherlands
Details: https://thehackernews.com/2025/04/dslogdrat-malware-deployed-via-ivanti.html
DslogdRAT malware used in real-world attacks after hackers exploited CVE-2025-0282 (zero-day).
First hit Japan π―π΅ in Dec 2024 β now global scanning surges 9X in 24 hrs.
πΉ 270+ IPs scanning Ivanti
πΉ 255 confirmed malicious
πΉ Top targets: US, Germany, Netherlands
Details: https://thehackernews.com/2025/04/dslogdrat-malware-deployed-via-ivanti.html
π16π3π1π€1
π Hackers could be one path away from your sensitive files!
π¨ New CVEs expose major flaws in Rack & Infodraw systems:
πΉ CVE-2025-27610 lets attackers read config files & credentials via path traversal.
πΉ Infodraw CVE-2025-43928 allows any file to be read or deletedβno login needed.
Learn more: https://thehackernews.com/2025/04/researchers-identify-rackstatic.html
π₯ Exploits are trivial & patches missing. Systems in Belgium & Luxembourg already hit. Update now or go offline!
π¨ New CVEs expose major flaws in Rack & Infodraw systems:
πΉ CVE-2025-27610 lets attackers read config files & credentials via path traversal.
πΉ Infodraw CVE-2025-43928 allows any file to be read or deletedβno login needed.
Learn more: https://thehackernews.com/2025/04/researchers-identify-rackstatic.html
π₯ Exploits are trivial & patches missing. Systems in Belgium & Luxembourg already hit. Update now or go offline!
π₯17π5π€1π±1
π Critical SAP Exploit Alert!
Hackers are abusing a flaw in SAP NetWeaver to drop JSP web shellsβeven fully patched systems are hit.
Likely tied to CVE-2025-31324 (CVSS 10.0) | Allows unauthenticated file uploads via /metadatauploader.
Details β https://thehackernews.com/2025/04/sap-confirms-critical-netweaver-flaw.html
Hackers are abusing a flaw in SAP NetWeaver to drop JSP web shellsβeven fully patched systems are hit.
Likely tied to CVE-2025-31324 (CVSS 10.0) | Allows unauthenticated file uploads via /metadatauploader.
Details β https://thehackernews.com/2025/04/sap-confirms-critical-netweaver-flaw.html
π18β‘4π3π₯2
π₯ Machines are talking. And they hold the keys.
70% of leaked secrets still work. NHIs outnumber humans 100:1 β no MFA, no alerts, no control.
Most teams donβt know where these secrets are, or whoβs using them.
π Time to find the risks. Fix them. Before itβs too late.
See how: https://thehackernews.com/2025/04/why-nhis-are-securitys-most-dangerous.html
70% of leaked secrets still work. NHIs outnumber humans 100:1 β no MFA, no alerts, no control.
Most teams donβt know where these secrets are, or whoβs using them.
π Time to find the risks. Fix them. Before itβs too late.
See how: https://thehackernews.com/2025/04/why-nhis-are-securitys-most-dangerous.html
π13π€4π±3
π₯ Fake jobs, real danger.
North Korean hackers are posing as crypto firms to lure devs into malware traps.
πΉ3 fronts: BlockNovas, Angeloper, SoftGlide
πΉ3 Malware: BeaverTail, InvisibleFerret, OtterCookie πΉ3 Target: Your wallet, data & trust.
Read: https://thehackernews.com/2025/04/north-korean-hackers-spread-malware-via.html
North Korean hackers are posing as crypto firms to lure devs into malware traps.
πΉ3 fronts: BlockNovas, Angeloper, SoftGlide
πΉ3 Malware: BeaverTail, InvisibleFerret, OtterCookie πΉ3 Target: Your wallet, data & trust.
Read: https://thehackernews.com/2025/04/north-korean-hackers-spread-malware-via.html
π31π€―10π3π2π€2
A stealthy hacker-for-hire ToyMaker is selling access to top targets β leading straight to CACTUS ransomware attacks.
π° They scan, hack, and hand over.
π οΈ Malware: LAGTOY
These brokers are speeding up ransomware ops. No espionage, just cash.
Learn more: https://thehackernews.com/2025/04/toymaker-uses-lagtoy-to-sell-access-to.html
π° They scan, hack, and hand over.
π οΈ Malware: LAGTOY
These brokers are speeding up ransomware ops. No espionage, just cash.
Learn more: https://thehackernews.com/2025/04/toymaker-uses-lagtoy-to-sell-access-to.html
π€―27π14π€5π₯3
π Hackers are mining crypto in the cloudβon your dime.
Microsoft uncovered Storm-1977 targeting education sector cloud accounts via password spraying.
They used AzureChecker.exe, hijacked guest accounts, spun up 200+ containers, and ran illicit crypto mining.
β οΈ Time to lock it down.
π Learn more: https://thehackernews.com/2025/04/storm-1977-hits-education-clouds-with.html
Microsoft uncovered Storm-1977 targeting education sector cloud accounts via password spraying.
They used AzureChecker.exe, hijacked guest accounts, spun up 200+ containers, and ran illicit crypto mining.
β οΈ Time to lock it down.
π Learn more: https://thehackernews.com/2025/04/storm-1977-hits-education-clouds-with.html
π23π₯10π7
π¨ 13,000+ sites at risk.
Hackers are actively exploiting 2 zero-days in Craft CMS, hitting servers via image tools. One flaw scores 10.0 CVSSβworst possible. Nearly 300 sites likely breached already.
Watch for POST hits to "/actions/assets/generate-transform"
π Details: https://thehackernews.com/2025/04/hackers-exploit-critical-craft-cms.html
π Patch now. Rotate keys. Check logs.
Hackers are actively exploiting 2 zero-days in Craft CMS, hitting servers via image tools. One flaw scores 10.0 CVSSβworst possible. Nearly 300 sites likely breached already.
Watch for POST hits to "/actions/assets/generate-transform"
π Details: https://thehackernews.com/2025/04/hackers-exploit-critical-craft-cms.html
π Patch now. Rotate keys. Check logs.
π15π±11π€―4
β οΈ Think you're installing a security patch? Think again.
Hackers are luring WordPress site owners with fake WooCommerce alerts urging a βcritical patchβ download β but itβs a trap. The download creates a hidden admin account, installs web shells, and gives attackers full control.
Full story βhttps://thehackernews.com/2025/04/woocommerce-users-targeted-by-fake.html
Hackers are luring WordPress site owners with fake WooCommerce alerts urging a βcritical patchβ download β but itβs a trap. The download creates a hidden admin account, installs web shells, and gives attackers full control.
Full story βhttps://thehackernews.com/2025/04/woocommerce-users-targeted-by-fake.html
π20π€―8π7π±4π€1
π New APT Earth Kurma is spying on Southeast Asiaβs top sectorsβhidden in plain sight.
Since June 2024, π΅π π»π³ πΉπ π²πΎ govts & telcos face custom malware, rootkits, & data theft via Dropbox/OneDrive.
Hackers use legit tools (LotL), making detection hard.
π Learn more: https://thehackernews.com/2025/04/earth-kurma-targets-southeast-asia-with.html
Since June 2024, π΅π π»π³ πΉπ π²πΎ govts & telcos face custom malware, rootkits, & data theft via Dropbox/OneDrive.
Hackers use legit tools (LotL), making detection hard.
π Learn more: https://thehackernews.com/2025/04/earth-kurma-targets-southeast-asia-with.html
π16π5π3π€2π€―1
π» Your weakest link could cost you everything!
Hackers donβt need big bugsβsmall oversights cause massive breaches.
Intruder found:
πΈA 302 redirect = AWS key theft
πΈAn exposed .git = DB takeover
πΈMetadata flaw = Remote access
Scan before they strike β https://thehackernews.com/2025/04/how-breaches-start-breaking-down-5-real.html
Hackers donβt need big bugsβsmall oversights cause massive breaches.
Intruder found:
πΈA 302 redirect = AWS key theft
πΈAn exposed .git = DB takeover
πΈMetadata flaw = Remote access
Scan before they strike β https://thehackernews.com/2025/04/how-breaches-start-breaking-down-5-real.html
π12π3π2
β‘ What keeps CISOs awake at night this week?
πΈ 0-days exploited before patches hit.
πΈ AI turning low-skill attackers into high-impact threats.
πΈ Identity systems being used against us β again.
Security today demands strategic clarity.
Every vulnerability is an opportunity for attackers.
Every delay? A risk.
We have summarized last weekβs top threats.
Read β https://thehackernews.com/2025/04/weekly-recap-critical-sap-exploit-ai.html
πΈ 0-days exploited before patches hit.
πΈ AI turning low-skill attackers into high-impact threats.
πΈ Identity systems being used against us β again.
Security today demands strategic clarity.
Every vulnerability is an opportunity for attackers.
Every delay? A risk.
We have summarized last weekβs top threats.
Read β https://thehackernews.com/2025/04/weekly-recap-critical-sap-exploit-ai.html
π8β‘7π₯5π3π€1
π¨ CISA Alert: Two critical flaws β in Broadcom Fabric OS (CVE-2025-1976) and Commvault Web Server (CVE-2025-3928) β are now on the Known Exploited Vulnerabilities (KEV) list.
πΉ Both bugs are actively exploited.
πΉ Admin access can lead to full system compromise.
πΉ Patching deadlines: May 17β19, 2025.
π Details: https://thehackernews.com/2025/04/cisa-adds-actively-exploited-broadcom.html
πΉ Both bugs are actively exploited.
πΉ Admin access can lead to full system compromise.
πΉ Patching deadlines: May 17β19, 2025.
π Details: https://thehackernews.com/2025/04/cisa-adds-actively-exploited-broadcom.html
π19
π₯ New Cyber Attack Alert!
Senior members of the World Uyghur Congress were targeted by malware hidden in a fake UyghurEdit++ app, Citizen Lab reports (Mar 2025).
β Custom-made spyware
β Links to China
β Started as early as May 2024
Learn more: https://thehackernews.com/2025/04/malware-attack-targets-world-uyghur.html
Senior members of the World Uyghur Congress were targeted by malware hidden in a fake UyghurEdit++ app, Citizen Lab reports (Mar 2025).
β Custom-made spyware
β Links to China
β Started as early as May 2024
Learn more: https://thehackernews.com/2025/04/malware-attack-targets-world-uyghur.html
π15π€9π3π€―2
π Still trusting VPNs to secure remote access?
Recent critical flaws exposed thousands. Every open port and IP address is now a target, not a tool.
Legacy network security can't keep up with AI-driven attacks.
Zero Trust isnβt optional anymore β itβs survival.
Learn why it matters β https://thehackernews.com/expert-insights/2025/04/its-time-to-rethink-your-security-for.html
Recent critical flaws exposed thousands. Every open port and IP address is now a target, not a tool.
Legacy network security can't keep up with AI-driven attacks.
Zero Trust isnβt optional anymore β itβs survival.
Learn why it matters β https://thehackernews.com/expert-insights/2025/04/its-time-to-rethink-your-security-for.html
π15π€7π±5
π₯ 75 zero-day exploits hit in 2024 | 44% aimed at enterprise tools.
While browser & mobile attacks fell sharply, threat actors shifted focus β hitting Ivanti, Palo Alto, Cisco & others.
π Top targets: Microsoft (26), Google (11), Ivanti (7), Apple (5)
π― 20 zero-days hit security appliances
π΅οΈββοΈ State hackers, spyware firms & cybercrime crews all involved
Read the full story β https://thehackernews.com/2025/04/google-reports-75-zero-days-exploited.html
While browser & mobile attacks fell sharply, threat actors shifted focus β hitting Ivanti, Palo Alto, Cisco & others.
π Top targets: Microsoft (26), Google (11), Ivanti (7), Apple (5)
π― 20 zero-days hit security appliances
π΅οΈββοΈ State hackers, spyware firms & cybercrime crews all involved
Read the full story β https://thehackernews.com/2025/04/google-reports-75-zero-days-exploited.html
π10π2π€1
β‘ Your AI Copilot could leak your secrets β without you even knowing.
Microsoft 365 Copilot boosts productivity, but opens the door to massive data risks. Reco spots risky prompts, flags hidden attacks, and locks down your SaaS ecosystem.
Learn how: https://thehackernews.com/2025/04/product-walkthrough-securing-microsoft.html
Microsoft 365 Copilot boosts productivity, but opens the door to massive data risks. Reco spots risky prompts, flags hidden attacks, and locks down your SaaS ecosystem.
Learn how: https://thehackernews.com/2025/04/product-walkthrough-securing-microsoft.html
β‘16π6π±3
π¨ Cybersecurity firms are under attack!
π¨π³ Chinaβs PurpleHaze hackers targeted SentinelOneβs systems and high-value customers.
π 360+ fake North Korean IT workers tried to infiltrate the company.
π·πΊ Russian ransomware gangs are buying real security products to beat defenses.
Read πhttps://thehackernews.com/2025/04/sentinelone-uncovers-chinese-espionage.html
π¨π³ Chinaβs PurpleHaze hackers targeted SentinelOneβs systems and high-value customers.
π 360+ fake North Korean IT workers tried to infiltrate the company.
π·πΊ Russian ransomware gangs are buying real security products to beat defenses.
Read πhttps://thehackernews.com/2025/04/sentinelone-uncovers-chinese-espionage.html
π16π6π₯5π3
π¨ New jailbreaks ("Inception", "Do-Not-Reply"), memory hacks, tool poisoning, unsafe model upgrades β CERT, METR, and others warn:
β‘ ChatGPT, Claude, Copilot, Gemini, Grok, Meta AI can leak code, malware, data.
β‘ GPT-4.1 is 3X riskier than before.
β‘ MCP protocols, Chrome extensions now exploited.
The AI arms race is outpacing safety.
Read: https://thehackernews.com/2025/04/new-reports-uncover-jailbreaks-unsafe.html
β‘ ChatGPT, Claude, Copilot, Gemini, Grok, Meta AI can leak code, malware, data.
β‘ GPT-4.1 is 3X riskier than before.
β‘ MCP protocols, Chrome extensions now exploited.
The AI arms race is outpacing safety.
Read: https://thehackernews.com/2025/04/new-reports-uncover-jailbreaks-unsafe.html
π16β‘2