๐ป Spectre Isnโt Dead. Itโs Mutating! New CPU flaw hits ALL modern Intel chips.
๐ Researchers at ETH Zurich and VUSec uncovered Spectre-style Intel CPU flaws (CVE-2024-45332, CVE-2024-28956, CVE-2025-24495) that leak memory across users, guests, and hostsโat rates up to 17KB/sec.
Read details โ https://thehackernews.com/2025/05/researchers-expose-new-intel-cpu-flaws.html
Patches are out. But is this just another Band-Aid?
๐ Researchers at ETH Zurich and VUSec uncovered Spectre-style Intel CPU flaws (CVE-2024-45332, CVE-2024-28956, CVE-2025-24495) that leak memory across users, guests, and hostsโat rates up to 17KB/sec.
Read details โ https://thehackernews.com/2025/05/researchers-expose-new-intel-cpu-flaws.html
Patches are out. But is this just another Band-Aid?
โก15๐7๐ฅ3๐3
๐จ A new Windows-based botnetโHTTPBotโis quietly choking login and payment systems across Chinaโs gaming and tech sectors.
๐ฅ Over 200 targeted attacks since April 2025
๐ง Mimics real users with Chrome, cookies & HTTP/2
Learn more about this: https://thehackernews.com/2025/05/new-httpbot-botnet-launches-200.html
๐ฅ Over 200 targeted attacks since April 2025
๐ง Mimics real users with Chrome, cookies & HTTP/2
Learn more about this: https://thehackernews.com/2025/05/new-httpbot-botnet-launches-200.html
๐ค11๐5๐คฏ4๐3๐2
๐ What if your most sensitive data is already exposedโand no one knows yet?
AI-powered DLP, zero trust, browser isolation, and cloud posture control are reshaping data defense.
Learn 10 must-do strategies now โ https://thehackernews.com/2025/05/top-10-best-practices-for-effective.html
AI-powered DLP, zero trust, browser isolation, and cloud posture control are reshaping data defense.
Learn 10 must-do strategies now โ https://thehackernews.com/2025/05/top-10-best-practices-for-effective.html
๐28๐คฏ5๐2๐ฑ1
๐ 2 critical Firefox zero-days โ CVE-2025-4918 & CVE-2025-4919 โ proven exploitable.
Attackers can read/write sensitive data or trigger remote code execution.
Affects all versions before: โข Firefox 138.0.4 โข ESR 128.10.1 / 115.23.1
๐ Patch now. Full story: https://thehackernews.com/2025/05/firefox-patches-2-zero-days-exploited.html
Attackers can read/write sensitive data or trigger remote code execution.
Affects all versions before: โข Firefox 138.0.4 โข ESR 128.10.1 / 115.23.1
๐ Patch now. Full story: https://thehackernews.com/2025/05/firefox-patches-2-zero-days-exploited.html
๐30๐15๐คฏ9๐ฑ2๐ค1
โWe never drop tools on machines.โ
84% of major cyberattacks now use built-in system tools like PowerShell & netsh.exe โ not malware.
๐ Bitdefender analyzed 700,000 incidents: attackers are hiding in plain sight using legit admin utilities.
Living Off the Land isnโt just stealthโitโs standard.
โ See how PHASR flips the script: smart blocking, zero disruption.
๐ Read: https://thehackernews.com/expert-insights/2025/05/living-off-land-what-we-learned-from.html
84% of major cyberattacks now use built-in system tools like PowerShell & netsh.exe โ not malware.
๐ Bitdefender analyzed 700,000 incidents: attackers are hiding in plain sight using legit admin utilities.
Living Off the Land isnโt just stealthโitโs standard.
โ See how PHASR flips the script: smart blocking, zero disruption.
๐ Read: https://thehackernews.com/expert-insights/2025/05/living-off-land-what-we-learned-from.html
๐23๐ฑ2
โก Weekly Recap: Zero-days are just the tip. This weekโs threat activity points to a deeper shift in how attackers operate.
Read now, recalibrate faster โ https://thehackernews.com/2025/05/weekly-recap-zero-day-exploits-insider.html
Read now, recalibrate faster โ https://thehackernews.com/2025/05/weekly-recap-zero-day-exploits-insider.html
๐6๐4
๐จ New favorite toy of ransomware gangs? A stealthy malware called Skitnetโnow seen in live attacks.
First sold on dark forums in 2024, it's now powering phishing campaigns from groups like Black Basta in 2025.
โ Reverse shell via DNS
โ Evades AV using GetProcAddress
โ Deploys legit tools like AnyDesk
โ Modular, stealthy, persistent
Learn how it works: https://thehackernews.com/2025/05/ransomware-gangs-use-skitnet-malware.html
First sold on dark forums in 2024, it's now powering phishing campaigns from groups like Black Basta in 2025.
โ Reverse shell via DNS
โ Evades AV using GetProcAddress
โ Deploys legit tools like AnyDesk
โ Modular, stealthy, persistent
Learn how it works: https://thehackernews.com/2025/05/ransomware-gangs-use-skitnet-malware.html
๐ค15๐7โก1๐ฅ1
๐ฅ CTEM is the new must-have for cybersecurity leaders.
Forget yearly audits. This is about always-on risk testing โ and itโs working.
CTEM uses attack simulations, real-time testing & exposure tracking to stay ahead.
Why are top CISOs making the switch?
๐ Learn how it works: https://thehackernews.com/2025/05/why-ctem-is-winning-bet-for-cisos-in.html
Forget yearly audits. This is about always-on risk testing โ and itโs working.
CTEM uses attack simulations, real-time testing & exposure tracking to stay ahead.
Why are top CISOs making the switch?
๐ Learn how it works: https://thehackernews.com/2025/05/why-ctem-is-winning-bet-for-cisos-in.html
๐6๐3
๐ WARNING: Popular VMware tool RVTools was hacked to spread Bumblebee malware via its official site.
The site is now offline โ but โ ๏ธ do not download from unofficial sources either.
Meanwhile, Procolored printer software was found carrying a Delphi backdoor and a $974K crypto clipper named SnipVex, which infects .exe files to hijack Bitcoin transactions.
๐ Full details here: https://thehackernews.com/2025/05/rvtools-official-site-hacked-to-deliver.html
The site is now offline โ but โ ๏ธ do not download from unofficial sources either.
Meanwhile, Procolored printer software was found carrying a Delphi backdoor and a $974K crypto clipper named SnipVex, which infects .exe files to hijack Bitcoin transactions.
๐ Full details here: https://thehackernews.com/2025/05/rvtools-official-site-hacked-to-deliver.html
โก16๐14๐คฏ7๐ค5๐1
๐ Devs, you're being hunted.
3 Python packages quietly turned stolen emails into verified TikTok & Instagram targets. Another posed as a dev toolโactually a stealth backdoor.
๐ Full story โ https://thehackernews.com/2025/05/malicious-pypi-packages-exploit.html
3 Python packages quietly turned stolen emails into verified TikTok & Instagram targets. Another posed as a dev toolโactually a stealth backdoor.
๐ Full story โ https://thehackernews.com/2025/05/malicious-pypi-packages-exploit.html
๐คฏ16๐9๐ฅ7๐3๐ฑ1
๐จ RedisRaider is hereโand it's hunting Linux servers.
A new cryptojacking campaign is weaponizing Redis config commands to silently hijack Linux systems and mine Monero.
๐ Learn more: https://thehackernews.com/2025/05/go-based-malware-deploys-xmrig-miner-on.html
A new cryptojacking campaign is weaponizing Redis config commands to silently hijack Linux systems and mine Monero.
๐ Learn more: https://thehackernews.com/2025/05/go-based-malware-deploys-xmrig-miner-on.html
๐7๐ฅ7๐คฏ4๐1
๐จ New Chinese APT uncovered!
ESET reveals MarsSnake, a stealth backdoor used in a multi-year campaign targeting a Saudi org via fake flight emails.
The threat actor? UnsolicitedBookerโand itโs not working alone.
๐ More tactics, ties, and twists โ https://thehackernews.com/2025/05/chinese-hackers-deploy-marssnake.html
ESET reveals MarsSnake, a stealth backdoor used in a multi-year campaign targeting a Saudi org via fake flight emails.
The threat actor? UnsolicitedBookerโand itโs not working alone.
๐ More tactics, ties, and twists โ https://thehackernews.com/2025/05/chinese-hackers-deploy-marssnake.html
๐10๐คฏ7๐ฅ1
๐ Most breaches begin with identity.
Issue isnโt firewallโit's login. You invest in EDR, NDR, ITDR, but attackers use valid credentials.
๐ฅ ITP stops attacks pre-access.
๐ Learn more: https://thehackernews.com/expert-insights/2025/05/breach-fatalism-is-over-why-identity.html
Issue isnโt firewallโit's login. You invest in EDR, NDR, ITDR, but attackers use valid credentials.
๐ฅ ITP stops attacks pre-access.
๐ Learn more: https://thehackernews.com/expert-insights/2025/05/breach-fatalism-is-over-why-identity.html
๐11๐3
๐ฅ 75 security tools, 2,000+ alerts/week โ Still breached.
This new "2025 State of Pentesting" report reveals whatโs really working (and whatโs not) in modern security testing.
๐ Get the key insights: https://thehackernews.com/2025/05/the-crowded-battle-key-insights-from.html
This new "2025 State of Pentesting" report reveals whatโs really working (and whatโs not) in modern security testing.
๐ Get the key insights: https://thehackernews.com/2025/05/the-crowded-battle-key-insights-from.html
๐9
๐จ One default IAM role can expose your entire AWS account.
Experts found overly permissive roles in AWS services like SageMaker & Glueโgranting attackers wide access, including full S3 control.
Itโs not just misconfigโit's a silent backdoor.
Details: https://thehackernews.com/2025/05/aws-default-iam-roles-found-to-enable.html
Experts found overly permissive roles in AWS services like SageMaker & Glueโgranting attackers wide access, including full S3 control.
Itโs not just misconfigโit's a silent backdoor.
Details: https://thehackernews.com/2025/05/aws-default-iam-roles-found-to-enable.html
โก9๐8
โ ๏ธ Old flawsโnew threat!
A new SideWinder campaign hit govโt agencies in ๐ฑ๐ฐ Sri Lanka, ๐ง๐ฉ Bangladesh & ๐ต๐ฐ Pakistan using geofenced malware and old MS Office flaws.
๐ Details just dropped: https://thehackernews.com/2025/05/south-asian-ministries-hit-by.html
A new SideWinder campaign hit govโt agencies in ๐ฑ๐ฐ Sri Lanka, ๐ง๐ฉ Bangladesh & ๐ต๐ฐ Pakistan using geofenced malware and old MS Office flaws.
๐ Details just dropped: https://thehackernews.com/2025/05/south-asian-ministries-hit-by.html
๐20
๐จ Over 100 malicious Chrome extensions slipped through Googleโs radar since Feb 2024.
They looked legitโVPNs, AI tools, banking appsโbut secretly stole data, hijacked sessions, and redirected traffic.
๐ Even bad reviews were filtered.
๐ Read: https://thehackernews.com/2025/05/100-fake-chrome-extensions-found.html
They looked legitโVPNs, AI tools, banking appsโbut secretly stole data, hijacked sessions, and redirected traffic.
๐ Even bad reviews were filtered.
๐ Read: https://thehackernews.com/2025/05/100-fake-chrome-extensions-found.html
๐15๐ฑ5๐ค4๐ฅ2
โ ๏ธ Trusted domains. Abandoned cloud assets. Hijacked by a ghost.
A threat actor called Hazy Hawk is hijacking unused domains from big names like CDC & PwCโturning trusted URLs into malware traps via DNS misconfig.
See how it works โ https://thehackernews.com/2025/05/hazy-hawk-exploits-dns-records-to.html
A threat actor called Hazy Hawk is hijacking unused domains from big names like CDC & PwCโturning trusted URLs into malware traps via DNS misconfig.
See how it works โ https://thehackernews.com/2025/05/hazy-hawk-exploits-dns-records-to.html
๐19๐1๐ค1
This media is not supported in your browser
VIEW IN TELEGRAM
๐ฅ Google Chrome just got SMARTER!!!
It now auto-changes compromised passwordsโin one click.
๐ Detects hacked passwords
๐ค Auto-generates a strong password
โก Instantly updates them
See it in action: https://thehackernews.com/2025/05/google-chrome-can-now-auto-change.html
It now auto-changes compromised passwordsโin one click.
๐ Detects hacked passwords
๐ค Auto-generates a strong password
โก Instantly updates them
See it in action: https://thehackernews.com/2025/05/google-chrome-can-now-auto-change.html
๐ฅ24๐11๐7๐ค6๐3
This media is not supported in your browser
VIEW IN TELEGRAM
โSaaS is quietly breaking everything we knew about security.โ โ JPMorganโs CISO just sounded the alarm.
From invisible AI agents to risky OAuth tokens, the stakes are rising fast.
๐ 4th-party risk is exploding
๐ Non-human identities outnumber users
๐ Admin backdoors + invisible AI agents
๐ What now? Read the analysis โ https://thehackernews.com/expert-insights/2025/05/jpmorgan-ciso-spotlights-saas-security.html
From invisible AI agents to risky OAuth tokens, the stakes are rising fast.
๐ 4th-party risk is exploding
๐ Non-human identities outnumber users
๐ Admin backdoors + invisible AI agents
๐ What now? Read the analysis โ https://thehackernews.com/expert-insights/2025/05/jpmorgan-ciso-spotlights-saas-security.html
๐16๐ฑ3
๐จ Mobile users, beware.
PWAs Weaponized in Adult-Content Scam.
Hackers are using full Progressive Web Apps (PWAs) to launch a redirection attackโtargeting only Android & iOS users while bypassing desktops entirely.
Learn more โค https://thehackernews.com/2025/05/researchers-expose-pwa-javascript.html
PWAs Weaponized in Adult-Content Scam.
Hackers are using full Progressive Web Apps (PWAs) to launch a redirection attackโtargeting only Android & iOS users while bypassing desktops entirely.
Learn more โค https://thehackernews.com/2025/05/researchers-expose-pwa-javascript.html
๐11๐ฑ5๐3๐1