Adobe just fixed 254 security flawsโ225 in Experience Manager aloneโthat could let attackers run code or bypass security.
The worst? A critical Magento bug scoring 9.1 CVSS. No exploits seen yet, but this is urgent. Update now to stay safe.
Details here โ https://thehackernews.com/2025/06/adobe-releases-patch-fixing-254.html
The worst? A critical Magento bug scoring 9.1 CVSS. No exploits seen yet, but this is urgent. Update now to stay safe.
Details here โ https://thehackernews.com/2025/06/adobe-releases-patch-fixing-254.html
๐12โก7
๐ด Microsoft just patched 67 vulnerabilitiesโincluding a zero-day WEBDAV flaw actively exploited by the Stealth Falcon group to deploy stealthy malware via phishing URLs.
This bug CVE-2025-33053 lets attackers run code remotely with ease.
Details here โ https://thehackernews.com/2025/06/microsoft-patches-67-vulnerabilities.html
Donโt waitโpatch immediately.
This bug CVE-2025-33053 lets attackers run code remotely with ease.
Details here โ https://thehackernews.com/2025/06/microsoft-patches-67-vulnerabilities.html
Donโt waitโpatch immediately.
๐ฅ20๐10๐4โก1
Two critical flaws in SinoTrack GPS devices let attackers remotely track vehiclesโand even cut off fuel remotely. No patch yet.
Default passwords and visible device IDs make hijacking shockingly easy
Details โ https://thehackernews.com/2025/06/sinotrack-gps-devices-vulnerable-to.html
If you use these, change passwords now and hide device info.
Default passwords and visible device IDs make hijacking shockingly easy
Details โ https://thehackernews.com/2025/06/sinotrack-gps-devices-vulnerable-to.html
If you use these, change passwords now and hide device info.
๐ฅ7๐ฑ5๐4๐2
River Islandโs tiny InfoSec team secures 200+ stores and e-commerce with zero headcount growth โ by automating attack surface visibility and threat detection.
Their secret? Empowering others to fix issues fast, not doing it all themselves.
See how lean can win โ https://thehackernews.com/2025/06/how-to-build-lean-security-model-5.html
Their secret? Empowering others to fix issues fast, not doing it all themselves.
See how lean can win โ https://thehackernews.com/2025/06/how-to-build-lean-security-model-5.html
๐7๐ฑ2
๐จ INTERPOL dismantled over 20,000 malicious IPs tied to 69 info-stealing malware strains in a global crackdown involving 26 countries.
Disrupted cybercrime, arrested 32, seized 41 servers used for phishing, fraud, scams.
Read โ https://thehackernews.com/2025/06/interpol-dismantles-20000-malicious-ips.html
Disrupted cybercrime, arrested 32, seized 41 servers used for phishing, fraud, scams.
Read โ https://thehackernews.com/2025/06/interpol-dismantles-20000-malicious-ips.html
๐คฏ10๐ฅ7๐7๐ฑ6โก3๐3
DNS is the internetโs weakest link โ and attackers know it. Unsecured DNS can let hackers reroute traffic, steal data, or take your business offline in minutes.
The good news? Securing DNS with tools like DNSSEC and encrypted queries stops attacks before they start.
Learn more โ https://thehackernews.com/2025/06/why-dns-security-is-your-first-defense.html
The good news? Securing DNS with tools like DNSSEC and encrypted queries stops attacks before they start.
Learn more โ https://thehackernews.com/2025/06/why-dns-security-is-your-first-defense.html
๐13๐ฅ5โก1
A massive brute-force attack hit Apache Tomcat Manager on June 5, 2025โ295 malicious IPs trying to break in, mostly from US, UK, Germany, and Singapore.
Exposed Tomcat services are a ticking time bombโthis could lead to serious breaches if left unchecked.
Also, 40,000+ security cameras worldwide are openly streaming, risking privacy and corporate espionage.
Full details here โ https://thehackernews.com/2025/06/295-malicious-ips-launch-coordinated.html
Exposed Tomcat services are a ticking time bombโthis could lead to serious breaches if left unchecked.
Also, 40,000+ security cameras worldwide are openly streaming, risking privacy and corporate espionage.
Full details here โ https://thehackernews.com/2025/06/295-malicious-ips-launch-coordinated.html
๐9๐ฅ5๐5๐3
Black Bastaโs old affiliates are backโnow using Teams phishing plus Python scripts to silently hijack networks.
Half their attacks come from legit-looking Microsoft domains, fooling security teams.
Hereโs what to watch for โ https://thehackernews.com/2025/06/former-black-basta-members-use.html
Half their attacks come from legit-looking Microsoft domains, fooling security teams.
Hereโs what to watch for โ https://thehackernews.com/2025/06/former-black-basta-members-use.html
๐11๐ฅ9๐2๐คฏ2
Over 80,000 Microsoft Entra ID accounts targeted by a stealthy takeover campaign using the open-source tool TeamFiltration.
Attackers exploit Microsoft Teams API & AWS servers worldwide to spray passwords, exfiltrate data, and plant persistent access.
Find details here โ https://thehackernews.com/2025/06/over-80000-microsoft-entra-id-accounts.html
Attackers exploit Microsoft Teams API & AWS servers worldwide to spray passwords, exfiltrate data, and plant persistent access.
Find details here โ https://thehackernews.com/2025/06/over-80000-microsoft-entra-id-accounts.html
๐15๐ฅ6๐2๐ฑ2๐ค1
ConnectWise is urgently rotating code-signing certificates for ScreenConnect and RMM tools by June 13 due to a risky config data handling flaw โ no breach, but on-prem users must update to avoid downtime.
Learn more โ https://thehackernews.com/2025/06/connectwise-to-rotate-screenconnect.html
Learn more โ https://thehackernews.com/2025/06/connectwise-to-rotate-screenconnect.html
๐12๐2๐ค2
๐จ Machine identities now outnumber humans 100:1. GitGuardian found 70% of leaked secrets from 2022 remain active in 2025, fueling major breaches like US Treasury & Toyota.
Secrets spread across repos, pipelines, cloudsโbeyond traditional vaultsโ reach.
Non-human identity risk is a top OWASP threat in 2025.
Full story โ https://thehackernews.com/2025/06/non-human-identities-how-to-address.html
Secrets spread across repos, pipelines, cloudsโbeyond traditional vaultsโ reach.
Non-human identity risk is a top OWASP threat in 2025.
Full story โ https://thehackernews.com/2025/06/non-human-identities-how-to-address.html
๐4
๐จ Zero-click AI exploit in Microsoft 365 Copilot (CVE-2025-32711, CVSS 9.3) lets attackers steal sensitive data silently via emailโno user interaction needed.
Details โ https://thehackernews.com/2025/06/zero-click-ai-vulnerability-exposes.html
Already patched, but shows serious AI security risks ahead.
Details โ https://thehackernews.com/2025/06/zero-click-ai-vulnerability-exposes.html
Already patched, but shows serious AI security risks ahead.
๐16โก10๐4๐ค4
โจ Webinar Alert! Artificial Intelligence isnโt just transforming tech โ itโs creating invisible, unchecked identities hackers exploit to breach your systems silently.
Traditional security canโt see or stop them.
If you use AI, youโre at risk.
LEARN out how to secure these hidden non-human identities โ https://thehackernews.com/2025/06/ai-agents-run-on-secret-accounts-learn.html
Traditional security canโt see or stop them.
If you use AI, youโre at risk.
LEARN out how to secure these hidden non-human identities โ https://thehackernews.com/2025/06/ai-agents-run-on-secret-accounts-learn.html
๐9๐คฏ4๐ฑ2
โ ๏ธ New TokenBreak ATTACK lets attackers bypass AI content filters by tweaking just one letterโmaking harmful prompts slip past unnoticed.
It fools many text classifiers while keeping meaning clear to humans and AI, enabling prompt injections.
Read more โ https://thehackernews.com/2025/06/new-tokenbreak-attack-bypasses-ai.html
It fools many text classifiers while keeping meaning clear to humans and AI, enabling prompt injections.
Read more โ https://thehackernews.com/2025/06/new-tokenbreak-attack-bypasses-ai.html
๐5๐4๐ค3๐คฏ1
VexTrioโs cybercrime network hijacks hundreds of thousands of websites to spread scams & malware through fake ads and push alerts.
Even after a setback in late 2024, they keep running using clever DNS tricks & Russian servers.
What;s really going on โ https://thehackernews.com/2025/06/wordpress-sites-turned-weapon-how.html
Even after a setback in late 2024, they keep running using clever DNS tricks & Russian servers.
What;s really going on โ https://thehackernews.com/2025/06/wordpress-sites-turned-weapon-how.html
๐คฏ12๐ฅ5๐3๐1๐ค1๐ฑ1
This media is not supported in your browser
VIEW IN TELEGRAM
๐จ WARNING: Apple just confirmed a serious zero-click flaw in Messages was actively exploited to spy on journalists using Israeli spyware Paragon Graphite โ no user action needed.
Details here โ https://thehackernews.com/2025/06/apple-zero-click-flaw-in-messages.html
Details here โ https://thehackernews.com/2025/06/apple-zero-click-flaw-in-messages.html
๐คฏ31๐ค8๐ฅ6๐3๐ฑ2๐1
๐จ Ransomware gangs are exploiting unpatched SimpleHelp flaws to hit utility billing customers with double extortion attacks โ since Jan 2025.
CISA warns: patch now or risk serious breaches.
Read โ https://thehackernews.com/2025/06/ransomware-gangs-exploit-unpatched.html
Meanwhile, new Fog ransomware uses legit employee monitoring software to stay hidden and persistent for weeks.
CISA warns: patch now or risk serious breaches.
Read โ https://thehackernews.com/2025/06/ransomware-gangs-exploit-unpatched.html
Meanwhile, new Fog ransomware uses legit employee monitoring software to stay hidden and persistent for weeks.
๐14๐ฅ2
Security teams drown in alertsโbut real risks slip through unnoticed.
Continuous Threat Exposure Management (CTEM) shifts focus from alerts to actual attack paths, prioritizing prevention over reaction.
Stop chasing every alert. Start managing risk with purpose.
Read more โ https://thehackernews.com/2025/06/ctem-is-new-soc-shifting-from.html
Continuous Threat Exposure Management (CTEM) shifts focus from alerts to actual attack paths, prioritizing prevention over reaction.
Stop chasing every alert. Start managing risk with purpose.
Read more โ https://thehackernews.com/2025/06/ctem-is-new-soc-shifting-from.html
๐7๐1
๐จ Over 269,000 legit websites hijacked with hidden JavaScript redirecting search engine visitors to malware and scams.
Using a stealthy JSFireTruck obfuscation, attackers fingerprint devices to serve fake CAPTCHAs, tech support scams, and malwareโevading detection at scale.
Learn how this massive campaign works โ https://thehackernews.com/2025/06/over-269000-websites-infected-with.html
Using a stealthy JSFireTruck obfuscation, attackers fingerprint devices to serve fake CAPTCHAs, tech support scams, and malwareโevading detection at scale.
Learn how this massive campaign works โ https://thehackernews.com/2025/06/over-269000-websites-infected-with.html
๐คฏ9๐5
Discord invite links are being hijacked to deliver malware that steals crypto wallets and personal data.
Attackers reuse expired/deleted invites, redirecting to fake servers, tricking users into running malicious PowerShell scripts disguised as verification.
Full details here โ https://thehackernews.com/2025/06/discord-invite-link-hijacking-delivers.html
This Multi-stage attack uses Pastebin & GitHub to evade security tools.
Attackers reuse expired/deleted invites, redirecting to fake servers, tricking users into running malicious PowerShell scripts disguised as verification.
Full details here โ https://thehackernews.com/2025/06/discord-invite-link-hijacking-delivers.html
This Multi-stage attack uses Pastebin & GitHub to evade security tools.
๐35๐ค12๐8๐ฅ3๐3
โ ๏ธ A fake Python package just stole AWS tokens, Jamf data & CI/CD secrets โ from devs at Grab.
The malware posed as a legit helper for ML workflows, hid a multi-stage info-stealer, and targeted macOS too.
Details here โ https://thehackernews.com/2025/06/malicious-pypi-package-masquerades-as.html
The malware posed as a legit helper for ML workflows, hid a multi-stage info-stealer, and targeted macOS too.
Details here โ https://thehackernews.com/2025/06/malicious-pypi-package-masquerades-as.html
๐ฑ19๐ฅ12๐10โก5๐2๐2