What if your password manager or note-taking tool became a hackerβs entry point? Recent attacks on Chrome Store extensions reveal just how exposed your organization might be.
β Why It Matters:
Β» Browser extensions are a silent threatβgranted access to sensitive data like cookies and identities.
Β» Credential theft can lead to organizational data breaches and compliance nightmares.
π‘Key Takeaways:
Β» Limit user-installed extensions.
Β» Implement risk-based policies to block risky permissions.
Β» Stay updated on the latest threats.
π Check out this guide to learn how: https://thehackernews.com/2024/12/when-good-extensions-go-bad-takeaways.html
β Why It Matters:
Β» Browser extensions are a silent threatβgranted access to sensitive data like cookies and identities.
Β» Credential theft can lead to organizational data breaches and compliance nightmares.
π‘Key Takeaways:
Β» Limit user-installed extensions.
Β» Implement risk-based policies to block risky permissions.
Β» Stay updated on the latest threats.
π Check out this guide to learn how: https://thehackernews.com/2024/12/when-good-extensions-go-bad-takeaways.html
π21π11π3β‘2π₯2π€1π±1
π¨ Are hospitals prepared for the next big cyber attack? The HHS proposes new HIPAA updates to safeguard patient data and critical systems.
πProposed Solutions:
πΎ Encrypt sensitive data everywhere
π Map assets and identify vulnerabilities
β± Set recovery protocols within 72 hours
Read more: https://thehackernews.com/2024/12/new-hipaa-rules-mandate-72-hour-data.html
πProposed Solutions:
πΎ Encrypt sensitive data everywhere
π Map assets and identify vulnerabilities
β± Set recovery protocols within 72 hours
Read more: https://thehackernews.com/2024/12/new-hipaa-rules-mandate-72-hour-data.html
π25β‘7π€―5π₯2π1
π Three flaws in Microsoft Azure's Apache Airflow integration could have let attackers:
π© Gain shadow admin access to Kubernetes clusters
π΅οΈββοΈ Exfiltrate sensitive data
π― Deploy undetected malware
π These misconfigurations allow attackers to tamper with logs, deploy privileged pods, and burrow deeper into cloud environmentsβall under the radar.
π Learn more: https://thehackernews.com/2024/12/misconfigured-kubernetes-rbac-in-azure.html
π© Gain shadow admin access to Kubernetes clusters
π΅οΈββοΈ Exfiltrate sensitive data
π― Deploy undetected malware
π These misconfigurations allow attackers to tamper with logs, deploy privileged pods, and burrow deeper into cloud environmentsβall under the radar.
π Learn more: https://thehackernews.com/2024/12/misconfigured-kubernetes-rbac-in-azure.html
π±12π₯5π4β‘2π2π€2
π¨ Suspected Chinese state-sponsored hackers breached the U.S. Treasury via a compromised API key from BeyondTrust, a third-party vendor.
π‘ Hereβs what happened:
Β» Attackers gained access to a key securing BeyondTrustβs cloud-based remote support service.
Β» They bypassed security to remotely access Treasury workstations and unclassified documents.
Β» CVE-2024-12356, a critical vulnerability (CVSS 9.8), was actively exploited.
β‘οΈ Read More: https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html
π‘ Hereβs what happened:
Β» Attackers gained access to a key securing BeyondTrustβs cloud-based remote support service.
Β» They bypassed security to remotely access Treasury workstations and unclassified documents.
Β» CVE-2024-12356, a critical vulnerability (CVSS 9.8), was actively exploited.
β‘οΈ Read More: https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html
π₯31π€―9β‘5π4π2π€2
π Department of Justice has finalized a rule blocking bulk transfers of Americansβ sensitive personal data to adversarial nations like China, Russia, and North Korea.
Β» Data like Social Security numbers, geolocation, biometrics, and health information is now protected.
Β» These countries have used such data for espionage, AI development, and suppressing freedoms.
Read full story here π https://thehackernews.com/2024/12/new-us-doj-rule-halts-bulk-data.html
Β» Data like Social Security numbers, geolocation, biometrics, and health information is now protected.
Β» These countries have used such data for espionage, AI development, and suppressing freedoms.
Read full story here π https://thehackernews.com/2024/12/new-us-doj-rule-halts-bulk-data.html
π24π10π₯7π3
The U.S. Treasury just sanctioned two major entitiesβone Iranian and one Russianβfor meddling in the 2024 presidential election through AI-powered disinformation campaigns.
Hereβs what they did:
π οΈ Created deepfakes and synthetic content using AI.
π Built a network of 100+ fake news sites to spread misinformation.
π° Backed by intelligence agencies like Iran's IRGC and Russia's GRU.
Learn the latest tactics π https://thehackernews.com/2025/01/iranian-and-russian-entities-sanctioned.html
Hereβs what they did:
π οΈ Created deepfakes and synthetic content using AI.
π Built a network of 100+ fake news sites to spread misinformation.
π° Backed by intelligence agencies like Iran's IRGC and Russia's GRU.
Learn the latest tactics π https://thehackernews.com/2025/01/iranian-and-russian-entities-sanctioned.html
π22π10π±8π€3π€―1
β οΈ Click. Click. Hacked?
DoubleClickjacking: A new clickjacking variant that stealthily exploits timing gaps between clicks to hijack accounts.
This attack bypasses protections like X-Frame-Options and SameSite cookies.
Read the article: https://thehackernews.com/2025/01/new-doubleclickjacking-exploit-bypasses.html
DoubleClickjacking: A new clickjacking variant that stealthily exploits timing gaps between clicks to hijack accounts.
This attack bypasses protections like X-Frame-Options and SameSite cookies.
Read the article: https://thehackernews.com/2025/01/new-doubleclickjacking-exploit-bypasses.html
π€―42π₯16π6π3
π¨ Three Russian-German nationals charged with espionage and sabotage by German prosecutors.
One suspect, Dieter S., allegedly scouted military sites and planned attacks to disrupt Germany's support for Ukraine.
Learn more: https://thehackernews.com/2025/01/three-russian-german-nationals-charged.html
One suspect, Dieter S., allegedly scouted military sites and planned attacks to disrupt Germany's support for Ukraine.
Learn more: https://thehackernews.com/2025/01/three-russian-german-nationals-charged.html
π16π4π₯3
π A new npm package poses as a vulnerability detector for Ethereum smart contracts but silently installs Quasar RATβa remote access trojan that gives attackers:
π₯οΈ Full control over your system
π‘οΈ Persistence via Windows Registry tweaks
π‘ Command-and-Control connections to steal data
π Read the full analysis: https://thehackernews.com/2025/01/malicious-obfuscated-npm-package.html
π₯οΈ Full control over your system
π‘οΈ Persistence via Windows Registry tweaks
π‘ Command-and-Control connections to steal data
π Read the full analysis: https://thehackernews.com/2025/01/malicious-obfuscated-npm-package.html
π30π±8
β‘ Did you know? Cross-domain attackers often stay hidden for weeks before escalating privileges.
Why do attackers thrive? Because fragmented security tools leave gapsβand adversaries like FAMOUS CHOLLIMA are exploiting every one of them.
π¬ Question: Are your identity systems truly secure, or just compliant?
π‘ Expert Take: A unified platform transforms identity systems into secure perimeters by:
Β» Closing blind spots with end-to-end visibility.
Β» Integrating seamlessly across cloud, SaaS, and on-prem environments.
Β» Accelerating threat detection for proactive defense.
π Learn how to level up your defenses: https://thehackernews.com/2025/01/cross-domain-attacks-growing-threat-to.html
Attackers move fastβyour defenses need to be faster.
Why do attackers thrive? Because fragmented security tools leave gapsβand adversaries like FAMOUS CHOLLIMA are exploiting every one of them.
π¬ Question: Are your identity systems truly secure, or just compliant?
π‘ Expert Take: A unified platform transforms identity systems into secure perimeters by:
Β» Closing blind spots with end-to-end visibility.
Β» Integrating seamlessly across cloud, SaaS, and on-prem environments.
Β» Accelerating threat detection for proactive defense.
π Learn how to level up your defenses: https://thehackernews.com/2025/01/cross-domain-attacks-growing-threat-to.html
Attackers move fastβyour defenses need to be faster.
π17π₯15
β οΈ Researchers have uncovered details of now-patched vulnerabilities in Dynamics 365 and Power Apps Web API that exposed sensitive user data, including emails, financial information, and password hashes.
π Learn more: https://thehackernews.com/2025/01/severe-security-flaws-patched-in.html
π Learn more: https://thehackernews.com/2025/01/severe-security-flaws-patched-in.html
π18π7π₯6π5β‘3
π Apple will pay $95M to settle claims that Siri accidentally recorded and shared private conversations with third parties.
π Key Details:
Β» Covers Siri-enabled devices from 2014 to 2024.
Β» Claim up to $20 per device (max 5).
Β» Apple introduced new privacy settings, but is it enough?
π Get the full story: https://thehackernews.com/2025/01/apple-to-pay-siri-users-20-per-device.html
π Key Details:
Β» Covers Siri-enabled devices from 2014 to 2024.
Β» Claim up to $20 per device (max 5).
Β» Apple introduced new privacy settings, but is it enough?
π Get the full story: https://thehackernews.com/2025/01/apple-to-pay-siri-users-20-per-device.html
π₯29π13π9β‘2π€1
π¨ Critical Update: With Edgio services shutting down, Microsoft is migrating all .NET workloads to Azure Front Door CDNs.
π‘ Deadline: January 7, 2025.
π Scan your codebase and update references today to avoid downtime.
Learn more: https://thehackernews.com/2025/01/critical-deadline-update-old-net.html
π‘ Deadline: January 7, 2025.
π Scan your codebase and update references today to avoid downtime.
Learn more: https://thehackernews.com/2025/01/critical-deadline-update-old-net.html
π18π6
π¨ Critical Flaws in LDAP Exploited!
A new proof-of-concept exploit, LDAPNightmare, crashes unpatched Windows Servers with one crafted request.
Even worse? RCE attacks are possible with minor tweaks.
Β» CVE-2024-49113 causes DoS attacks.
Β» CVE-2024-49112 allows remote code execution.
What can you do?
β Patch ASAP with Microsoftβs December 2024 updates.
β Monitor RPC calls and suspicious LDAP activity.
π Read more: https://thehackernews.com/2025/01/ldapnightmare-poc-exploit-crashes-lsass.html
A new proof-of-concept exploit, LDAPNightmare, crashes unpatched Windows Servers with one crafted request.
Even worse? RCE attacks are possible with minor tweaks.
Β» CVE-2024-49113 causes DoS attacks.
Β» CVE-2024-49112 allows remote code execution.
What can you do?
β Patch ASAP with Microsoftβs December 2024 updates.
β Monitor RPC calls and suspicious LDAP activity.
π Read more: https://thehackernews.com/2025/01/ldapnightmare-poc-exploit-crashes-lsass.html
π₯27π€―10π8π3
π¨ ALERT: New multi-turn jailbreaking attack, Bad Likert Judge, cleverly bypasses AI safety measures across six major platforms, including AWS, Google, and NVIDIA.
Β» Attack success rates spike by 60% using this technique.
Β» Tested across major platformsβOpenAI, Google, and more.
Β» Categories impacted: hate speech, malware, even weapons.
π Explore expert findings: https://thehackernews.com/2025/01/new-ai-jailbreak-method-bad-likert.html
Β» Attack success rates spike by 60% using this technique.
Β» Tested across major platformsβOpenAI, Google, and more.
Β» Categories impacted: hate speech, malware, even weapons.
π Explore expert findings: https://thehackernews.com/2025/01/new-ai-jailbreak-method-bad-likert.html
π₯32π5π€3
π¨ The U.S. Treasury just sanctioned Integrity Technology Group, a Beijing-based cybersecurity firm, for enabling state-sponsored cyberattacks on U.S. entities.
βͺ Linked to Flax Typhoon (aka RedJuliett)
βͺ Exploited IoT vulnerabilities.
βͺ Targeted government agencies, telecoms, and universities.
π Read the details: https://thehackernews.com/2025/01/us-treasury-sanctions-beijing.html
βͺ Linked to Flax Typhoon (aka RedJuliett)
βͺ Exploited IoT vulnerabilities.
βͺ Targeted government agencies, telecoms, and universities.
π Read the details: https://thehackernews.com/2025/01/us-treasury-sanctions-beijing.html
π18π9π€―1
shrinked-malware-execution-ezgif.com-optimize.gif
16.2 MB
β οΈ ALERT: PLAYFULGHOST Targets VPN Users!
This powerful backdoor malware deceives users by trojanizing legitimate VPN apps, enabling keylogging, screen/audio capture, and remote shell access.
Learn more: https://thehackernews.com/2025/01/playfulghost-delivered-via-phishing-and.html
This powerful backdoor malware deceives users by trojanizing legitimate VPN apps, enabling keylogging, screen/audio capture, and remote shell access.
Learn more: https://thehackernews.com/2025/01/playfulghost-delivered-via-phishing-and.html
π24β‘5π€4π±3
This media is not supported in your browser
VIEW IN TELEGRAM
π¨ A severe flaw in Nuclei (CVE-2024-43405) could let attackers bypass signature checks and inject malicious code. This impacts all versions after 3.0.0βscoring a 7.4 CVSS.
Read the analysis and secure your systems πhttps://thehackernews.com/2025/01/researchers-uncover-nuclei.html
Read the analysis and secure your systems πhttps://thehackernews.com/2025/01/researchers-uncover-nuclei.html
β‘16π±9π₯5π4
FireScam malware is targeting Android devices by disguising itself as a fake βTelegram Premiumβ app. Once installed, it:
βͺ Steals sensitive data (messages, notifications, call logs, credentials)
βͺ Blocks legitimate app updates to remain undetected
This malware uses advanced techniques to spy on users and maintain control over devicesβposing a major threat to personal and organizational data.
Get all the details π https://thehackernews.com/2025/01/firescam-android-malware-poses-as.html
βͺ Steals sensitive data (messages, notifications, call logs, credentials)
βͺ Blocks legitimate app updates to remain undetected
This malware uses advanced techniques to spy on users and maintain control over devicesβposing a major threat to personal and organizational data.
Get all the details π https://thehackernews.com/2025/01/firescam-android-malware-poses-as.html
π20π₯10π±4π€3π2
π Critical Alert: Malicious npm packages are impersonating Hardhat tools to steal private keys and mnemonics.
βͺ Over 1,000 downloads of a single fake package, active for over a year.
βͺ Data is exfiltrated using hardcoded Ethereum addresses.
Open-source dependency complexity is a hackerβs dreamβmanual reviews are becoming impossible.
π§ What You Can Do:
β Double-check every dependency.
β Use tools to audit npm packages.
β Build robust supply chain defenses.
π Read the details: https://thehackernews.com/2025/01/russian-speaking-attackers-target.html
βͺ Over 1,000 downloads of a single fake package, active for over a year.
βͺ Data is exfiltrated using hardcoded Ethereum addresses.
Open-source dependency complexity is a hackerβs dreamβmanual reviews are becoming impossible.
π§ What You Can Do:
β Double-check every dependency.
β Use tools to audit npm packages.
β Build robust supply chain defenses.
π Read the details: https://thehackernews.com/2025/01/russian-speaking-attackers-target.html
π₯13π7π€―4π3π±1