🚨 ALERT: New multi-turn jailbreaking attack, Bad Likert Judge, cleverly bypasses AI safety measures across six major platforms, including AWS, Google, and NVIDIA.
» Attack success rates spike by 60% using this technique.
» Tested across major platforms—OpenAI, Google, and more.
» Categories impacted: hate speech, malware, even weapons.
👉 Explore expert findings: https://thehackernews.com/2025/01/new-ai-jailbreak-method-bad-likert.html
» Attack success rates spike by 60% using this technique.
» Tested across major platforms—OpenAI, Google, and more.
» Categories impacted: hate speech, malware, even weapons.
👉 Explore expert findings: https://thehackernews.com/2025/01/new-ai-jailbreak-method-bad-likert.html
🔥32👍5🤔3
🚨 The U.S. Treasury just sanctioned Integrity Technology Group, a Beijing-based cybersecurity firm, for enabling state-sponsored cyberattacks on U.S. entities.
↪ Linked to Flax Typhoon (aka RedJuliett)
↪ Exploited IoT vulnerabilities.
↪ Targeted government agencies, telecoms, and universities.
🔗 Read the details: https://thehackernews.com/2025/01/us-treasury-sanctions-beijing.html
↪ Linked to Flax Typhoon (aka RedJuliett)
↪ Exploited IoT vulnerabilities.
↪ Targeted government agencies, telecoms, and universities.
🔗 Read the details: https://thehackernews.com/2025/01/us-treasury-sanctions-beijing.html
😁18👍9🤯1
shrinked-malware-execution-ezgif.com-optimize.gif
16.2 MB
⚠️ ALERT: PLAYFULGHOST Targets VPN Users!
This powerful backdoor malware deceives users by trojanizing legitimate VPN apps, enabling keylogging, screen/audio capture, and remote shell access.
Learn more: https://thehackernews.com/2025/01/playfulghost-delivered-via-phishing-and.html
This powerful backdoor malware deceives users by trojanizing legitimate VPN apps, enabling keylogging, screen/audio capture, and remote shell access.
Learn more: https://thehackernews.com/2025/01/playfulghost-delivered-via-phishing-and.html
👍24⚡5🤔4😱3
This media is not supported in your browser
VIEW IN TELEGRAM
🚨 A severe flaw in Nuclei (CVE-2024-43405) could let attackers bypass signature checks and inject malicious code. This impacts all versions after 3.0.0—scoring a 7.4 CVSS.
Read the analysis and secure your systems 👉https://thehackernews.com/2025/01/researchers-uncover-nuclei.html
Read the analysis and secure your systems 👉https://thehackernews.com/2025/01/researchers-uncover-nuclei.html
⚡16😱9🔥5👍4
FireScam malware is targeting Android devices by disguising itself as a fake “Telegram Premium” app. Once installed, it:
↪ Steals sensitive data (messages, notifications, call logs, credentials)
↪ Blocks legitimate app updates to remain undetected
This malware uses advanced techniques to spy on users and maintain control over devices—posing a major threat to personal and organizational data.
Get all the details 👉 https://thehackernews.com/2025/01/firescam-android-malware-poses-as.html
↪ Steals sensitive data (messages, notifications, call logs, credentials)
↪ Blocks legitimate app updates to remain undetected
This malware uses advanced techniques to spy on users and maintain control over devices—posing a major threat to personal and organizational data.
Get all the details 👉 https://thehackernews.com/2025/01/firescam-android-malware-poses-as.html
👍20🔥10😱4🤔3😁2
🔒 Critical Alert: Malicious npm packages are impersonating Hardhat tools to steal private keys and mnemonics.
↪ Over 1,000 downloads of a single fake package, active for over a year.
↪ Data is exfiltrated using hardcoded Ethereum addresses.
Open-source dependency complexity is a hacker’s dream—manual reviews are becoming impossible.
🔧 What You Can Do:
✅ Double-check every dependency.
✅ Use tools to audit npm packages.
✅ Build robust supply chain defenses.
🔗 Read the details: https://thehackernews.com/2025/01/russian-speaking-attackers-target.html
↪ Over 1,000 downloads of a single fake package, active for over a year.
↪ Data is exfiltrated using hardcoded Ethereum addresses.
Open-source dependency complexity is a hacker’s dream—manual reviews are becoming impossible.
🔧 What You Can Do:
✅ Double-check every dependency.
✅ Use tools to audit npm packages.
✅ Build robust supply chain defenses.
🔗 Read the details: https://thehackernews.com/2025/01/russian-speaking-attackers-target.html
🔥13👍7🤯4👏3😱1
🚨 Every second in 2024, cybercriminals attempted 7,000 password attacks—up 75% from last year! Phishing surged 58%, leading to $3.5 billion in losses.
Learn the top strategies to protect your SaaS environment from these relentless threats.
Read here: https://thehackernews.com/2025/01/from-22m-in-ransom-to-100m-stolen.html
Learn the top strategies to protect your SaaS environment from these relentless threats.
Read here: https://thehackernews.com/2025/01/from-22m-in-ransom-to-100m-stolen.html
🔥15👍6⚡3🤔2
India proposes draft Digital Personal Data Protection (DPDP) Rules to empower citizens with data erasure rights, enforce strict security mandates for companies, and impose penalties for non-compliance.
🔒 Your Rights:
➜ Erase data on demand 🗑️
➜ Consent control for how your data is used 📜
➜ Parental consent for minors’ data 👶
⚙️ Business Compliance:
➜ 72-hour breach reporting ⏱️
➜ Annual audits & impact assessments 📋
➜ Data security: encryption, backups, and access control 🔐
💸 Penalties ➜ Up to ₹250 crore (~$30M) for non-compliance or misuse ⚠️
Explore the details: https://thehackernews.com/2025/01/india-proposes-digital-data-rules-with.html
🔒 Your Rights:
➜ Erase data on demand 🗑️
➜ Consent control for how your data is used 📜
➜ Parental consent for minors’ data 👶
⚙️ Business Compliance:
➜ 72-hour breach reporting ⏱️
➜ Annual audits & impact assessments 📋
➜ Data security: encryption, backups, and access control 🔐
💸 Penalties ➜ Up to ₹250 crore (~$30M) for non-compliance or misuse ⚠️
Explore the details: https://thehackernews.com/2025/01/india-proposes-digital-data-rules-with.html
👍38👏13🔥8🤔8😁7
🚨 Two vulnerabilities (CVE-2024-9138, CVE-2024-9140) impact Moxa's routers, with CVSS scores of 8.6 and 9.3—allowing root access and unauthorized command execution.
🔑 Patch to version 3.14+ immediately.
You can protect your network by:
🛑 Isolating devices from the internet.
🔗 Limiting SSH access to trusted IPs.
🛡 Enabling strict firewall rules.
➡️ Find out now: https://thehackernews.com/2025/01/moxa-alerts-users-to-high-severity.html
🔑 Patch to version 3.14+ immediately.
You can protect your network by:
🛑 Isolating devices from the internet.
🔗 Limiting SSH access to trusted IPs.
🛡 Enabling strict firewall rules.
➡️ Find out now: https://thehackernews.com/2025/01/moxa-alerts-users-to-high-severity.html
👍10😁5👏3
⚠️ CISA says there’s no evidence other federal systems were impacted in the Treasury cyberattack—but the investigation is ongoing.
Attackers exploited BeyondTrust’s Remote Support SaaS API key to access Treasury systems.
🔗 Learn More: https://thehackernews.com/2025/01/cisa-no-wider-federal-impact-from.html
Attackers exploited BeyondTrust’s Remote Support SaaS API key to access Treasury systems.
🔗 Learn More: https://thehackernews.com/2025/01/cisa-no-wider-federal-impact-from.html
😁11🔥5👍3
A newly upgraded version of the EAGERBEE malware is actively targeting internet service providers (ISPs) and government entities in the Middle East.
➜ Allows load, unload, or swap plugins in memory on demand.
➜ Linked to state-aligned groups like Cluster Alpha and TA428.
➜ Targets military and political secrets in Southeast Asia.
Harvest network and system data with precision tools.
🔗 Read the full report here: https://thehackernews.com/2025/01/new-eagerbee-variant-targets-isps-and.html
➜ Allows load, unload, or swap plugins in memory on demand.
➜ Linked to state-aligned groups like Cluster Alpha and TA428.
➜ Targets military and political secrets in Southeast Asia.
Harvest network and system data with precision tools.
🔗 Read the full report here: https://thehackernews.com/2025/01/new-eagerbee-variant-targets-isps-and.html
🤔12👍5
This media is not supported in your browser
VIEW IN TELEGRAM
🕯️ Legacy MFA, VPNs, and antivirus have all fallen. Why? Attackers outpaced outdated tech.
Key takeaways for decision-makers: Evolve or risk critical vulnerabilities.
➤ Integrated, AI-driven, phishing-resistant tools are non-negotiable.
➤ Zero Trust and passwordless solutions are the path forward.
Cybersecurity tools must outthink attackers—not just block them.
Are your defenses ready for 2025? Find out what’s driving the next wave of innovation: https://thehackernews.com/2025/01/farewell-to-fallen-cybersecurity-stars.html
Key takeaways for decision-makers: Evolve or risk critical vulnerabilities.
➤ Integrated, AI-driven, phishing-resistant tools are non-negotiable.
➤ Zero Trust and passwordless solutions are the path forward.
Cybersecurity tools must outthink attackers—not just block them.
Are your defenses ready for 2025? Find out what’s driving the next wave of innovation: https://thehackernews.com/2025/01/farewell-to-fallen-cybersecurity-stars.html
🔥14👍5😁4⚡3🤯1
Researchers reveal Illumina’s iSeq 100 lacks modern security measures, making it vulnerable to privilege escalation and firmware tampering.
Explore the insights here: https://thehackernews.com/2025/01/researchers-uncover-major-security-flaw.html
Explore the insights here: https://thehackernews.com/2025/01/researchers-uncover-major-security-flaw.html
😁17⚡3
Can you spot hidden threats in encrypted traffic? Most organizations can’t—and that’s exactly how attackers are winning.
In this webinar, Zscaler's Emily Laufer reveals:
🛡️ Advanced tactics to uncover hidden threats
📈 Predictions for ransomware’s 2025 playbook
➡️ Watch the webinar: https://thehacker.news/ransomware-encrypted-attacks
In this webinar, Zscaler's Emily Laufer reveals:
🛡️ Advanced tactics to uncover hidden threats
📈 Predictions for ransomware’s 2025 playbook
➡️ Watch the webinar: https://thehacker.news/ransomware-encrypted-attacks
👍17🤔2
CISA has flagged 3 actively exploited vulnerabilities—two in Mitel MiCollab and one in Oracle WebLogic Server.
⤷ CVE-2024-41713: Remote access via path traversal.
⤷ CVE-2024-55550: Exploited by attackers with admin privileges.
⤷ CVE-2020-2883: A high-severity vulnerability in Oracle WebLogic with known exploits.
👉 Don’t wait—secure your systems now: https://thehackernews.com/2025/01/cisa-flags-critical-flaws-in-mitel-and.html
⤷ CVE-2024-41713: Remote access via path traversal.
⤷ CVE-2024-55550: Exploited by attackers with admin privileges.
⤷ CVE-2020-2883: A high-severity vulnerability in Oracle WebLogic with known exploits.
👉 Don’t wait—secure your systems now: https://thehackernews.com/2025/01/cisa-flags-critical-flaws-in-mitel-and.html
👍12⚡6
🔥 The U.S. government has launched the U.S. Cyber Trust Mark, a label for IoT devices that meet rigorous cybersecurity standards.
How it works:
✅ Devices tested by accredited labs
✅ QR codes reveal security practices like updates and default password tips
🔗 Read: https://thehackernews.com/2025/01/fcc-launches-cyber-trust-mark-for-iot.html
Share your thoughts!
How it works:
✅ Devices tested by accredited labs
✅ QR codes reveal security practices like updates and default password tips
🔗 Read: https://thehackernews.com/2025/01/fcc-launches-cyber-trust-mark-for-iot.html
Share your thoughts!
👍17🔥8😁4⚡2👏1
🚨 Over 15,000 infected devices are targeting businesses daily with 100 Gbps DDoS attacks!
A new Mirai botnet variant, dubbed "gayfemboy," is exploiting a critical OS command injection flaw in Four-Faith routers.
✅ Countries hit hardest: China, Iran, Russia, Turkey, USA
✅ Vulnerabilities used: over 20 CVEs, including a zero-day.
🔗 Full story: https://thehackernews.com/2025/01/mirai-botnet-variant-exploits-four.html
A new Mirai botnet variant, dubbed "gayfemboy," is exploiting a critical OS command injection flaw in Four-Faith routers.
✅ Countries hit hardest: China, Iran, Russia, Turkey, USA
✅ Vulnerabilities used: over 20 CVEs, including a zero-day.
🔗 Full story: https://thehackernews.com/2025/01/mirai-botnet-variant-exploits-four.html
😁19⚡7👍4
🚨 Lumma malware continues to wreak havoc in 2025, stealing sensitive information through fake CAPTCHA pages, torrents, and phishing emails.
Explore how to proactively analyze Lumma and stop it in its tracks using tools like @ANYRUN_app's sandbox. 👉 https://thehackernews.com/2025/01/top-5-malware-threats-to-prepare.html
Explore how to proactively analyze Lumma and stop it in its tracks using tools like @ANYRUN_app's sandbox. 👉 https://thehackernews.com/2025/01/top-5-malware-threats-to-prepare.html
🔥16⚡5👍4
🔒 NonEuclid, a new Remote Access Trojan, combines stealth, evasion, and ransomware into a single devastating package. It’s being advertised as a crimeware solution.
⤷ Dual Purpose: Acts as both a RAT and ransomware.
⤷ Stealth Mode: Uses sandbox detection to avoid virtual environments.
⤷ Persistence: Modifies Windows Registry and sets scheduled tasks for survival.
👉 Read more: https://thehackernews.com/2025/01/researchers-expose-noneuclid-rat-using.html
⤷ Dual Purpose: Acts as both a RAT and ransomware.
⤷ Stealth Mode: Uses sandbox detection to avoid virtual environments.
⤷ Persistence: Modifies Windows Registry and sets scheduled tasks for survival.
👉 Read more: https://thehackernews.com/2025/01/researchers-expose-noneuclid-rat-using.html
🔥10🤯7👍3
🚨 What are the limitations of existing security tools in managing AI-related risks? Learn practical approaches to identify blind spots and protect against emerging threats across your AI lifecycle—from development to production.
🎙️ Join James Berthoty, Ron Bitton, PhD and Dor Sarig, as they explore:
✅ Traditional application security Vs AI security
✅ AI security use cases in the modern enterprise
✅ Analysis of AI-related risks and vulnerabilities
✅ Strategic recommendations for 2025
📅 January 15th, 11:30am ET
👉 Don’t miss out—Reserve your spot for this exclusive webinar: https://thn.news/navigating-ai-security
🎙️ Join James Berthoty, Ron Bitton, PhD and Dor Sarig, as they explore:
✅ Traditional application security Vs AI security
✅ AI security use cases in the modern enterprise
✅ Analysis of AI-related risks and vulnerabilities
✅ Strategic recommendations for 2025
📅 January 15th, 11:30am ET
👉 Don’t miss out—Reserve your spot for this exclusive webinar: https://thn.news/navigating-ai-security
👍12🔥4