๐จ Forgotten domains are becoming cybercriminals' secret weapon to bypass email security!
Hackers are reviving decades-old domains that lack basic security measures to send phishing emails. These tactics fool even advanced systems like SPF and DMARC.
Learn more: https://thehackernews.com/2025/01/neglected-domains-used-in-malspam-to.html
Hackers are reviving decades-old domains that lack basic security measures to send phishing emails. These tactics fool even advanced systems like SPF and DMARC.
Learn more: https://thehackernews.com/2025/01/neglected-domains-used-in-malspam-to.html
๐18๐ฅ3
๐ฎ What does the future hold for SaaS security in 2025?
Here are some predictions for the year ahead, including:
๐ Increased SaaS-based attacks
โ๏ธ Zero Trust will be non-negotiable
โ๏ธ Identity management as the key battleground
See what else is in store for the year ahead: https://thn.news/saas-security-predictions-li
Here are some predictions for the year ahead, including:
๐ Increased SaaS-based attacks
โ๏ธ Zero Trust will be non-negotiable
โ๏ธ Identity management as the key battleground
See what else is in store for the year ahead: https://thn.news/saas-security-predictions-li
โก10๐5
๐ฅ Critical Ivanti Flaw Under Attack!
Hackers are actively targeting CVE-2025-0282โa buffer overflow flaw (CVSS 9.0)โin Ivanti Connect Secure, Policy Secure, and ZTA Gateways.
Mandiant links this to China-linked actors (UNC5337) using novel tools like DRYHOOK for credential theft.
โคท Federal agencies must patch by January 15, 2025.
โคท Organizations worldwide are at risk of breaches.
๐ Learn more here: https://thehackernews.com/2025/01/ivanti-flaw-cve-2025-0282-actively.html
Hackers are actively targeting CVE-2025-0282โa buffer overflow flaw (CVSS 9.0)โin Ivanti Connect Secure, Policy Secure, and ZTA Gateways.
Mandiant links this to China-linked actors (UNC5337) using novel tools like DRYHOOK for credential theft.
โคท Federal agencies must patch by January 15, 2025.
โคท Organizations worldwide are at risk of breaches.
๐ Learn more here: https://thehackernews.com/2025/01/ivanti-flaw-cve-2025-0282-actively.html
๐11๐4๐คฏ1๐ฑ1
๐๐ For the first time ever, the European Commission has been fined (Just โฌ400) for violating its own data privacy laws.
The breach involved sending an EU citizen's dataโincluding IP address and browser metadataโto Meta's servers in the U.S. via "Sign in with Facebook."
Learn more: https://thehackernews.com/2025/01/eu-commission-fined-for-transferring.html
The breach involved sending an EU citizen's dataโincluding IP address and browser metadataโto Meta's servers in the U.S. via "Sign in with Facebook."
Learn more: https://thehackernews.com/2025/01/eu-commission-fined-for-transferring.html
๐67๐ฑ8๐7๐6โก5
โ ๏ธ Warning: Over 23,800 GFI KerioControl firewalls are vulnerable to a 1-click RCE flaw (CVE-2024-52875) that gives attackers root access.
๐ก๏ธ Update to v9.4.5 Patch 1 and audit your firewall access points immediately.
๐ Full details here: https://thehackernews.com/2025/01/critical-rce-flaw-in-gfi-keriocontrol.html
๐ก๏ธ Update to v9.4.5 Patch 1 and audit your firewall access points immediately.
๐ Full details here: https://thehackernews.com/2025/01/critical-rce-flaw-in-gfi-keriocontrol.html
โก10๐5๐4
๐ China-linked MirrorFace has targeted Japanโs security and tech sectors in over 4 years of persistent attacks, says NPA & NCSC.
These attackers use spear-phishing, exploit device vulnerabilities, and evade antivirus detection by operating in Windows Sandboxโleaving no trace behind.
๐ Learn the tactics attackers use and how to counter them: https://thehackernews.com/2025/01/mirrorface-leverages-anel-and-noopdoor.html
These attackers use spear-phishing, exploit device vulnerabilities, and evade antivirus detection by operating in Windows Sandboxโleaving no trace behind.
๐ Learn the tactics attackers use and how to counter them: https://thehackernews.com/2025/01/mirrorface-leverages-anel-and-noopdoor.html
๐ฅ10๐5โก4๐2๐2
Advance your skills in strategic security design with Georgetownโs Online Certificate in Cybersecurity Strategy.
Learn more: https://thn.news/cybersecurity-strategy-ig
Learn more: https://thn.news/cybersecurity-strategy-ig
๐ฅ16๐5๐1
๐จ New Threat Alert: Banshee Stealer!
The latest variant targets macOS users and hides its tracks using Apple-inspired encryption.
๐ป Targets victims via phishing websites disguised as Google Chrome & Telegram
๐ธ Offered to hackers for $3,000/month under a Malware-as-a-Service model
๐ Read more: https://thehackernews.com/2025/01/new-banshee-stealer-variant-bypasses.html
The latest variant targets macOS users and hides its tracks using Apple-inspired encryption.
๐ป Targets victims via phishing websites disguised as Google Chrome & Telegram
๐ธ Offered to hackers for $3,000/month under a Malware-as-a-Service model
๐ Read more: https://thehackernews.com/2025/01/new-banshee-stealer-variant-bypasses.html
๐16โก4๐4
๐จ Critical flaws found in major platforms:
โคท SonicWall: SSLVPN bypass (CVSS 8.2) & privilege escalation.
โคท Palo Alto Networks: SQL injection exposes passwords & API keys (CVSS 7.8).
โคท Aviatrix: Max severity flaw (CVSS 10.0) allows remote code execution.
๐ Full details: https://thehackernews.com/2025/01/major-vulnerabilities-patched-in.html
Patch systems to secure your organization.
โคท SonicWall: SSLVPN bypass (CVSS 8.2) & privilege escalation.
โคท Palo Alto Networks: SQL injection exposes passwords & API keys (CVSS 7.8).
โคท Aviatrix: Max severity flaw (CVSS 10.0) allows remote code execution.
๐ Full details: https://thehackernews.com/2025/01/major-vulnerabilities-patched-in.html
Patch systems to secure your organization.
๐22โก4๐ฅ4๐ค2๐คฏ2
โ ๏ธ Hackers are impersonating cybersecurity giant CrowdStrike, tricking victims into downloading a cryptominer disguised as a recruitment tool.
๐ In a separate campaign, cybercriminals are targeting researchers with a fake PoC for the LDAPNightmare vulnerability (CVE-2024-49113).
๐ Stay informed and learn more: https://thehackernews.com/2025/01/crowdstrike-warns-of-phishing-scam.html
๐ In a separate campaign, cybercriminals are targeting researchers with a fake PoC for the LDAPNightmare vulnerability (CVE-2024-49113).
๐ Stay informed and learn more: https://thehackernews.com/2025/01/crowdstrike-warns-of-phishing-scam.html
โก8๐5๐4
๐จ China-linked RedDelta hackers are targeting Southeast Asia, Mongolia & Taiwan with custom PlugX backdoors in a series of espionage attacks.
โคท New tactic: Using Cloudflare CDN to mask malicious traffic
โคท Spyware deployed: Custom PlugX backdoor
Read: https://thehackernews.com/2025/01/reddelta-deploys-plugx-malware-to.html
โคท New tactic: Using Cloudflare CDN to mask malicious traffic
โคท Spyware deployed: Custom PlugX backdoor
Read: https://thehackernews.com/2025/01/reddelta-deploys-plugx-malware-to.html
๐15โก5๐3๐ค2
โ ๏ธ A high-severity vulnerability in Samsung's Monkey's Audio decoder (CVE-2024-49415) is putting millions of devices at risk.
๐ด No user interaction needed โ attackers can exploit this flaw remotely, allowing them to execute arbitrary code on your phone.
Update your Samsung device immediately to patch this flaw.
Read details here: https://thehackernews.com/2025/01/google-project-zero-researcher-uncovers.html
๐ด No user interaction needed โ attackers can exploit this flaw remotely, allowing them to execute arbitrary code on your phone.
Update your Samsung device immediately to patch this flaw.
Read details here: https://thehackernews.com/2025/01/google-project-zero-researcher-uncovers.html
๐ฅ14๐6โก5๐คฏ3๐ฑ2
This media is not supported in your browser
VIEW IN TELEGRAM
๐จ Shadow AI is hereโand itโs putting your company at risk as employees secretly use AI tools like ChatGPT, transcription apps, and customer support bots.
Identify which apps and AI tools are in use across your organization with Recoโs detection solutionโbefore they lead to a security incident.
Start securing your apps now: https://thehackernews.com/2025/01/product-review-how-reco-discovers.html
Identify which apps and AI tools are in use across your organization with Recoโs detection solutionโbefore they lead to a security incident.
Start securing your apps now: https://thehackernews.com/2025/01/product-review-how-reco-discovers.html
๐12โก5
โก FunkSec, a rising ransomware group, has already hit 85+ victims, demanding ransoms as low as $10,000. Whatโs worse? Theyโre leveraging AI to rapidly evolve their attacks.
With targets like the U.S. and India, FunkSec's motives go beyond moneyโthey are blurring the lines between hacktivism and cybercrime.
๐ Learn more: https://thehackernews.com/2025/01/ai-driven-ransomware-funksec-targets-85.html
With targets like the U.S. and India, FunkSec's motives go beyond moneyโthey are blurring the lines between hacktivism and cybercrime.
๐ Learn more: https://thehackernews.com/2025/01/ai-driven-ransomware-funksec-targets-85.html
โก11๐8๐ฅ5
Kick off 2025 with a game plan to grow your MSPโs revenue and deliver outstanding value to your clients.
Join us on January 15 to "10x Your MSP Profits in 2025 with Automated Network Pentesting" and discover how vPenTest can help you set the tone for a successful year.
Save your spot: https://thn.news/webinar-automated-pentesting-2025
Join us on January 15 to "10x Your MSP Profits in 2025 with Automated Network Pentesting" and discover how vPenTest can help you set the tone for a successful year.
Save your spot: https://thn.news/webinar-automated-pentesting-2025
๐6๐ฅ5โก3๐2๐1
๐ Reporting is broken! Is YOUR cybersecurity reporting still a โcheck the boxโ task?
Clients donโt want to hear about firewall logsโthey want to understand how YOU are safeguarding their business.
Find out how to improve it here: https://thehackernews.com/2025/01/taking-pain-out-of-cybersecurity.html
Clients donโt want to hear about firewall logsโthey want to understand how YOU are safeguarding their business.
Find out how to improve it here: https://thehackernews.com/2025/01/taking-pain-out-of-cybersecurity.html
โก7๐ฅ4๐ฑ3๐2๐1
๐ฐ How One U.S. Health System Cut Security Costs by 76% ...
๐ The system deployed Elisity with just 2 staff members per site, compared to 14 for traditional segmentation.
โก Elisity is a seamless, lightweight solution that integrates with existing switches and works with Cisco, Juniper, and Arista devices, taking less than 30 minutes to deploy without any network downtime.
Get the full details here: https://thehackernews.com/2025/01/hands-on-walkthrough-microsegmentation.html
๐ The system deployed Elisity with just 2 staff members per site, compared to 14 for traditional segmentation.
โก Elisity is a seamless, lightweight solution that integrates with existing switches and works with Cisco, Juniper, and Arista devices, taking less than 30 minutes to deploy without any network downtime.
Get the full details here: https://thehackernews.com/2025/01/hands-on-walkthrough-microsegmentation.html
โก11๐7๐ฅ5๐5๐ค5
๐ U.S. Justice Department indicts 3 Russian nationals involved in laundering millions through cryptocurrency mixers Blender`io and Sinbad`io.
Full details inside: https://thehackernews.com/2025/01/doj-indicts-three-russians-for.html
Full details inside: https://thehackernews.com/2025/01/doj-indicts-three-russians-for.html
โก19๐10๐ฑ6๐ฅ3
๐ฅ Microsoft has taken legal action against hackers using stolen Azure credentials to exploit AI services like OpenAI and DALL-E for malicious purposes.
Read the full story: https://thehackernews.com/2025/01/microsoft-sues-hacking-group-exploiting.html
Read the full story: https://thehackernews.com/2025/01/microsoft-sues-hacking-group-exploiting.html
๐44๐25๐ฅ13๐ค7โก1๐คฏ1
๐ Over 4,000 web backdoors hijackedโby registering abandoned domains for as little as $20.
๐ Researchers gained control of backdoors targeting government & academic networks in Bangladesh, China, Nigeria, South Korea, and more!
Read now: https://thehackernews.com/2025/01/expired-domains-allowed-control-over.html
๐ Researchers gained control of backdoors targeting government & academic networks in Bangladesh, China, Nigeria, South Korea, and more!
Read now: https://thehackernews.com/2025/01/expired-domains-allowed-control-over.html
๐24๐12โก8๐ฅ8