๐จ New Threat Alert: Banshee Stealer!
The latest variant targets macOS users and hides its tracks using Apple-inspired encryption.
๐ป Targets victims via phishing websites disguised as Google Chrome & Telegram
๐ธ Offered to hackers for $3,000/month under a Malware-as-a-Service model
๐ Read more: https://thehackernews.com/2025/01/new-banshee-stealer-variant-bypasses.html
The latest variant targets macOS users and hides its tracks using Apple-inspired encryption.
๐ป Targets victims via phishing websites disguised as Google Chrome & Telegram
๐ธ Offered to hackers for $3,000/month under a Malware-as-a-Service model
๐ Read more: https://thehackernews.com/2025/01/new-banshee-stealer-variant-bypasses.html
๐16โก4๐4
๐จ Critical flaws found in major platforms:
โคท SonicWall: SSLVPN bypass (CVSS 8.2) & privilege escalation.
โคท Palo Alto Networks: SQL injection exposes passwords & API keys (CVSS 7.8).
โคท Aviatrix: Max severity flaw (CVSS 10.0) allows remote code execution.
๐ Full details: https://thehackernews.com/2025/01/major-vulnerabilities-patched-in.html
Patch systems to secure your organization.
โคท SonicWall: SSLVPN bypass (CVSS 8.2) & privilege escalation.
โคท Palo Alto Networks: SQL injection exposes passwords & API keys (CVSS 7.8).
โคท Aviatrix: Max severity flaw (CVSS 10.0) allows remote code execution.
๐ Full details: https://thehackernews.com/2025/01/major-vulnerabilities-patched-in.html
Patch systems to secure your organization.
๐22โก4๐ฅ4๐ค2๐คฏ2
โ ๏ธ Hackers are impersonating cybersecurity giant CrowdStrike, tricking victims into downloading a cryptominer disguised as a recruitment tool.
๐ In a separate campaign, cybercriminals are targeting researchers with a fake PoC for the LDAPNightmare vulnerability (CVE-2024-49113).
๐ Stay informed and learn more: https://thehackernews.com/2025/01/crowdstrike-warns-of-phishing-scam.html
๐ In a separate campaign, cybercriminals are targeting researchers with a fake PoC for the LDAPNightmare vulnerability (CVE-2024-49113).
๐ Stay informed and learn more: https://thehackernews.com/2025/01/crowdstrike-warns-of-phishing-scam.html
โก8๐5๐4
๐จ China-linked RedDelta hackers are targeting Southeast Asia, Mongolia & Taiwan with custom PlugX backdoors in a series of espionage attacks.
โคท New tactic: Using Cloudflare CDN to mask malicious traffic
โคท Spyware deployed: Custom PlugX backdoor
Read: https://thehackernews.com/2025/01/reddelta-deploys-plugx-malware-to.html
โคท New tactic: Using Cloudflare CDN to mask malicious traffic
โคท Spyware deployed: Custom PlugX backdoor
Read: https://thehackernews.com/2025/01/reddelta-deploys-plugx-malware-to.html
๐15โก5๐3๐ค2
โ ๏ธ A high-severity vulnerability in Samsung's Monkey's Audio decoder (CVE-2024-49415) is putting millions of devices at risk.
๐ด No user interaction needed โ attackers can exploit this flaw remotely, allowing them to execute arbitrary code on your phone.
Update your Samsung device immediately to patch this flaw.
Read details here: https://thehackernews.com/2025/01/google-project-zero-researcher-uncovers.html
๐ด No user interaction needed โ attackers can exploit this flaw remotely, allowing them to execute arbitrary code on your phone.
Update your Samsung device immediately to patch this flaw.
Read details here: https://thehackernews.com/2025/01/google-project-zero-researcher-uncovers.html
๐ฅ14๐6โก5๐คฏ3๐ฑ2
This media is not supported in your browser
VIEW IN TELEGRAM
๐จ Shadow AI is hereโand itโs putting your company at risk as employees secretly use AI tools like ChatGPT, transcription apps, and customer support bots.
Identify which apps and AI tools are in use across your organization with Recoโs detection solutionโbefore they lead to a security incident.
Start securing your apps now: https://thehackernews.com/2025/01/product-review-how-reco-discovers.html
Identify which apps and AI tools are in use across your organization with Recoโs detection solutionโbefore they lead to a security incident.
Start securing your apps now: https://thehackernews.com/2025/01/product-review-how-reco-discovers.html
๐12โก5
โก FunkSec, a rising ransomware group, has already hit 85+ victims, demanding ransoms as low as $10,000. Whatโs worse? Theyโre leveraging AI to rapidly evolve their attacks.
With targets like the U.S. and India, FunkSec's motives go beyond moneyโthey are blurring the lines between hacktivism and cybercrime.
๐ Learn more: https://thehackernews.com/2025/01/ai-driven-ransomware-funksec-targets-85.html
With targets like the U.S. and India, FunkSec's motives go beyond moneyโthey are blurring the lines between hacktivism and cybercrime.
๐ Learn more: https://thehackernews.com/2025/01/ai-driven-ransomware-funksec-targets-85.html
โก11๐8๐ฅ5
Kick off 2025 with a game plan to grow your MSPโs revenue and deliver outstanding value to your clients.
Join us on January 15 to "10x Your MSP Profits in 2025 with Automated Network Pentesting" and discover how vPenTest can help you set the tone for a successful year.
Save your spot: https://thn.news/webinar-automated-pentesting-2025
Join us on January 15 to "10x Your MSP Profits in 2025 with Automated Network Pentesting" and discover how vPenTest can help you set the tone for a successful year.
Save your spot: https://thn.news/webinar-automated-pentesting-2025
๐6๐ฅ5โก3๐2๐1
๐ Reporting is broken! Is YOUR cybersecurity reporting still a โcheck the boxโ task?
Clients donโt want to hear about firewall logsโthey want to understand how YOU are safeguarding their business.
Find out how to improve it here: https://thehackernews.com/2025/01/taking-pain-out-of-cybersecurity.html
Clients donโt want to hear about firewall logsโthey want to understand how YOU are safeguarding their business.
Find out how to improve it here: https://thehackernews.com/2025/01/taking-pain-out-of-cybersecurity.html
โก7๐ฅ4๐ฑ3๐2๐1
๐ฐ How One U.S. Health System Cut Security Costs by 76% ...
๐ The system deployed Elisity with just 2 staff members per site, compared to 14 for traditional segmentation.
โก Elisity is a seamless, lightweight solution that integrates with existing switches and works with Cisco, Juniper, and Arista devices, taking less than 30 minutes to deploy without any network downtime.
Get the full details here: https://thehackernews.com/2025/01/hands-on-walkthrough-microsegmentation.html
๐ The system deployed Elisity with just 2 staff members per site, compared to 14 for traditional segmentation.
โก Elisity is a seamless, lightweight solution that integrates with existing switches and works with Cisco, Juniper, and Arista devices, taking less than 30 minutes to deploy without any network downtime.
Get the full details here: https://thehackernews.com/2025/01/hands-on-walkthrough-microsegmentation.html
โก11๐7๐ฅ5๐5๐ค5
๐ U.S. Justice Department indicts 3 Russian nationals involved in laundering millions through cryptocurrency mixers Blender`io and Sinbad`io.
Full details inside: https://thehackernews.com/2025/01/doj-indicts-three-russians-for.html
Full details inside: https://thehackernews.com/2025/01/doj-indicts-three-russians-for.html
โก19๐10๐ฑ6๐ฅ3
๐ฅ Microsoft has taken legal action against hackers using stolen Azure credentials to exploit AI services like OpenAI and DALL-E for malicious purposes.
Read the full story: https://thehackernews.com/2025/01/microsoft-sues-hacking-group-exploiting.html
Read the full story: https://thehackernews.com/2025/01/microsoft-sues-hacking-group-exploiting.html
๐44๐25๐ฅ13๐ค7โก1๐คฏ1
๐ Over 4,000 web backdoors hijackedโby registering abandoned domains for as little as $20.
๐ Researchers gained control of backdoors targeting government & academic networks in Bangladesh, China, Nigeria, South Korea, and more!
Read now: https://thehackernews.com/2025/01/expired-domains-allowed-control-over.html
๐ Researchers gained control of backdoors targeting government & academic networks in Bangladesh, China, Nigeria, South Korea, and more!
Read now: https://thehackernews.com/2025/01/expired-domains-allowed-control-over.html
๐24๐12โก8๐ฅ8
๐จ New Vulnerability Alert!
CISA has added another critical BeyondTrust flaw to its "Known Exploited Vulnerabilities" catalogโthis time, impacting Privileged Remote Access (PRA) and Remote Support (RS).
Attackers are actively exploiting it โ CVE-2024-12686.
Read more: https://thehackernews.com/2025/01/cisa-adds-new-beyondtrust-flaw-to-kev.html
CISA has added another critical BeyondTrust flaw to its "Known Exploited Vulnerabilities" catalogโthis time, impacting Privileged Remote Access (PRA) and Remote Support (RS).
Attackers are actively exploiting it โ CVE-2024-12686.
Read more: https://thehackernews.com/2025/01/cisa-adds-new-beyondtrust-flaw-to-kev.html
๐15๐4
โ ๏ธ VMware vCenter = Goldmine for Attackers.
Attackers are exploiting root-level access with the โvpxuserโ account to control ESXi infrastructure. If itโs breached, everything is at risk.
๐ Discover expert tips on strengthening your defenses and preventing catastrophic breaches: https://thehackernews.com/2025/01/ransomware-on-esxi-mechanization-of.html
Attackers are exploiting root-level access with the โvpxuserโ account to control ESXi infrastructure. If itโs breached, everything is at risk.
๐ Discover expert tips on strengthening your defenses and preventing catastrophic breaches: https://thehackernews.com/2025/01/ransomware-on-esxi-mechanization-of.html
๐17๐3๐คฏ1
A new credit card skimmer targeting WordPress e-commerce sites has been discovered.
โคท Malicious JavaScript code is injected into WordPress databases.
โคท It activates ONLY on checkout pages to steal sensitive payment info.
โคท This stealthy malware evades traditional detection tools, making it a serious threat.
This attack is incredibly difficult to spot, putting your customers' data and your reputation at risk.
๐ Read more: https://thehackernews.com/2025/01/wordpress-skimmers-evade-detection-by.html
โคท Malicious JavaScript code is injected into WordPress databases.
โคท It activates ONLY on checkout pages to steal sensitive payment info.
โคท This stealthy malware evades traditional detection tools, making it a serious threat.
This attack is incredibly difficult to spot, putting your customers' data and your reputation at risk.
๐ Read more: https://thehackernews.com/2025/01/wordpress-skimmers-evade-detection-by.html
๐ฅ20๐11๐คฏ8
โ ๏ธ WARNING: Zero-Day Exploit Likely Behind Fortinet Attack.
Attackers created super admin accounts, hijacked SSL VPNs, and moved laterally through networks to extract credentials.
Learn more in the full article: https://thehackernews.com/2025/01/zero-day-vulnerability-suspected-in.html
Attackers created super admin accounts, hijacked SSL VPNs, and moved laterally through networks to extract credentials.
Learn more in the full article: https://thehackernews.com/2025/01/zero-day-vulnerability-suspected-in.html
๐คฏ23๐8๐ฅ8๐ค3
HuiOne Guarantee, an illicit Telegram-based marketplace, has surpassed Hydra with $24B in crypto inflows.
โคท $150K funneled from North Koreaโs Lazarus hacking group ๐ป
โคท Facilitating romance scams, human trafficking, and money laundering
โคท Monthly inflows up 51% since July 2024 ๐
Learn more: https://thehackernews.com/2025/01/illicit-huione-telegram-market.html
โคท $150K funneled from North Koreaโs Lazarus hacking group ๐ป
โคท Facilitating romance scams, human trafficking, and money laundering
โคท Monthly inflows up 51% since July 2024 ๐
Learn more: https://thehackernews.com/2025/01/illicit-huione-telegram-market.html
๐16๐7๐ค4๐1
๐จ Russian cyber attackers are actively targeting Kazakhstanโs Ministry of Foreign Affairsโthis isn't just a cyber attack; itโs an espionage campaign to steal sensitive political and economic data.
The attackers use infected Microsoft Office docs to bypass security and deploy powerful malware like HATVIBEโdesigned to remain undetected.
Learn more: https://thehackernews.com/2025/01/russian-linked-hackers-target.html
The attackers use infected Microsoft Office docs to bypass security and deploy powerful malware like HATVIBEโdesigned to remain undetected.
Learn more: https://thehackernews.com/2025/01/russian-linked-hackers-target.html
๐22๐ฅ7๐ฑ7๐ค5๐3๐คฏ1
๐จ 4 Reasons Your SaaS Attack Surface Can No Longer be Ignored in 2025!
๐ 200 new SaaS accounts/month for 100 employeesโeach a potential breach point.
๐ฏ 50% of breaches target SaaS apps.
๐ค Unmanaged GenAI tools pose huge security risks.
โ๏ธ Weak SaaS security = GDPR/CCPA violations.
Securing your SaaS is no longer optional!
๐ Learn how to protect your SaaS environment now: https://thehackernews.com/2025/01/4-reasons-your-saas-attack-surface-can.html
๐ 200 new SaaS accounts/month for 100 employeesโeach a potential breach point.
๐ฏ 50% of breaches target SaaS apps.
๐ค Unmanaged GenAI tools pose huge security risks.
โ๏ธ Weak SaaS security = GDPR/CCPA violations.
Securing your SaaS is no longer optional!
๐ Learn how to protect your SaaS environment now: https://thehackernews.com/2025/01/4-reasons-your-saas-attack-surface-can.html
๐8๐2โก1