β‘ FunkSec, a rising ransomware group, has already hit 85+ victims, demanding ransoms as low as $10,000. Whatβs worse? Theyβre leveraging AI to rapidly evolve their attacks.
With targets like the U.S. and India, FunkSec's motives go beyond moneyβthey are blurring the lines between hacktivism and cybercrime.
π Learn more: https://thehackernews.com/2025/01/ai-driven-ransomware-funksec-targets-85.html
With targets like the U.S. and India, FunkSec's motives go beyond moneyβthey are blurring the lines between hacktivism and cybercrime.
π Learn more: https://thehackernews.com/2025/01/ai-driven-ransomware-funksec-targets-85.html
β‘11π8π₯5
Kick off 2025 with a game plan to grow your MSPβs revenue and deliver outstanding value to your clients.
Join us on January 15 to "10x Your MSP Profits in 2025 with Automated Network Pentesting" and discover how vPenTest can help you set the tone for a successful year.
Save your spot: https://thn.news/webinar-automated-pentesting-2025
Join us on January 15 to "10x Your MSP Profits in 2025 with Automated Network Pentesting" and discover how vPenTest can help you set the tone for a successful year.
Save your spot: https://thn.news/webinar-automated-pentesting-2025
π6π₯5β‘3π2π1
π Reporting is broken! Is YOUR cybersecurity reporting still a βcheck the boxβ task?
Clients donβt want to hear about firewall logsβthey want to understand how YOU are safeguarding their business.
Find out how to improve it here: https://thehackernews.com/2025/01/taking-pain-out-of-cybersecurity.html
Clients donβt want to hear about firewall logsβthey want to understand how YOU are safeguarding their business.
Find out how to improve it here: https://thehackernews.com/2025/01/taking-pain-out-of-cybersecurity.html
β‘7π₯4π±3π2π1
π° How One U.S. Health System Cut Security Costs by 76% ...
π The system deployed Elisity with just 2 staff members per site, compared to 14 for traditional segmentation.
β‘ Elisity is a seamless, lightweight solution that integrates with existing switches and works with Cisco, Juniper, and Arista devices, taking less than 30 minutes to deploy without any network downtime.
Get the full details here: https://thehackernews.com/2025/01/hands-on-walkthrough-microsegmentation.html
π The system deployed Elisity with just 2 staff members per site, compared to 14 for traditional segmentation.
β‘ Elisity is a seamless, lightweight solution that integrates with existing switches and works with Cisco, Juniper, and Arista devices, taking less than 30 minutes to deploy without any network downtime.
Get the full details here: https://thehackernews.com/2025/01/hands-on-walkthrough-microsegmentation.html
β‘11π7π₯5π5π€5
π U.S. Justice Department indicts 3 Russian nationals involved in laundering millions through cryptocurrency mixers Blender`io and Sinbad`io.
Full details inside: https://thehackernews.com/2025/01/doj-indicts-three-russians-for.html
Full details inside: https://thehackernews.com/2025/01/doj-indicts-three-russians-for.html
β‘19π10π±6π₯3
π₯ Microsoft has taken legal action against hackers using stolen Azure credentials to exploit AI services like OpenAI and DALL-E for malicious purposes.
Read the full story: https://thehackernews.com/2025/01/microsoft-sues-hacking-group-exploiting.html
Read the full story: https://thehackernews.com/2025/01/microsoft-sues-hacking-group-exploiting.html
π44π25π₯13π€7β‘1π€―1
π Over 4,000 web backdoors hijackedβby registering abandoned domains for as little as $20.
π Researchers gained control of backdoors targeting government & academic networks in Bangladesh, China, Nigeria, South Korea, and more!
Read now: https://thehackernews.com/2025/01/expired-domains-allowed-control-over.html
π Researchers gained control of backdoors targeting government & academic networks in Bangladesh, China, Nigeria, South Korea, and more!
Read now: https://thehackernews.com/2025/01/expired-domains-allowed-control-over.html
π24π12β‘8π₯8
π¨ New Vulnerability Alert!
CISA has added another critical BeyondTrust flaw to its "Known Exploited Vulnerabilities" catalogβthis time, impacting Privileged Remote Access (PRA) and Remote Support (RS).
Attackers are actively exploiting it β CVE-2024-12686.
Read more: https://thehackernews.com/2025/01/cisa-adds-new-beyondtrust-flaw-to-kev.html
CISA has added another critical BeyondTrust flaw to its "Known Exploited Vulnerabilities" catalogβthis time, impacting Privileged Remote Access (PRA) and Remote Support (RS).
Attackers are actively exploiting it β CVE-2024-12686.
Read more: https://thehackernews.com/2025/01/cisa-adds-new-beyondtrust-flaw-to-kev.html
π15π4
β οΈ VMware vCenter = Goldmine for Attackers.
Attackers are exploiting root-level access with the βvpxuserβ account to control ESXi infrastructure. If itβs breached, everything is at risk.
π Discover expert tips on strengthening your defenses and preventing catastrophic breaches: https://thehackernews.com/2025/01/ransomware-on-esxi-mechanization-of.html
Attackers are exploiting root-level access with the βvpxuserβ account to control ESXi infrastructure. If itβs breached, everything is at risk.
π Discover expert tips on strengthening your defenses and preventing catastrophic breaches: https://thehackernews.com/2025/01/ransomware-on-esxi-mechanization-of.html
π17π3π€―1
A new credit card skimmer targeting WordPress e-commerce sites has been discovered.
β€· Malicious JavaScript code is injected into WordPress databases.
β€· It activates ONLY on checkout pages to steal sensitive payment info.
β€· This stealthy malware evades traditional detection tools, making it a serious threat.
This attack is incredibly difficult to spot, putting your customers' data and your reputation at risk.
π Read more: https://thehackernews.com/2025/01/wordpress-skimmers-evade-detection-by.html
β€· Malicious JavaScript code is injected into WordPress databases.
β€· It activates ONLY on checkout pages to steal sensitive payment info.
β€· This stealthy malware evades traditional detection tools, making it a serious threat.
This attack is incredibly difficult to spot, putting your customers' data and your reputation at risk.
π Read more: https://thehackernews.com/2025/01/wordpress-skimmers-evade-detection-by.html
π₯20π11π€―8
β οΈ WARNING: Zero-Day Exploit Likely Behind Fortinet Attack.
Attackers created super admin accounts, hijacked SSL VPNs, and moved laterally through networks to extract credentials.
Learn more in the full article: https://thehackernews.com/2025/01/zero-day-vulnerability-suspected-in.html
Attackers created super admin accounts, hijacked SSL VPNs, and moved laterally through networks to extract credentials.
Learn more in the full article: https://thehackernews.com/2025/01/zero-day-vulnerability-suspected-in.html
π€―23π8π₯8π€3
HuiOne Guarantee, an illicit Telegram-based marketplace, has surpassed Hydra with $24B in crypto inflows.
β€· $150K funneled from North Koreaβs Lazarus hacking group π»
β€· Facilitating romance scams, human trafficking, and money laundering
β€· Monthly inflows up 51% since July 2024 π
Learn more: https://thehackernews.com/2025/01/illicit-huione-telegram-market.html
β€· $150K funneled from North Koreaβs Lazarus hacking group π»
β€· Facilitating romance scams, human trafficking, and money laundering
β€· Monthly inflows up 51% since July 2024 π
Learn more: https://thehackernews.com/2025/01/illicit-huione-telegram-market.html
π16π7π€4π1
π¨ Russian cyber attackers are actively targeting Kazakhstanβs Ministry of Foreign Affairsβthis isn't just a cyber attack; itβs an espionage campaign to steal sensitive political and economic data.
The attackers use infected Microsoft Office docs to bypass security and deploy powerful malware like HATVIBEβdesigned to remain undetected.
Learn more: https://thehackernews.com/2025/01/russian-linked-hackers-target.html
The attackers use infected Microsoft Office docs to bypass security and deploy powerful malware like HATVIBEβdesigned to remain undetected.
Learn more: https://thehackernews.com/2025/01/russian-linked-hackers-target.html
π22π₯7π±7π€5π3π€―1
π¨ 4 Reasons Your SaaS Attack Surface Can No Longer be Ignored in 2025!
π 200 new SaaS accounts/month for 100 employeesβeach a potential breach point.
π― 50% of breaches target SaaS apps.
π€ Unmanaged GenAI tools pose huge security risks.
βοΈ Weak SaaS security = GDPR/CCPA violations.
Securing your SaaS is no longer optional!
π Learn how to protect your SaaS environment now: https://thehackernews.com/2025/01/4-reasons-your-saas-attack-surface-can.html
π 200 new SaaS accounts/month for 100 employeesβeach a potential breach point.
π― 50% of breaches target SaaS apps.
π€ Unmanaged GenAI tools pose huge security risks.
βοΈ Weak SaaS security = GDPR/CCPA violations.
Securing your SaaS is no longer optional!
π Learn how to protect your SaaS environment now: https://thehackernews.com/2025/01/4-reasons-your-saas-attack-surface-can.html
π8π2β‘1
π£ Tomorrow! Join a live webinar on AI security. Explore how agentic systems are reshaping traditional DevSecOps practices and discover top AI security use cases in todayβs enterprises.
Join James Berthoty, Ron Bitton, and Dor Sarig for an in-depth discussion on agentic-related risks and a 2025 forecast. Donβt miss out!
π Wednesday, January 15th, 11:30am ET
π Register here: https://thn.news/ai-security-navigating
Join James Berthoty, Ron Bitton, and Dor Sarig for an in-depth discussion on agentic-related risks and a 2025 forecast. Donβt miss out!
π Wednesday, January 15th, 11:30am ET
π Register here: https://thn.news/ai-security-navigating
π14π€4π1
Googleβs OAuth login exposes a critical vulnerability, allowing attackers to access old employee accounts simply by purchasing a defunct domain from a failed startup.
Learn how this vulnerability could affect your organization: https://thehackernews.com/2025/01/google-oauth-vulnerability-exposes.html
Learn how this vulnerability could affect your organization: https://thehackernews.com/2025/01/google-oauth-vulnerability-exposes.html
π16π±9π5π€―5π2
π New macOS flaw (CVE-2024-44243) discovered!
Attackers could have bypassed crucial protections to install persistent malware and rootkits, potentially letting them take full control of your system.
Explore the details: https://thehackernews.com/2025/01/microsoft-uncovers-macos-vulnerability.html
Attackers could have bypassed crucial protections to install persistent malware and rootkits, potentially letting them take full control of your system.
Explore the details: https://thehackernews.com/2025/01/microsoft-uncovers-macos-vulnerability.html
π₯13π6π±6π1
π¨ UPDATE: Fortinet Confirms Critical Zero-Day π¨
CVE-2024-55591 in FortiOS & FortiProxy (CVSS 9.6) allows attackers to gain super-admin access & hijack firewalls.
Affected versions: FortiOS 7.0.0-7.0.16 & FortiProxy 7.0.0-7.2.12.
Upgrade now to 7.0.17+ or 7.0.20+ to mitigate risk.
https://thehackernews.com/2025/01/zero-day-vulnerability-suspected-in.html
CVE-2024-55591 in FortiOS & FortiProxy (CVSS 9.6) allows attackers to gain super-admin access & hijack firewalls.
Affected versions: FortiOS 7.0.0-7.0.16 & FortiProxy 7.0.0-7.2.12.
Upgrade now to 7.0.17+ or 7.0.20+ to mitigate risk.
https://thehackernews.com/2025/01/zero-day-vulnerability-suspected-in.html
π₯29π17β‘6π2
π΄ Critical Alert: Microsoft has just released a massive patch for 161 vulnerabilities across its software, including 3 zero-day flaws that have been actively exploited.
β€· CVE-2025-21333
β€· CVE-2025-21334
β€· CVE-2025-21335
Patch now: https://thehackernews.com/2025/01/3-actively-exploited-zero-day-flaws.html
β€· CVE-2025-21333
β€· CVE-2025-21334
β€· CVE-2025-21335
Patch now: https://thehackernews.com/2025/01/3-actively-exploited-zero-day-flaws.html
π28π₯18π6π3β‘2
π¨ Critical Flaws Discovered in SimpleHelp Software!
An attacker could exploit these flaws to execute remote code, steal sensitive data, and bring your entire system down.
β Action required NOW:
β€· SimpleHelp has released critical patches.
β€· Change admin passwords immediately.
β€· Restrict logins to trusted IP addresses.
Read: https://thehackernews.com/2025/01/critical-simplehelp-flaws-allow-file.html
An attacker could exploit these flaws to execute remote code, steal sensitive data, and bring your entire system down.
β Action required NOW:
β€· SimpleHelp has released critical patches.
β€· Change admin passwords immediately.
β€· Restrict logins to trusted IP addresses.
Read: https://thehackernews.com/2025/01/critical-simplehelp-flaws-allow-file.html
π7β‘3π₯3π€2