π Stolen credentials are responsible for 80% of web app breaches in 2023-2024!
β€· Infostealer malware is fueling this rise, with credentials being sold for as little as $10.
β€· Even large companies with high security budgets are falling victim.
Learn how to tackle stolen credentials before they destroy your organizationβs security.
π Full article here: https://thehackernews.com/2025/01/the-10-cyber-threat-responsible-for.html
β€· Infostealer malware is fueling this rise, with credentials being sold for as little as $10.
β€· Even large companies with high security budgets are falling victim.
Learn how to tackle stolen credentials before they destroy your organizationβs security.
π Full article here: https://thehackernews.com/2025/01/the-10-cyber-threat-responsible-for.html
π14π1
π¨ Traditional trust management is failing in todayβs digital world. As IoT devices explode, certificates pile up, and compliance rules tighten, how are you keeping up?
π The solution? DigiCert ONE!
β€· Centralized trust management for devices, users, and workloads
β€· Automated security for hybrid environments
β€· Stress-free compliance
π‘Why it matters: The speed of digital transformation means old solutions just wonβt cut it anymore. You need real-time, automated security.
π Want to see how it works? Register for our free webinar now: https://thehackernews.com/2025/01/ready-to-simplify-trust-management-join.html
π The solution? DigiCert ONE!
β€· Centralized trust management for devices, users, and workloads
β€· Automated security for hybrid environments
β€· Stress-free compliance
π‘Why it matters: The speed of digital transformation means old solutions just wonβt cut it anymore. You need real-time, automated security.
π Want to see how it works? Register for our free webinar now: https://thehackernews.com/2025/01/ready-to-simplify-trust-management-join.html
π17π₯3π1
β‘ A major shift in attack tactics β Star Blizzard, previously known as SEABORGIUM, is now exploiting WhatsApp accounts through a spear-phishing campaign.
β€· Primary targets: Diplomats, Ukraine supporters, and defense officials.
β€· Once clicked, hackers gain access to WhatsApp messages and data.
Learn more: https://thehackernews.com/2025/01/russian-star-blizzard-shifts-tactics-to.html
β€· Primary targets: Diplomats, Ukraine supporters, and defense officials.
β€· Once clicked, hackers gain access to WhatsApp messages and data.
Learn more: https://thehackernews.com/2025/01/russian-star-blizzard-shifts-tactics-to.html
π14π±5π₯1π1
π Alert : TikTok, SHEIN, AliExpress, and others accused of violating EU data laws by sending user data to China.
Privacy Group noyb demands suspension of data flows.
Find out more: https://thehackernews.com/2025/01/european-privacy-group-sues-tiktok-and.html
Privacy Group noyb demands suspension of data flows.
Find out more: https://thehackernews.com/2025/01/european-privacy-group-sues-tiktok-and.html
π35π20π±10π7π€―7π€5π₯3
π‘οΈ The U.S. Treasury just sanctioned 2 individuals and 4 entities tied to North Koreaβs illicit IT worker networkβa major blow to funding its WMD and missile programs.
π Read More: https://thehackernews.com/2025/01/us-sanctions-north-korean-it-worker.html
π Read More: https://thehackernews.com/2025/01/us-sanctions-north-korean-it-worker.html
π17β‘4π4π₯2
π New Adversary-in-the-Middle Phishing Kit Alert!
A powerful new phishing kit called Sneaky 2FA has been discovered, designed to steal your credentials and bypass 2FA.
β€· Sold as a service via Telegram, offering an easy path for cybercriminals
β€· Built to outsmart anti-bot systems and Cloudflare challenges
π Learn how: https://thehackernews.com/2025/01/new-sneaky-2fa-phishing-kit-targets.html
A powerful new phishing kit called Sneaky 2FA has been discovered, designed to steal your credentials and bypass 2FA.
β€· Sold as a service via Telegram, offering an easy path for cybercriminals
β€· Built to outsmart anti-bot systems and Cloudflare challenges
π Learn how: https://thehackernews.com/2025/01/new-sneaky-2fa-phishing-kit-targets.html
π24β‘5π₯1
π¨ Most companies are still relying on outdated security models for guest Wi-Fi.
Itβs time to move beyond traditional security models and adopt Zero Trust for tighter control and constant verification.
β€· Prevent lateral movement
β€· Continuous verification
β€· Granular access control
π Explore how: https://thehackernews.com/2025/01/how-to-bring-zero-trust-to-wi-fi.html
Itβs time to move beyond traditional security models and adopt Zero Trust for tighter control and constant verification.
β€· Prevent lateral movement
β€· Continuous verification
β€· Granular access control
π Explore how: https://thehackernews.com/2025/01/how-to-bring-zero-trust-to-wi-fi.html
π17π9π€2π₯1
π¨ Researchers discovered 3 vulnerabilities in WGS-804HPT switches used in automation systemsβexploitable to execute remote code.
β€· CVE-2024-52320 & CVE-2024-48871: Critical 9.8 scores!
β€· Attackers can execute remote code with just a malicious HTTP request.
Read the full report: https://thehackernews.com/2025/01/critical-flaws-in-wgs-804hpt-switches.html
β€· CVE-2024-52320 & CVE-2024-48871: Critical 9.8 scores!
β€· Attackers can execute remote code with just a malicious HTTP request.
Read the full report: https://thehackernews.com/2025/01/critical-flaws-in-wgs-804hpt-switches.html
π€―23π16π4π₯2
π The U.S. Treasury has sanctioned a Chinese cybersecurity firm and a Shanghai-based actor linked to the Salt Typhoon hacking group. This follows a recent breach of U.S. Treasury IT systems.
Read the full story: https://thehackernews.com/2025/01/us-sanctions-chinese-cybersecurity-firm.html
Read the full story: https://thehackernews.com/2025/01/us-sanctions-chinese-cybersecurity-firm.html
β‘35π11π11π±10π€―3π₯2π€1
π¨ Warning to Developers: Malicious Solana-related npm and PyPI packages are designed to steal #Solana private keys, drain wallets, and even delete your files.
Learn more: https://thehackernews.com/2025/01/hackers-deploy-malicious-npm-packages.html
Learn more: https://thehackernews.com/2025/01/hackers-deploy-malicious-npm-packages.html
π24π₯9π±6π5β‘2π€1
π Data SecurityβNot Just About Visibility, But About CONTROL!
Satori secures ALL dataβnot just analytical. From production data to AI models, every data type is covered.
π‘ Key Benefits:
β€· Continuous discovery and classification of data across your organization
β€· Automated security policies that adapt to new data and users
β€· Instant alerts for misconfigurations or risky access
π Discover how Satori can automate and secure your data: https://thehackernews.com/2025/01/product-walkthrough-how-satori.html
Satori secures ALL dataβnot just analytical. From production data to AI models, every data type is covered.
π‘ Key Benefits:
β€· Continuous discovery and classification of data across your organization
β€· Automated security policies that adapt to new data and users
β€· Instant alerts for misconfigurations or risky access
π Discover how Satori can automate and secure your data: https://thehackernews.com/2025/01/product-walkthrough-how-satori.html
π15π₯4
π This week in cybersecurity: From nation-state attacks to cutting-edge malware, insider threats, and groundbreaking policies, the digital landscape is shifting fast.
Get the insights you need to stay secure and ahead of the curve.
Read: https://thehackernews.com/2025/01/thn-weekly-recap-top-cybersecurity_20.html
Get the insights you need to stay secure and ahead of the curve.
Read: https://thehackernews.com/2025/01/thn-weekly-recap-top-cybersecurity_20.html
π11π9β‘1π₯1
π¨ Urgent: Notorious DoNot Team (APT-C-35) is behind a new Android malware campaign using a fake chat app, Tanzeem, to steal sensitive information.
π± Malware functionality: The app steals contacts, call logs, SMS, location, and more.
β‘ New tactic: Push notifications deliver additional malware, ensuring persistence on the device.
π Explore how this attack works: https://thehackernews.com/2025/01/donot-team-linked-to-new-tanzeem.html
π± Malware functionality: The app steals contacts, call logs, SMS, location, and more.
β‘ New tactic: Push notifications deliver additional malware, ensuring persistence on the device.
π Explore how this attack works: https://thehackernews.com/2025/01/donot-team-linked-to-new-tanzeem.html
π19π₯4β‘2
π΄ Multiple tunneling protocols, including GRE and IP6IP6, have vulnerabilities that could expose 4.2 million hosts to cyberattacks.
β οΈ What attackers can do:
β€· Hijack your network
β€· Launch anonymous DoS/DDoS attacks
β€· Bypass security filters using trusted IPs
Find out more: https://thehackernews.com/2025/01/unsecured-tunneling-protocols-expose-42.html
β οΈ What attackers can do:
β€· Hijack your network
β€· Launch anonymous DoS/DDoS attacks
β€· Bypass security filters using trusted IPs
Find out more: https://thehackernews.com/2025/01/unsecured-tunneling-protocols-expose-42.html
π19π€7π₯6β‘5π€―2
π¨ CERT-UA is warning of ongoing social engineering attacks impersonating their agency via AnyDesk connection requests.
These malicious requests claim to conduct security audits, tricking users into trusting cyber attackers.
Explore the full details: https://thehackernews.com/2025/01/cert-ua-warns-of-cyber-scams-using-fake.html
These malicious requests claim to conduct security audits, tricking users into trusting cyber attackers.
Explore the full details: https://thehackernews.com/2025/01/cert-ua-warns-of-cyber-scams-using-fake.html
π15π8β‘4π€2π₯1
Cybercriminals are leveraging a multi-stage loader, PNGPlug, hidden in seemingly legitimate software to target Chinese-speaking regions with ValleyRAT malware.
π Learn more: https://thehackernews.com/2025/01/pngplug-loader-delivers-valleyrat.html
π Learn more: https://thehackernews.com/2025/01/pngplug-loader-delivers-valleyrat.html
β‘23π9π4π₯2π€1
π Former CIA Analyst Pleads Guilty to Leaking Top Secret Info!
β€· Top Secret Documents leaked, including intel on Israel's military actions against Iran.
β€· How did he do it? Smuggled documents out of CIA headquarters in a backpack.
π Read more: https://thehackernews.com/2025/01/ex-cia-analyst-pleads-guilty-to-sharing.html
β€· Top Secret Documents leaked, including intel on Israel's military actions against Iran.
β€· How did he do it? Smuggled documents out of CIA headquarters in a backpack.
π Read more: https://thehackernews.com/2025/01/ex-cia-analyst-pleads-guilty-to-sharing.html
π14π13β‘6π€6π₯5π2
A massive botnet powered by 13,000 hijacked MikroTik routers is sending malicious emails to bypass email protections and launch malware campaigns.
The attack leverages misconfigured DNS and SPF records, making it easier for threat actors to spoof legitimate domains.
Read the full analysis here: https://thehackernews.com/2025/01/13000-mikrotik-routers-hijacked-by.html
The attack leverages misconfigured DNS and SPF records, making it easier for threat actors to spoof legitimate domains.
Read the full analysis here: https://thehackernews.com/2025/01/13000-mikrotik-routers-hijacked-by.html
π14π7π₯2
Your appβs security should be resilient, not just protective.
Join Guardsquare's webinar to learn how to safeguard against evolving threats with multilayered protections without compromising performance or speed.
Register now: https://thn.news/multi-layered-app-protection-x
Join Guardsquare's webinar to learn how to safeguard against evolving threats with multilayered protections without compromising performance or speed.
Register now: https://thn.news/multi-layered-app-protection-x
β‘6π₯2π1
π¨ New Murdoc_Botnet Targets IoT Devices Worldwide!
Researchers have uncovered a massive botnet exploiting security flaws (CVE-2017-17215 & CVE-2024-7029) in AVTECH cameras and Huawei routers.
It has already infected 1,370+ devices since July 2024.
π Update your firmware, change default passwords, and secure your network now.
Find details here: https://thehackernews.com/2025/01/murdocbotnet-found-exploiting-avtech-ip.html
Researchers have uncovered a massive botnet exploiting security flaws (CVE-2017-17215 & CVE-2024-7029) in AVTECH cameras and Huawei routers.
It has already infected 1,370+ devices since July 2024.
π Update your firmware, change default passwords, and secure your network now.
Find details here: https://thehackernews.com/2025/01/murdocbotnet-found-exploiting-avtech-ip.html
π9π7π₯7π1