π Data SecurityβNot Just About Visibility, But About CONTROL!
Satori secures ALL dataβnot just analytical. From production data to AI models, every data type is covered.
π‘ Key Benefits:
β€· Continuous discovery and classification of data across your organization
β€· Automated security policies that adapt to new data and users
β€· Instant alerts for misconfigurations or risky access
π Discover how Satori can automate and secure your data: https://thehackernews.com/2025/01/product-walkthrough-how-satori.html
Satori secures ALL dataβnot just analytical. From production data to AI models, every data type is covered.
π‘ Key Benefits:
β€· Continuous discovery and classification of data across your organization
β€· Automated security policies that adapt to new data and users
β€· Instant alerts for misconfigurations or risky access
π Discover how Satori can automate and secure your data: https://thehackernews.com/2025/01/product-walkthrough-how-satori.html
π15π₯4
π This week in cybersecurity: From nation-state attacks to cutting-edge malware, insider threats, and groundbreaking policies, the digital landscape is shifting fast.
Get the insights you need to stay secure and ahead of the curve.
Read: https://thehackernews.com/2025/01/thn-weekly-recap-top-cybersecurity_20.html
Get the insights you need to stay secure and ahead of the curve.
Read: https://thehackernews.com/2025/01/thn-weekly-recap-top-cybersecurity_20.html
π11π9β‘1π₯1
π¨ Urgent: Notorious DoNot Team (APT-C-35) is behind a new Android malware campaign using a fake chat app, Tanzeem, to steal sensitive information.
π± Malware functionality: The app steals contacts, call logs, SMS, location, and more.
β‘ New tactic: Push notifications deliver additional malware, ensuring persistence on the device.
π Explore how this attack works: https://thehackernews.com/2025/01/donot-team-linked-to-new-tanzeem.html
π± Malware functionality: The app steals contacts, call logs, SMS, location, and more.
β‘ New tactic: Push notifications deliver additional malware, ensuring persistence on the device.
π Explore how this attack works: https://thehackernews.com/2025/01/donot-team-linked-to-new-tanzeem.html
π19π₯4β‘2
π΄ Multiple tunneling protocols, including GRE and IP6IP6, have vulnerabilities that could expose 4.2 million hosts to cyberattacks.
β οΈ What attackers can do:
β€· Hijack your network
β€· Launch anonymous DoS/DDoS attacks
β€· Bypass security filters using trusted IPs
Find out more: https://thehackernews.com/2025/01/unsecured-tunneling-protocols-expose-42.html
β οΈ What attackers can do:
β€· Hijack your network
β€· Launch anonymous DoS/DDoS attacks
β€· Bypass security filters using trusted IPs
Find out more: https://thehackernews.com/2025/01/unsecured-tunneling-protocols-expose-42.html
π19π€7π₯6β‘5π€―2
π¨ CERT-UA is warning of ongoing social engineering attacks impersonating their agency via AnyDesk connection requests.
These malicious requests claim to conduct security audits, tricking users into trusting cyber attackers.
Explore the full details: https://thehackernews.com/2025/01/cert-ua-warns-of-cyber-scams-using-fake.html
These malicious requests claim to conduct security audits, tricking users into trusting cyber attackers.
Explore the full details: https://thehackernews.com/2025/01/cert-ua-warns-of-cyber-scams-using-fake.html
π15π8β‘4π€2π₯1
Cybercriminals are leveraging a multi-stage loader, PNGPlug, hidden in seemingly legitimate software to target Chinese-speaking regions with ValleyRAT malware.
π Learn more: https://thehackernews.com/2025/01/pngplug-loader-delivers-valleyrat.html
π Learn more: https://thehackernews.com/2025/01/pngplug-loader-delivers-valleyrat.html
β‘23π9π4π₯2π€1
π Former CIA Analyst Pleads Guilty to Leaking Top Secret Info!
β€· Top Secret Documents leaked, including intel on Israel's military actions against Iran.
β€· How did he do it? Smuggled documents out of CIA headquarters in a backpack.
π Read more: https://thehackernews.com/2025/01/ex-cia-analyst-pleads-guilty-to-sharing.html
β€· Top Secret Documents leaked, including intel on Israel's military actions against Iran.
β€· How did he do it? Smuggled documents out of CIA headquarters in a backpack.
π Read more: https://thehackernews.com/2025/01/ex-cia-analyst-pleads-guilty-to-sharing.html
π14π13β‘6π€6π₯5π2
A massive botnet powered by 13,000 hijacked MikroTik routers is sending malicious emails to bypass email protections and launch malware campaigns.
The attack leverages misconfigured DNS and SPF records, making it easier for threat actors to spoof legitimate domains.
Read the full analysis here: https://thehackernews.com/2025/01/13000-mikrotik-routers-hijacked-by.html
The attack leverages misconfigured DNS and SPF records, making it easier for threat actors to spoof legitimate domains.
Read the full analysis here: https://thehackernews.com/2025/01/13000-mikrotik-routers-hijacked-by.html
π14π7π₯2
Your appβs security should be resilient, not just protective.
Join Guardsquare's webinar to learn how to safeguard against evolving threats with multilayered protections without compromising performance or speed.
Register now: https://thn.news/multi-layered-app-protection-x
Join Guardsquare's webinar to learn how to safeguard against evolving threats with multilayered protections without compromising performance or speed.
Register now: https://thn.news/multi-layered-app-protection-x
β‘6π₯2π1
π¨ New Murdoc_Botnet Targets IoT Devices Worldwide!
Researchers have uncovered a massive botnet exploiting security flaws (CVE-2017-17215 & CVE-2024-7029) in AVTECH cameras and Huawei routers.
It has already infected 1,370+ devices since July 2024.
π Update your firmware, change default passwords, and secure your network now.
Find details here: https://thehackernews.com/2025/01/murdocbotnet-found-exploiting-avtech-ip.html
Researchers have uncovered a massive botnet exploiting security flaws (CVE-2017-17215 & CVE-2024-7029) in AVTECH cameras and Huawei routers.
It has already infected 1,370+ devices since July 2024.
π Update your firmware, change default passwords, and secure your network now.
Find details here: https://thehackernews.com/2025/01/murdocbotnet-found-exploiting-avtech-ip.html
π9π7π₯7π1
π Details Emerge About BitLocker Flaw!
CVE-2025-21210 allows attackers to bypass BitLocker encryption by corrupting a registry key, which causes unencrypted hibernation images to be written to disk.
Learn more: https://thehackernews.com/2025/01/3-actively-exploited-zero-day-flaws.html#details-emerge-about-cve-2025-21210
CVE-2025-21210 allows attackers to bypass BitLocker encryption by corrupting a registry key, which causes unencrypted hibernation images to be written to disk.
Learn more: https://thehackernews.com/2025/01/3-actively-exploited-zero-day-flaws.html#details-emerge-about-cve-2025-21210
π€―17π3π€3π₯1
π£ CISA BOD 25-01 is here.
This latest directive outlines requirements to ensure that Microsoft 365 cloud environments and SaaS applications are safe and secure.
Get prepared to meet those essential compliance deadlines.
π Learn how federal civilian agencies can ensure SCuBA policy alignment: https://thn.news/o8o8sp2s
This latest directive outlines requirements to ensure that Microsoft 365 cloud environments and SaaS applications are safe and secure.
Get prepared to meet those essential compliance deadlines.
π Learn how federal civilian agencies can ensure SCuBA policy alignment: https://thn.news/o8o8sp2s
π14π4π₯1
β‘ Cloudflareβs latest report reveals the largest DDoS attack ever recorded β 5.6 Terabits per second!
β€· Originated from over 13,000 IoT devices
β€· The attack targeted an ISP in Eastern Asia
π Learn more: https://thehackernews.com/2025/01/mirai-botnet-launches-record-56-tbps.html
β€· Originated from over 13,000 IoT devices
β€· The attack targeted an ISP in Eastern Asia
π Learn more: https://thehackernews.com/2025/01/mirai-botnet-launches-record-56-tbps.html
π±17π15β‘10π6π₯6π1
β οΈ Oracle has released its Critical Patch Update for January 2025, addressing a massive 318 security vulnerabilities across its products.
The most severe flaw could give attackers full control over affected systems.
Read the full update: https://thehackernews.com/2025/01/oracle-releases-january-2025-patch-to.html
The most severe flaw could give attackers full control over affected systems.
Read the full update: https://thehackernews.com/2025/01/oracle-releases-january-2025-patch-to.html
π10β‘4π₯1
π¨ Alert: A previously unknown China-linked APT group, PlushDaemon, has been linked to a 2023 supply chain attack targeting a South Korean VPN provider.
From screen recording to browser password harvesting β this backdoor does it all.
Read more: https://thehackernews.com/2025/01/plushdaemon-apt-targets-south-korean.html
From screen recording to browser password harvesting β this backdoor does it all.
Read more: https://thehackernews.com/2025/01/plushdaemon-apt-targets-south-korean.html
β‘8π4π₯2
π€ 65% of security teams rely solely on pentest vendors for their reports. What happens when you canβt verify those reports?
β€· HackGATE fixes this by offering real-time visibility into pentest activities.
β€· Gain deeper insight into every test phase, ensuring quality and accountability.
Donβt just trust the reportβverify it!
β‘ See how HackGATE can help: https://thehackernews.com/2025/01/hackgate-setting-new-standards-for.html
β€· HackGATE fixes this by offering real-time visibility into pentest activities.
β€· Gain deeper insight into every test phase, ensuring quality and accountability.
Donβt just trust the reportβverify it!
β‘ See how HackGATE can help: https://thehackernews.com/2025/01/hackgate-setting-new-standards-for.html
π9π₯3π€2
βοΈ U.S. President Trump pardons Ross Ulbricht, creator of the Silk Road darkweb marketplace, after 11 years behind bars.
Ulbrichtβs life sentence for trafficking and hacking is now officially void.
π Read the full article: https://thehackernews.com/2025/01/president-trump-pardons-silk-road.html
Ulbrichtβs life sentence for trafficking and hacking is now officially void.
π Read the full article: https://thehackernews.com/2025/01/president-trump-pardons-silk-road.html
π€―32π24π12π€11π8π₯4
π°π΅ North Korean malware #InvisibleFerret uses fake tech job interviews
It's target: corporate info, crypto data, source code π―
Read comprehensive technical analysis of this threat from @AnyRun_app
https://thn.news/invisibleferret-tech-analysis
It's target: corporate info, crypto data, source code π―
Read comprehensive technical analysis of this threat from @AnyRun_app
https://thn.news/invisibleferret-tech-analysis
β‘10π€―7π₯6π3π2
π New FREE Risk Assessment for Security Teams!
As GenAI and SaaS apps become essential, your organizationβs security risks are growing. Employees' browser behavior could be leaking sensitive data.
π Gain actionable insights and uncover hidden risks with this customized risk assessment: https://thehackernews.com/2025/01/discover-hidden-browsing-threats-free.html
As GenAI and SaaS apps become essential, your organizationβs security risks are growing. Employees' browser behavior could be leaking sensitive data.
π Gain actionable insights and uncover hidden risks with this customized risk assessment: https://thehackernews.com/2025/01/discover-hidden-browsing-threats-free.html
π₯11β‘2
π Zero-Day Exploit in Cambium Routers!
Threat actors are exploiting this flaw to deploy the AIRASHI botnet, carrying out powerful DDoS attacks of up to 3 Tbps.
Take action to secure your IoT devices before itβs too late.
Learn more here: https://thehackernews.com/2025/01/hackers-exploit-zero-day-in-cnpilot.html
Threat actors are exploiting this flaw to deploy the AIRASHI botnet, carrying out powerful DDoS attacks of up to 3 Tbps.
Take action to secure your IoT devices before itβs too late.
Learn more here: https://thehackernews.com/2025/01/hackers-exploit-zero-day-in-cnpilot.html
π14π€―9β‘1