π΄ A new malware campaign is exploiting fake CAPTCHA verifications to spread Lumma Stealer, affecting global organizations.
Targets are being tricked into downloading malware outside of the browser context.
Read the full report: https://thehackernews.com/2025/01/beware-fake-captcha-campaign-spreads.html
Targets are being tricked into downloading malware outside of the browser context.
Read the full report: https://thehackernews.com/2025/01/beware-fake-captcha-campaign-spreads.html
π20π€7π₯3π1
β οΈ URGENT: Security Flaws Found in Palo Alto Networks Firewalls
β€· BootHole CVE-2020-10713: Secure Boot bypass
β€· LogoFAIL & PixieFail: Code execution via firmware & network stack vulnerabilities
β€· Misconfigured SPI flash access in PA-415
π Read: https://thehackernews.com/2025/01/palo-alto-firewalls-found-vulnerable-to.html
β€· BootHole CVE-2020-10713: Secure Boot bypass
β€· LogoFAIL & PixieFail: Code execution via firmware & network stack vulnerabilities
β€· Misconfigured SPI flash access in PA-415
π Read: https://thehackernews.com/2025/01/palo-alto-firewalls-found-vulnerable-to.html
π11π8π±7π4π₯1
π΅οΈββοΈ J-magic Campaign </>
A New Breed of Malware β Attackers are using "magic packets" to remotely control Juniper routers and deploying a variant of the publicly available backdoor "cd00r" into enterprise networks.
Find out more: https://thehackernews.com/2025/01/custom-backdoor-exploiting-magic-packet.html
A New Breed of Malware β Attackers are using "magic packets" to remotely control Juniper routers and deploying a variant of the publicly available backdoor "cd00r" into enterprise networks.
Find out more: https://thehackernews.com/2025/01/custom-backdoor-exploiting-magic-packet.html
π24π€6β‘3π₯2
π¨ Urgent Alert: CVE-2020-11023 is back in the spotlight!
CISA adds this jQuery flaw to its Known Exploited Vulnerabilities list after active exploitation was detected.
Learn more: https://thehackernews.com/2025/01/cisa-adds-five-year-old-jquery-xss-flaw.html
Review your jQuery versions and update immediately.
CISA adds this jQuery flaw to its Known Exploited Vulnerabilities list after active exploitation was detected.
Learn more: https://thehackernews.com/2025/01/cisa-adds-five-year-old-jquery-xss-flaw.html
Review your jQuery versions and update immediately.
π13β‘10
π Google introduces Identity Check, a new feature for Android devices that locks sensitive settings behind biometric authentication when outside trusted locations.
Powered by AI, it helps protect devices against unauthorized access.
π Check out: https://thehackernews.com/2025/01/androids-new-identity-check-feature.html
Powered by AI, it helps protect devices against unauthorized access.
π Check out: https://thehackernews.com/2025/01/androids-new-identity-check-feature.html
π€27π15π₯8β‘4π2π1
β‘ Why Zero Trust Is the Future of Cybersecurity
π Only verified users get access to specific IT resources.
π Context-based security, driven by AI, ensures nothing slips through the cracks.
π No more backhauling trafficβsecure, fast, direct-to-app access.
Explore the full article: https://thehackernews.com/expert-insights/2025/01/zero-trust-security-why-its-essential.html
π Only verified users get access to specific IT resources.
π Context-based security, driven by AI, ensures nothing slips through the cracks.
π No more backhauling trafficβsecure, fast, direct-to-app access.
Explore the full article: https://thehackernews.com/expert-insights/2025/01/zero-trust-security-why-its-essential.html
π14β‘8π€4π₯1
π¨ 5 indicted in a major North Korean IT worker scam targeting U.S. companies!
β€· $866,000 funneled through shell accounts
β€· Remote laptop farms deceived employers into hiring fake workers
β€· One suspect arrested, others face up to 20 years in prison
π Learn More: https://thehackernews.com/2025/01/doj-indicts-5-individuals-for-866k.html
β€· $866,000 funneled through shell accounts
β€· Remote laptop farms deceived employers into hiring fake workers
β€· One suspect arrested, others face up to 20 years in prison
π Learn More: https://thehackernews.com/2025/01/doj-indicts-5-individuals-for-866k.html
β‘10π5π3π₯2
π Over 100 Vulnerabilities in LTE & 5G Discovered.
These flaws could give hackers a backdoor into cellular networksβdisrupting communications at a city-wide level.
β€· Attacks on phone calls, messaging, and data.
β€· Exploiting buffer overflows and memory errors.
β€· Non-authenticated mobile devices can exploit these flaws.
Read the full details: https://thehackernews.com/2025/01/ransacked-over-100-security-flaws-found.html
These flaws could give hackers a backdoor into cellular networksβdisrupting communications at a city-wide level.
β€· Attacks on phone calls, messaging, and data.
β€· Exploiting buffer overflows and memory errors.
β€· Non-authenticated mobile devices can exploit these flaws.
Read the full details: https://thehackernews.com/2025/01/ransacked-over-100-security-flaws-found.html
π€―31π±9π8π₯6β‘2π2
Learn cybersecurity risk management from the experts at Georgetown. Attend our webinar on February 6.
https://thn.news/cyber-risk-mgmt-ig
https://thn.news/cyber-risk-mgmt-ig
π15π8β‘2π2
π Only 14% of Organizations Can Recover SaaS Data in MINUTES!
The rest? It takes hours, or even daysβputting compliance and productivity at serious risk.
Lost time = lost revenue.
π Find out how to level up your data resilience in the 2025 SaaS Backup and Recovery Report: https://thehackernews.com/2025/01/insights-from-2025-saas-backup-and-recovery-report.html
The rest? It takes hours, or even daysβputting compliance and productivity at serious risk.
Lost time = lost revenue.
π Find out how to level up your data resilience in the 2025 SaaS Backup and Recovery Report: https://thehackernews.com/2025/01/insights-from-2025-saas-backup-and-recovery-report.html
π9β‘6π6π€―6π₯4π€3
β οΈ Critical Flaw in Metaβs AI Stack!
Meta's Llama AI framework is vulnerable to remote code execution through insecure deserialization.
How it works: Attacker sends crafted data to execute malicious code.
Read this article: https://thehackernews.com/2025/01/metas-llama-framework-flaw-exposes-ai.html
Meta's Llama AI framework is vulnerable to remote code execution through insecure deserialization.
How it works: Attacker sends crafted data to execute malicious code.
Read this article: https://thehackernews.com/2025/01/metas-llama-framework-flaw-exposes-ai.html
π₯36π16π8β‘4π2
π¨ Cybersecurity Alert: A new malware loader, MintsLoader, is wreaking havoc across critical industries like energy & legal sectors.
β οΈ Delivered via spam links β JScript file β MintsLoader
π Read analysis of this attack chain: https://thehackernews.com/2025/01/mintsloader-delivers-stealc-malware-and.html
β οΈ Delivered via spam links β JScript file β MintsLoader
π Read analysis of this attack chain: https://thehackernews.com/2025/01/mintsloader-delivers-stealc-malware-and.html
π₯13π±9β‘4π3
π¨ A previously unknown group, GamaCopy, is copying the Gamaredon hacking groupβs playbook in its attacks on Russian-speaking entities.
GamaCopy uses military-themed lures to deploy UltraVNC, gaining remote access to compromised systems.
Learn more: https://thehackernews.com/2025/01/gamacopy-mimics-gamaredon-tactics-in.html
GamaCopy uses military-themed lures to deploy UltraVNC, gaining remote access to compromised systems.
Learn more: https://thehackernews.com/2025/01/gamacopy-mimics-gamaredon-tactics-in.html
π13π₯6π€―6π±3β‘2π€1
π OWASPβs new NHI Top 10 shines a spotlight on machine identitiesβAPI keys, service accounts, SSH keys, and moreβnow prime targets for attackers.
NHIs are critical connectivity enablers for services, data, and AI agents. These identities are misconfigured, over-privileged, and often misused, creating major risks.
Practice least-privilege access for all NHIs in your environment.
π Read the full guide: https://thehackernews.com/2025/01/do-we-really-need-owasp-nhi-top-10.html
NHIs are critical connectivity enablers for services, data, and AI agents. These identities are misconfigured, over-privileged, and often misused, creating major risks.
Practice least-privilege access for all NHIs in your environment.
π Read the full guide: https://thehackernews.com/2025/01/do-we-really-need-owasp-nhi-top-10.html
π10π€―7β‘4π₯4
π¨ Webinar Alert: Best Practices for Access Management in 2025
Struggling to manage user access in a way that meets the latest security standards while working within a tight budget? If you're a Google Workspace user, you're in luck
Did you know that you can configure any access-related process β provisioning roles, deprovisioning users, and conducting regular audits β using native Google Workspace capabilities? Plus a little automation!
Join us for an exclusive webinar where weβll explore:
β The Top 5 Access Control Trends you need to know for 2025
β How to build an automation for role-based access provisioning in Google Workspace in just 5 minutes
β How to automate workflows for offboarding users, scheduled audits (and add this advanced project completion to your CV πͺ)
π When: January 30
π― This webinar is perfect for IT teams looking to boost data security, ensure compliance, and maximize the value of their Google Workspace environment.
π Register Now: https://thn.news/google-workspace-access-2025
Struggling to manage user access in a way that meets the latest security standards while working within a tight budget? If you're a Google Workspace user, you're in luck
Did you know that you can configure any access-related process β provisioning roles, deprovisioning users, and conducting regular audits β using native Google Workspace capabilities? Plus a little automation!
Join us for an exclusive webinar where weβll explore:
β The Top 5 Access Control Trends you need to know for 2025
β How to build an automation for role-based access provisioning in Google Workspace in just 5 minutes
β How to automate workflows for offboarding users, scheduled audits (and add this advanced project completion to your CV πͺ)
π When: January 30
π― This webinar is perfect for IT teams looking to boost data security, ensure compliance, and maximize the value of their Google Workspace environment.
π Register Now: https://thn.news/google-workspace-access-2025
π15β‘4π2
π¨ Alert β GitHub Desktop & GitHub projects have critical vulnerabilities that can expose your credentials to attackers.
π CVE-2024-53263 β Git LFS leaks credentials via crafted URLs.
β‘ CVE-2024-50338 β GitHub CLI sends tokens to attacker-controlled hosts.
Attackers can use this to gain unauthorized access to your private repositories.
π Read full details: https://thehackernews.com/2025/01/github-desktop-vulnerability-risks.html
π CVE-2024-53263 β Git LFS leaks credentials via crafted URLs.
β‘ CVE-2024-50338 β GitHub CLI sends tokens to attacker-controlled hosts.
Attackers can use this to gain unauthorized access to your private repositories.
π Read full details: https://thehackernews.com/2025/01/github-desktop-vulnerability-risks.html
π€―24π±13π6π2β‘1
π Urgent: Apple has released a software update to patch a zero-day vulnerability (CVE-2025-24085) actively exploited in the wild, affecting iPhones, iPads, Macs, Apple TVs, and more.
This flaw could allow malicious apps to escalate privileges and take control of your device.
π Read: https://thehackernews.com/2025/01/apple-patches-actively-exploited-zero.html
This flaw could allow malicious apps to escalate privileges and take control of your device.
π Read: https://thehackernews.com/2025/01/apple-patches-actively-exploited-zero.html
π22π13π€―10β‘5π±4
π¨ DeepSeek, an AI startup that became insanely popular overnight, is disrupting OpenAIβs dominance.
However, the company is now facing cyberattacks, forcing it to temporarily pause new signups to protect its services.
Explore the full story: https://thehackernews.com/2025/01/top-rated-chinese-ai-app-deepseek.html
However, the company is now facing cyberattacks, forcing it to temporarily pause new signups to protect its services.
Explore the full story: https://thehackernews.com/2025/01/top-rated-chinese-ai-app-deepseek.html
π35π±10π₯7π5π4π€3
π¨ UPDATE: PoC Released for CVE-2024-55591, a vulnerability in the jsconsole functionality that could allow attackers to add a new administrative account.
Nearly 45,000 hosts remain vulnerable as of January 27, 2025.
Read: https://thehackernews.com/2025/01/zero-day-vulnerability-suspected-in.html
Nearly 45,000 hosts remain vulnerable as of January 27, 2025.
Read: https://thehackernews.com/2025/01/zero-day-vulnerability-suspected-in.html
π₯9π8π4
π Three Russian GRU officers are sanctioned for carrying out malicious cyber activities against Estonia.
Breach affected Estoniaβs Foreign Affairs, Economic Affairs, and Health Ministries.
π Read more on the full story: https://thehackernews.com/2025/01/eu-sanctions-3-russian-nationals-for.html
Breach affected Estoniaβs Foreign Affairs, Economic Affairs, and Health Ministries.
π Read more on the full story: https://thehackernews.com/2025/01/eu-sanctions-3-russian-nationals-for.html
π16π€―4β‘3π₯3π3π2