Google patches 47 Android security flaws, including one actively exploited in the wild!
A critical vulnerability (CVE-2024-53104) lets attackers escalate privileges through USB Video Class driverβwatch out for targeted exploitation!
This flaw, tied to the Linux kernel, can lead to memory corruption or arbitrary code execution.
Get the latest security update now: https://thehackernews.com/2025/02/google-patches-47-android-security.html
A critical vulnerability (CVE-2024-53104) lets attackers escalate privileges through USB Video Class driverβwatch out for targeted exploitation!
This flaw, tied to the Linux kernel, can lead to memory corruption or arbitrary code execution.
Get the latest security update now: https://thehackernews.com/2025/02/google-patches-47-android-security.html
π±16π11β‘3π€―3π2
π¨ Microsoft has issued critical patches for two major security flaws in Azure AI Face Service and Microsoft Account.
These vulnerabilities could let attackers escalate their privileges without authorization, exposing critical infrastructure.
While patched, CVE-2025-21415 had a public exploit.
Learn more: https://thehackernews.com/2025/02/microsoft-patches-critical-azure-ai.html
These vulnerabilities could let attackers escalate their privileges without authorization, exposing critical infrastructure.
While patched, CVE-2025-21415 had a public exploit.
Learn more: https://thehackernews.com/2025/02/microsoft-patches-critical-azure-ai.html
π21β‘6π€3π€―2
π¨ A new flaw (CVE-2024-56161) in AMD SEV could allow attackers to load malicious CPU microcode on vulnerable systems.
It exploits improper signature verification, allowing attackers local admin access to tamper with microcode.
Read more: https://thehackernews.com/2025/02/amd-sev-snp-vulnerability-allows.html
It exploits improper signature verification, allowing attackers local admin access to tamper with microcode.
Read more: https://thehackernews.com/2025/02/amd-sev-snp-vulnerability-allows.html
π11β‘3π₯3π2π€2
π Taiwan Bans DeepSeek AI Due to National Security Risks.
Concern? Cross-border data transmission can compromise sensitive government and critical infrastructure data.
Meanwhile, in just three days, DeepSeek faced multiple waves of DDoS attacks.
Learn more: https://thehackernews.com/2025/02/taiwan-bans-deepseek-ai-over-national.html
Concern? Cross-border data transmission can compromise sensitive government and critical infrastructure data.
Meanwhile, in just three days, DeepSeek faced multiple waves of DDoS attacks.
Learn more: https://thehackernews.com/2025/02/taiwan-bans-deepseek-ai-over-national.html
π33π17π₯11π±4π€―3
π¨ Cyberattacks on cloud infrastructures are evolving fast, and your current security measures may not be enough.
AI-driven workflows and massive data migrations are expanding attack surfaces. Cloud security isnβt just about detection anymore β itβs about prevention.
Read how cloud security will transform in 2025 and beyond: https://thehackernews.com/2025/02/watch-out-for-these-8-cloud-security.html
AI-driven workflows and massive data migrations are expanding attack surfaces. Cloud security isnβt just about detection anymore β itβs about prevention.
Read how cloud security will transform in 2025 and beyond: https://thehackernews.com/2025/02/watch-out-for-these-8-cloud-security.html
π10π4π₯3β‘1
β οΈ FERRET malware targets macOS users through job scam.
North Korean hackers pose as recruiters on LinkedIn to lure victims. A fake "software update" compromises your system, steals data, and drains your crypto wallet.
Learn more: https://thehackernews.com/2025/02/north-korean-hackers-deploy-ferret.html
North Korean hackers pose as recruiters on LinkedIn to lure victims. A fake "software update" compromises your system, steals data, and drains your crypto wallet.
Learn more: https://thehackernews.com/2025/02/north-korean-hackers-deploy-ferret.html
π₯11π5π4
π Russian cybercriminals are exploiting new 7-Zip vulnerability (CVE-2025-0411) to target Ukrainian organizations.
This flaw bypasses Windows' MotW protections, allowing remote code execution via malicious archives.
Learn more about the exploit: https://thehackernews.com/2025/02/russian-cybercrime-groups-exploiting-7.html
This flaw bypasses Windows' MotW protections, allowing remote code execution via malicious archives.
Learn more about the exploit: https://thehackernews.com/2025/02/russian-cybercrime-groups-exploiting-7.html
π₯25π€8π1
Python vs. no-code for security automation - a side-by-side breakdown π
Security teams sometimes debate whether to write custom Python scripts or use a no-code platform like Tines for SOAR. Both have their advantages - but how do they compare in real-world automation?
In this blog post, security researcher Conor Dunne shares:
π‘ The security, maintenance, and performance trade-offs of each approach
π‘ A side-by-side comparison of core automation components - HTTP requests, webhooks, scheduling, and more
π‘ A real-world case study: automating a Slack news feed
Read the blog post: https://thn.news/tines-python-automation-fb
Security teams sometimes debate whether to write custom Python scripts or use a no-code platform like Tines for SOAR. Both have their advantages - but how do they compare in real-world automation?
In this blog post, security researcher Conor Dunne shares:
π‘ The security, maintenance, and performance trade-offs of each approach
π‘ A side-by-side comparison of core automation components - HTTP requests, webhooks, scheduling, and more
π‘ A real-world case study: automating a Slack news feed
Read the blog post: https://thn.news/tines-python-automation-fb
π€7π4π€―4π2
π¨ Alert! A malicious package targeting the Go ecosystem has backdoored countless systemsβgiving hackers remote access.
Despite changes to the original GitHub repository, the malicious version persisted, targeting unsuspecting developers.
π Learn more: https://thehackernews.com/2025/02/malicious-go-package-exploits-module.html
Despite changes to the original GitHub repository, the malicious version persisted, targeting unsuspecting developers.
π Learn more: https://thehackernews.com/2025/02/malicious-go-package-exploits-module.html
π±17π9β‘5π€5π3π₯1
β οΈ A newly disclosed vulnerability in Microsoft SharePoint connector could have allowed attackers to harvest user credentials and launch attacks across Power Automate, Power Apps, and Copilot 365.
Learn more: https://thehackernews.com/2025/02/microsoft-sharepoint-connector-flaw.html
Learn more: https://thehackernews.com/2025/02/microsoft-sharepoint-connector-flaw.html
π₯18π€―6π5π3β‘2π€1
π΄ CISA warns of critical actively exploited security flaws in popular enterprise software.
This includes high-severity vulnerabilities in Apache OFBiz, Microsoft .NET Framework, and Paessler PRTG Network Monitor.
Act before itβs too late.
Read: https://thehackernews.com/2025/02/cisa-adds-four-actively-exploited.html
This includes high-severity vulnerabilities in Apache OFBiz, Microsoft .NET Framework, and Paessler PRTG Network Monitor.
Act before itβs too late.
Read: https://thehackernews.com/2025/02/cisa-adds-four-actively-exploited.html
π10π8π€―4π₯2
β οΈ Managing Active Directory (AD) and Entra ID in hybrid environments? You might be exposing your organization to critical vulnerabilities. Hereβs why:
β€· Privilege Sprawl from mergers, mobility, and acquisitions
β€· Standing Privileges create unmonitored opportunities for attackers to exploit
β€· Manual systems can't keep up with the growing complexity
π§ Automate your identity managementβsave time and reduce human error.
π Get the Full Guide: https://thehackernews.com/expert-insights/2025/02/using-roles-and-attributes-to-protect.html
β€· Privilege Sprawl from mergers, mobility, and acquisitions
β€· Standing Privileges create unmonitored opportunities for attackers to exploit
β€· Manual systems can't keep up with the growing complexity
π§ Automate your identity managementβsave time and reduce human error.
π Get the Full Guide: https://thehackernews.com/expert-insights/2025/02/using-roles-and-attributes-to-protect.html
π8π₯8π2β‘1
π¨ ALERT: AsyncRAT Strikes Using Dropbox & TryCloudflare
β€· Phishing emails start the chain, leading to AsyncRAT and other malware.
β€· Hackers are now using Dropbox URLs and TryCloudflare tunnels to hide malicious activity.
β€· Python payloads launch a multi-stage attack, making detection nearly impossible.
Check out details: https://thehackernews.com/2025/02/asyncrat-campaign-uses-python-payloads.html
β€· Phishing emails start the chain, leading to AsyncRAT and other malware.
β€· Hackers are now using Dropbox URLs and TryCloudflare tunnels to hide malicious activity.
β€· Python payloads launch a multi-stage attack, making detection nearly impossible.
Check out details: https://thehackernews.com/2025/02/asyncrat-campaign-uses-python-payloads.html
π10π€7β‘1π1
π¨ Vulnerability Assessments Soar in 2024. 24% of organizations now conduct assessments more than 4 times a yearβup from 15% in 2023!
This shift to continuous monitoring means faster responses to threats and stronger defenses.
How is your organization keeping up? π Explore the full report now: https://thehackernews.com/2025/02/navigating-future-key-it-vulnerability.html
This shift to continuous monitoring means faster responses to threats and stronger defenses.
How is your organization keeping up? π Explore the full report now: https://thehackernews.com/2025/02/navigating-future-key-it-vulnerability.html
π10β‘3π1
π Security Alert for Veeam Users! CVE-2025-23114 has a CVSS score of 9.0.
This new critical Man-in-the-Middle attack could allow hackers to execute arbitrary code on your servers.
β Fix is Available! Check out the details here: https://thehackernews.com/2025/02/new-veeam-flaw-allows-arbitrary-code.html
This new critical Man-in-the-Middle attack could allow hackers to execute arbitrary code on your servers.
β Fix is Available! Check out the details here: https://thehackernews.com/2025/02/new-veeam-flaw-allows-arbitrary-code.html
π8β‘2π€2
π Silent Lynx's Multi-Stage Attack Exposed: Targeting Embassies, Law Firms, and Banking Institutions
The group leverages RAR files, C++ binaries, and PowerShell scripts to infiltrate systems and exfiltrate sensitive data.
Read the full article here: https://thehackernews.com/2025/02/silent-lynx-using-powershell-golang-and.html
The group leverages RAR files, C++ binaries, and PowerShell scripts to infiltrate systems and exfiltrate sensitive data.
Read the full article here: https://thehackernews.com/2025/02/silent-lynx-using-powershell-golang-and.html
π€―9β‘6
π Hackers are exploiting tools like Axios and Node Fetch to take over Microsoft 365 accountsβtargeting high-value employees across industries like finance, healthcare, and IT.
Attack volume spiked to over 13 million login attempts in one password spraying campaign.
Read the full report: https://thehackernews.com/2025/02/cybercriminals-use-axios-and-node-fetch.html
Attack volume spiked to over 13 million login attempts in one password spraying campaign.
Read the full report: https://thehackernews.com/2025/02/cybercriminals-use-axios-and-node-fetch.html
π8π₯7β‘5π±3
π¨ WARNING: Infamous North Korea-linked Lazarus Group is using fake job offers to spread cross-platform malwareβtargeting crypto and travel industries.
π‘βοΈ Fake recruiter offers remote positions in crypto/travel
π Victims send personal info (CVs, GitHub links)
βΌοΈ Attackers deploy a JavaScript data stealer and Python backdoor
This is a complex attack chain that can give attackers persistent remote access to your systems.
Learn more: https://thehackernews.com/2025/02/cross-platform-javascript-stealer.html
π‘βοΈ Fake recruiter offers remote positions in crypto/travel
π Victims send personal info (CVs, GitHub links)
βΌοΈ Attackers deploy a JavaScript data stealer and Python backdoor
This is a complex attack chain that can give attackers persistent remote access to your systems.
Learn more: https://thehackernews.com/2025/02/cross-platform-javascript-stealer.html
π14π€―11β‘8π6
π΄ Hacktivism has evolved β from political protest to full-blown cyber warfare. The latest surge in DDoS attacks is shaking both the public and private sectors.
These attacks are not just about disruptionβthey're designed to manipulate public opinion and disrupt elections. Now's the time to be aware.
Want to know how geopolitics is shaping the cyber landscape? Read the full analysis now:
https://thehackernews.com/expert-insights/2025/02/hacking-in-name-of.html
These attacks are not just about disruptionβthey're designed to manipulate public opinion and disrupt elections. Now's the time to be aware.
Want to know how geopolitics is shaping the cyber landscape? Read the full analysis now:
https://thehackernews.com/expert-insights/2025/02/hacking-in-name-of.html
π₯20π10π4β‘2π€2
π Cisco just patched two critical vulnerabilities in Identity Services Engine (ISE) that could allow attackers to execute arbitrary commands and escalate privileges remotely.
β οΈ CVE-2025-20124 & CVE-2025-20125 carry CVSS scores of 9.9 and 9.1.
Read β https://thehackernews.com/2025/02/cisco-patches-critical-ise.html
β οΈ CVE-2025-20124 & CVE-2025-20125 carry CVSS scores of 9.9 and 9.1.
Read β https://thehackernews.com/2025/02/cisco-patches-critical-ise.html
π17π₯4π2π1