๐ Security Alert for Veeam Users! CVE-2025-23114 has a CVSS score of 9.0.
This new critical Man-in-the-Middle attack could allow hackers to execute arbitrary code on your servers.
โ Fix is Available! Check out the details here: https://thehackernews.com/2025/02/new-veeam-flaw-allows-arbitrary-code.html
This new critical Man-in-the-Middle attack could allow hackers to execute arbitrary code on your servers.
โ Fix is Available! Check out the details here: https://thehackernews.com/2025/02/new-veeam-flaw-allows-arbitrary-code.html
๐8โก2๐ค2
๐ Silent Lynx's Multi-Stage Attack Exposed: Targeting Embassies, Law Firms, and Banking Institutions
The group leverages RAR files, C++ binaries, and PowerShell scripts to infiltrate systems and exfiltrate sensitive data.
Read the full article here: https://thehackernews.com/2025/02/silent-lynx-using-powershell-golang-and.html
The group leverages RAR files, C++ binaries, and PowerShell scripts to infiltrate systems and exfiltrate sensitive data.
Read the full article here: https://thehackernews.com/2025/02/silent-lynx-using-powershell-golang-and.html
๐คฏ9โก6
๐ Hackers are exploiting tools like Axios and Node Fetch to take over Microsoft 365 accountsโtargeting high-value employees across industries like finance, healthcare, and IT.
Attack volume spiked to over 13 million login attempts in one password spraying campaign.
Read the full report: https://thehackernews.com/2025/02/cybercriminals-use-axios-and-node-fetch.html
Attack volume spiked to over 13 million login attempts in one password spraying campaign.
Read the full report: https://thehackernews.com/2025/02/cybercriminals-use-axios-and-node-fetch.html
๐8๐ฅ7โก5๐ฑ3
๐จ WARNING: Infamous North Korea-linked Lazarus Group is using fake job offers to spread cross-platform malwareโtargeting crypto and travel industries.
๐กโ๏ธ Fake recruiter offers remote positions in crypto/travel
๐ Victims send personal info (CVs, GitHub links)
โผ๏ธ Attackers deploy a JavaScript data stealer and Python backdoor
This is a complex attack chain that can give attackers persistent remote access to your systems.
Learn more: https://thehackernews.com/2025/02/cross-platform-javascript-stealer.html
๐กโ๏ธ Fake recruiter offers remote positions in crypto/travel
๐ Victims send personal info (CVs, GitHub links)
โผ๏ธ Attackers deploy a JavaScript data stealer and Python backdoor
This is a complex attack chain that can give attackers persistent remote access to your systems.
Learn more: https://thehackernews.com/2025/02/cross-platform-javascript-stealer.html
๐14๐คฏ11โก8๐6
๐ด Hacktivism has evolved โ from political protest to full-blown cyber warfare. The latest surge in DDoS attacks is shaking both the public and private sectors.
These attacks are not just about disruptionโthey're designed to manipulate public opinion and disrupt elections. Now's the time to be aware.
Want to know how geopolitics is shaping the cyber landscape? Read the full analysis now:
https://thehackernews.com/expert-insights/2025/02/hacking-in-name-of.html
These attacks are not just about disruptionโthey're designed to manipulate public opinion and disrupt elections. Now's the time to be aware.
Want to know how geopolitics is shaping the cyber landscape? Read the full analysis now:
https://thehackernews.com/expert-insights/2025/02/hacking-in-name-of.html
๐ฅ20๐10๐4โก2๐ค2
๐ Cisco just patched two critical vulnerabilities in Identity Services Engine (ISE) that could allow attackers to execute arbitrary commands and escalate privileges remotely.
โ ๏ธ CVE-2025-20124 & CVE-2025-20125 carry CVSS scores of 9.9 and 9.1.
Read โ https://thehackernews.com/2025/02/cisco-patches-critical-ise.html
โ ๏ธ CVE-2025-20124 & CVE-2025-20125 carry CVSS scores of 9.9 and 9.1.
Read โ https://thehackernews.com/2025/02/cisco-patches-critical-ise.html
๐17๐ฅ4๐2๐1
๐ North Korea-linked Kimsuky hacking group now using forceCopy, a new info-stealer malware targeting browser credentials.
Spear-phishing emails trick victims into opening disguised Windows shortcut files. PowerShell and mshta.exe trigger malware download, leading to deeper infection.
๐ Read More: https://thehackernews.com/2025/02/north-korean-apt-kimsuky-uses-lnk-files.html
Spear-phishing emails trick victims into opening disguised Windows shortcut files. PowerShell and mshta.exe trigger malware download, leading to deeper infection.
๐ Read More: https://thehackernews.com/2025/02/north-korean-apt-kimsuky-uses-lnk-files.html
๐8๐ค7โก3๐3๐1
๐จ New malware campaign "SparkCat" has been discovered on Apple and Google app stores, using OCR to target crypto wallet recovery phrases.
Read the full report: https://thehackernews.com/2025/02/sparkcat-malware-uses-ocr-to-extract.html
Read the full report: https://thehackernews.com/2025/02/sparkcat-malware-uses-ocr-to-extract.html
๐ค12๐คฏ6๐4๐1
Ransomware is hitting harder in 2025. Hackers demand millionsโand paying up doesnโt guarantee youโll get your data back.
LockBit, Lynx, and Virlockโransomware groups are evolving, targeting everyone from small businesses to critical infrastructure.
Get the full breakdown on how to defend against these threats.: https://thehackernews.com/2025/02/top-3-ransomware-threats-active-in-2025.html
LockBit, Lynx, and Virlockโransomware groups are evolving, targeting everyone from small businesses to critical infrastructure.
Get the full breakdown on how to defend against these threats.: https://thehackernews.com/2025/02/top-3-ransomware-threats-active-in-2025.html
๐14โก8๐ค3๐ฅ2
PAM isnโt just a cybersecurity tool. Itโs a game-changer for operational efficiency, compliance & security.
โข Enforces the principle of least privilege
โข Boosts regulatory compliance
โข Protects from evolving threats
Donโt miss out on this essential shift in cybersecurity leadership.
Read: https://thehackernews.com/2025/02/the-evolving-role-of-pam-in.html
โข Enforces the principle of least privilege
โข Boosts regulatory compliance
โข Protects from evolving threats
Donโt miss out on this essential shift in cybersecurity leadership.
Read: https://thehackernews.com/2025/02/the-evolving-role-of-pam-in.html
๐8๐ฅ7๐1๐คฏ1
โ ๏ธ Big names like LockBit and BlackCat are collapsing, but smaller players are multiplying. Cybercriminals raked in $813.5M from ransomware in 2024โa sharp drop from $1.25B in 2023.
Smaller, faster, and more dangerousโransomware just got a whole lot trickier.
Get the full insights: https://thehackernews.com/2025/02/ransomware-extortion-drops-to-8135m-in.html
Smaller, faster, and more dangerousโransomware just got a whole lot trickier.
Get the full insights: https://thehackernews.com/2025/02/ransomware-extortion-drops-to-8135m-in.html
๐คฏ11๐4๐ฅ2๐ฑ1
Bogus websites masquerading as Google Chrome are now distributing ValleyRATโan evolving remote access trojan.
Targeting high-value roles in finance, accounting, and sales, this threat actorโSilver Foxโstrategically targets sensitive systems.
Read the full report: https://thehackernews.com/2025/02/fake-google-chrome-sites-distribute.html
Targeting high-value roles in finance, accounting, and sales, this threat actorโSilver Foxโstrategically targets sensitive systems.
Read the full report: https://thehackernews.com/2025/02/fake-google-chrome-sites-distribute.html
๐10๐ฅ8โก6๐3๐1
๐จ URGENT: Attackers are exploiting newly discovered flaws in SimpleHelp RMM software to establish persistent access to networks and deploy ransomware.
CVE-2024-57726, CVE-2024-57727, CVE-2024-57728: Flaws enabling privilege escalation, remote code execution.
๐ Secure your systems and read the full details: https://thehackernews.com/2025/02/hackers-exploit-simplehelp-rmm-flaws.html
CVE-2024-57726, CVE-2024-57727, CVE-2024-57728: Flaws enabling privilege escalation, remote code execution.
๐ Secure your systems and read the full details: https://thehackernews.com/2025/02/hackers-exploit-simplehelp-rmm-flaws.html
๐ฅ15๐7โก2๐2๐คฏ2
The RBI is introducing a dedicated "bank[.]in" domain to combat digital fraud and secure digital transactions.
Read the full article: https://thehackernews.com/2025/02/indias-rbi-introduces-exclusive-bankin.html
Read the full article: https://thehackernews.com/2025/02/indias-rbi-introduces-exclusive-bankin.html
๐ฅ8๐5โก3๐ค2๐คฏ2๐1
๐จ Alert: Publicly exposed ASP'NET machine keys could give attackers an easy way to infiltrate your systems.
๐ Over 3,000 keys are now available for exploitation. Microsoft reveals how attackers can inject malicious code using these keys to gain remote code execution.
๐ Read full article: https://thehackernews.com/2025/02/microsoft-identifies-3000-publicly.html
๐ Over 3,000 keys are now available for exploitation. Microsoft reveals how attackers can inject malicious code using these keys to gain remote code execution.
๐ Read full article: https://thehackernews.com/2025/02/microsoft-identifies-3000-publicly.html
๐ฅ9โก6๐5๐3๐1
๐จ CISA warns of active exploitation in Trimble Cityworks GIS software, with a high-severity vulnerability (CVE-2025-0994, CVSS 8.6) being weaponized in the wild.
If left unpatched, attackers could gain unauthorized access and deploy harmful payloads like Cobalt Strike and VShell.
Read: https://thehackernews.com/2025/02/cisa-warns-of-active-exploitation-in.html
If left unpatched, attackers could gain unauthorized access and deploy harmful payloads like Cobalt Strike and VShell.
Read: https://thehackernews.com/2025/02/cisa-warns-of-active-exploitation-in.html
๐8๐4โก2๐ฅ1
๐ AI-Powered Social Engineering is Here โ And It's Evolving FAST!
Criminals are automating and personalizing attacks, making them more effective than ever.
AI-generated phishing emails and deepfake CFOs are tricking employees into transferring millions.
๐ Learn how to equip your workforce to spot deception: https://thehackernews.com/2025/02/ai-powered-social-engineering.html
Criminals are automating and personalizing attacks, making them more effective than ever.
AI-generated phishing emails and deepfake CFOs are tricking employees into transferring millions.
๐ Learn how to equip your workforce to spot deception: https://thehackernews.com/2025/02/ai-powered-social-engineering.html
๐18๐ค8โก3๐2
๐ DeepSeek's iOS app is transmitting sensitive user data without encryption to a cloud platform linked to ByteDance (TikTok), leaving it wide open to hackers.
๐ See the full story and analysis here: https://thehackernews.com/2025/02/deepseek-app-transmits-sensitive-user.html
๐ See the full story and analysis here: https://thehackernews.com/2025/02/deepseek-app-transmits-sensitive-user.html
๐คฏ62๐46๐18โก5๐ค5๐4
โ ๏ธ Researchers have uncovered two malicious ML models on Hugging Face using a new attack methodโ"broken" pickle filesโto bypass detection.
These models execute a reverse shell right from the start, connecting to a hard-coded IP.
๐ง Learn more: https://thehackernews.com/2025/02/malicious-ml-models-found-on-hugging.html
These models execute a reverse shell right from the start, connecting to a hard-coded IP.
๐ง Learn more: https://thehackernews.com/2025/02/malicious-ml-models-found-on-hugging.html
๐21๐ฑ12๐ฅ11๐7๐ค5๐คฏ4โก2
๐ XE Group has evolved. Theyโre no longer just stealing credit card dataโtheyโre exploiting zero-day vulnerabilities (like CVE-2024-57968 in VeraCore) to target supply chains
Once in, they can drop reverse shells, exfiltrate files, and even modify data
https://thehackernews.com/2025/02/xe-hacker-group-exploits-veracore-zero.html
Once in, they can drop reverse shells, exfiltrate files, and even modify data
https://thehackernews.com/2025/02/xe-hacker-group-exploits-veracore-zero.html
๐8๐4๐ฑ3โก2๐ค2