The Hacker News
βœ”
152K subscribers
1.87K photos
10 videos
3 files
7.79K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
πŸ›‘ Cisco just patched two critical vulnerabilities in Identity Services Engine (ISE) that could allow attackers to execute arbitrary commands and escalate privileges remotely.

⚠️ CVE-2025-20124 & CVE-2025-20125 carry CVSS scores of 9.9 and 9.1.

Read β€” https://thehackernews.com/2025/02/cisco-patches-critical-ise.html
😁17πŸ”₯4πŸ‘2πŸ‘1
πŸ›‘ North Korea-linked Kimsuky hacking group now using forceCopy, a new info-stealer malware targeting browser credentials.

Spear-phishing emails trick victims into opening disguised Windows shortcut files. PowerShell and mshta.exe trigger malware download, leading to deeper infection.

πŸ‘‰ Read More: https://thehackernews.com/2025/02/north-korean-apt-kimsuky-uses-lnk-files.html
πŸ‘8πŸ€”7⚑3😁3πŸ‘1
🚨 New malware campaign "SparkCat" has been discovered on Apple and Google app stores, using OCR to target crypto wallet recovery phrases.

Read the full report: https://thehackernews.com/2025/02/sparkcat-malware-uses-ocr-to-extract.html
πŸ€”12🀯6😁4πŸ‘1
Ransomware is hitting harder in 2025. Hackers demand millionsβ€”and paying up doesn’t guarantee you’ll get your data back.

LockBit, Lynx, and Virlockβ€”ransomware groups are evolving, targeting everyone from small businesses to critical infrastructure.

Get the full breakdown on how to defend against these threats.: https://thehackernews.com/2025/02/top-3-ransomware-threats-active-in-2025.html
πŸ‘14⚑8πŸ€”3πŸ”₯2
PAM isn’t just a cybersecurity tool. It’s a game-changer for operational efficiency, compliance & security.

β€’ Enforces the principle of least privilege
β€’ Boosts regulatory compliance
β€’ Protects from evolving threats

Don’t miss out on this essential shift in cybersecurity leadership.

Read: https://thehackernews.com/2025/02/the-evolving-role-of-pam-in.html
πŸ‘8πŸ”₯7πŸ‘1🀯1
⚠️ Big names like LockBit and BlackCat are collapsing, but smaller players are multiplying. Cybercriminals raked in $813.5M from ransomware in 2024β€”a sharp drop from $1.25B in 2023.

Smaller, faster, and more dangerousβ€”ransomware just got a whole lot trickier.

Get the full insights: https://thehackernews.com/2025/02/ransomware-extortion-drops-to-8135m-in.html
🀯11πŸ‘4πŸ”₯2😱1
Bogus websites masquerading as Google Chrome are now distributing ValleyRATβ€”an evolving remote access trojan.

Targeting high-value roles in finance, accounting, and sales, this threat actorβ€”Silver Foxβ€”strategically targets sensitive systems.

Read the full report: https://thehackernews.com/2025/02/fake-google-chrome-sites-distribute.html
πŸ‘10πŸ”₯8⚑6πŸ‘3😁1
🚨 URGENT: Attackers are exploiting newly discovered flaws in SimpleHelp RMM software to establish persistent access to networks and deploy ransomware.

CVE-2024-57726, CVE-2024-57727, CVE-2024-57728: Flaws enabling privilege escalation, remote code execution.

πŸ‘‰ Secure your systems and read the full details: https://thehackernews.com/2025/02/hackers-exploit-simplehelp-rmm-flaws.html
πŸ”₯15πŸ‘7⚑2😁2🀯2
The RBI is introducing a dedicated "bank[.]in" domain to combat digital fraud and secure digital transactions.

Read the full article: https://thehackernews.com/2025/02/indias-rbi-introduces-exclusive-bankin.html
πŸ”₯8πŸ‘5⚑3πŸ€”2🀯2😁1
🚨 Alert: Publicly exposed ASP'NET machine keys could give attackers an easy way to infiltrate your systems.

πŸ”‘ Over 3,000 keys are now available for exploitation. Microsoft reveals how attackers can inject malicious code using these keys to gain remote code execution.

πŸ”— Read full article: https://thehackernews.com/2025/02/microsoft-identifies-3000-publicly.html
πŸ”₯9⚑6πŸ‘5πŸ‘3😁1
🚨 CISA warns of active exploitation in Trimble Cityworks GIS software, with a high-severity vulnerability (CVE-2025-0994, CVSS 8.6) being weaponized in the wild.

If left unpatched, attackers could gain unauthorized access and deploy harmful payloads like Cobalt Strike and VShell.

Read: https://thehackernews.com/2025/02/cisa-warns-of-active-exploitation-in.html
πŸ‘8😁4⚑2πŸ”₯1
πŸ”’ AI-Powered Social Engineering is Here – And It's Evolving FAST!

Criminals are automating and personalizing attacks, making them more effective than ever.

AI-generated phishing emails and deepfake CFOs are tricking employees into transferring millions.

πŸ‘‰ Learn how to equip your workforce to spot deception: https://thehackernews.com/2025/02/ai-powered-social-engineering.html
πŸ‘18πŸ€”8⚑3😁2
πŸ›‘ DeepSeek's iOS app is transmitting sensitive user data without encryption to a cloud platform linked to ByteDance (TikTok), leaving it wide open to hackers.

πŸ‘‰ See the full story and analysis here: https://thehackernews.com/2025/02/deepseek-app-transmits-sensitive-user.html
🀯62😁46πŸ‘18⚑5πŸ€”5πŸ‘4
⚠️ Researchers have uncovered two malicious ML models on Hugging Face using a new attack methodβ€”"broken" pickle filesβ€”to bypass detection.

These models execute a reverse shell right from the start, connecting to a hard-coded IP.

πŸ”§ Learn more: https://thehackernews.com/2025/02/malicious-ml-models-found-on-hugging.html
😁21😱12πŸ”₯11πŸ‘7πŸ€”5🀯4⚑2
πŸ›‘ XE Group has evolved. They’re no longer just stealing credit card dataβ€”they’re exploiting zero-day vulnerabilities (like CVE-2024-57968 in VeraCore) to target supply chains

Once in, they can drop reverse shells, exfiltrate files, and even modify data

https://thehackernews.com/2025/02/xe-hacker-group-exploits-veracore-zero.html
😁8πŸ‘4😱3⚑2πŸ€”2
Zimbra's latest patch addresses three new vulnerabilities:

β€’ SQL Injection (CVE-2025-25064) exposing email metadata to authenticated attackers.
β€’ XSS vulnerability in the Classic Web Client, risking user security.
β€’ SSRF flaw (CVE-2025-25065) allowing unauthorized redirection to internal systems.

Upgrade ASAP to avoid potential exploitation and secure your systems.

Read: https://thehackernews.com/2025/02/zimbra-releases-security-updates-for.html
πŸ”₯13πŸ‘6😁3⚑1
A Chinese-speaking hacker group, DragonRank, is targeting IIS servers across Asia with BadIIS malware, redirecting users to rogue gambling sites.

Critical sectorsβ€”governments, universities, and tech firmsβ€”are at risk.

πŸ”— Read more: https://thehackernews.com/2025/02/dragonrank-exploits-iis-servers-with.html
πŸ‘11😁10πŸ”₯3πŸ€”3⚑2🀯1
🚨 This Week in Cyber: Hackers Are Getting Smarterβ€”Are You?

πŸ”Ή AI-powered fraud is on the rise
πŸ”Ή Stolen ASP .NET keys fuel cyberattacks
πŸ”Ή Ransomware payouts drop, but attacks surge
πŸ”Ή Abandoned cloud storage = hacker goldmine

Stay ahead of the threats. Read the full recap now: https://thehackernews.com/2025/02/thn-weekly-recap-top-cybersecurity_10.html
πŸ‘11⚑5πŸ‘4
⚠️ WARNING: Hackers are using Google Tag Manager (GTM) to deliver credit card skimming malware on Magento e-commerce sites.

Targeting checkout pages to capture credit card details
3 sites found infected; it could be more

Learn more about this attack: https://thehackernews.com/2025/02/hackers-exploit-google-tag-manager-to.html
πŸ‘22😁10πŸ”₯8⚑5
πŸ›‘ Apple has released emergency security updates for iOS and iPadOS to patch a vulnerability exploited in the wild.

This flaw, identified as CVE-2025-24200, could allow attackers to disable USB Restricted Mode on locked devices.

Update your devices now: https://thehackernews.com/2025/02/apple-patches-actively-exploited-ios.html
πŸ”₯19πŸ‘6⚑3πŸ€”2