๐จ New malware campaign "SparkCat" has been discovered on Apple and Google app stores, using OCR to target crypto wallet recovery phrases.
Read the full report: https://thehackernews.com/2025/02/sparkcat-malware-uses-ocr-to-extract.html
Read the full report: https://thehackernews.com/2025/02/sparkcat-malware-uses-ocr-to-extract.html
๐ค12๐คฏ6๐4๐1
Ransomware is hitting harder in 2025. Hackers demand millionsโand paying up doesnโt guarantee youโll get your data back.
LockBit, Lynx, and Virlockโransomware groups are evolving, targeting everyone from small businesses to critical infrastructure.
Get the full breakdown on how to defend against these threats.: https://thehackernews.com/2025/02/top-3-ransomware-threats-active-in-2025.html
LockBit, Lynx, and Virlockโransomware groups are evolving, targeting everyone from small businesses to critical infrastructure.
Get the full breakdown on how to defend against these threats.: https://thehackernews.com/2025/02/top-3-ransomware-threats-active-in-2025.html
๐14โก8๐ค3๐ฅ2
PAM isnโt just a cybersecurity tool. Itโs a game-changer for operational efficiency, compliance & security.
โข Enforces the principle of least privilege
โข Boosts regulatory compliance
โข Protects from evolving threats
Donโt miss out on this essential shift in cybersecurity leadership.
Read: https://thehackernews.com/2025/02/the-evolving-role-of-pam-in.html
โข Enforces the principle of least privilege
โข Boosts regulatory compliance
โข Protects from evolving threats
Donโt miss out on this essential shift in cybersecurity leadership.
Read: https://thehackernews.com/2025/02/the-evolving-role-of-pam-in.html
๐8๐ฅ7๐1๐คฏ1
โ ๏ธ Big names like LockBit and BlackCat are collapsing, but smaller players are multiplying. Cybercriminals raked in $813.5M from ransomware in 2024โa sharp drop from $1.25B in 2023.
Smaller, faster, and more dangerousโransomware just got a whole lot trickier.
Get the full insights: https://thehackernews.com/2025/02/ransomware-extortion-drops-to-8135m-in.html
Smaller, faster, and more dangerousโransomware just got a whole lot trickier.
Get the full insights: https://thehackernews.com/2025/02/ransomware-extortion-drops-to-8135m-in.html
๐คฏ11๐4๐ฅ2๐ฑ1
Bogus websites masquerading as Google Chrome are now distributing ValleyRATโan evolving remote access trojan.
Targeting high-value roles in finance, accounting, and sales, this threat actorโSilver Foxโstrategically targets sensitive systems.
Read the full report: https://thehackernews.com/2025/02/fake-google-chrome-sites-distribute.html
Targeting high-value roles in finance, accounting, and sales, this threat actorโSilver Foxโstrategically targets sensitive systems.
Read the full report: https://thehackernews.com/2025/02/fake-google-chrome-sites-distribute.html
๐10๐ฅ8โก6๐3๐1
๐จ URGENT: Attackers are exploiting newly discovered flaws in SimpleHelp RMM software to establish persistent access to networks and deploy ransomware.
CVE-2024-57726, CVE-2024-57727, CVE-2024-57728: Flaws enabling privilege escalation, remote code execution.
๐ Secure your systems and read the full details: https://thehackernews.com/2025/02/hackers-exploit-simplehelp-rmm-flaws.html
CVE-2024-57726, CVE-2024-57727, CVE-2024-57728: Flaws enabling privilege escalation, remote code execution.
๐ Secure your systems and read the full details: https://thehackernews.com/2025/02/hackers-exploit-simplehelp-rmm-flaws.html
๐ฅ15๐7โก2๐2๐คฏ2
The RBI is introducing a dedicated "bank[.]in" domain to combat digital fraud and secure digital transactions.
Read the full article: https://thehackernews.com/2025/02/indias-rbi-introduces-exclusive-bankin.html
Read the full article: https://thehackernews.com/2025/02/indias-rbi-introduces-exclusive-bankin.html
๐ฅ8๐5โก3๐ค2๐คฏ2๐1
๐จ Alert: Publicly exposed ASP'NET machine keys could give attackers an easy way to infiltrate your systems.
๐ Over 3,000 keys are now available for exploitation. Microsoft reveals how attackers can inject malicious code using these keys to gain remote code execution.
๐ Read full article: https://thehackernews.com/2025/02/microsoft-identifies-3000-publicly.html
๐ Over 3,000 keys are now available for exploitation. Microsoft reveals how attackers can inject malicious code using these keys to gain remote code execution.
๐ Read full article: https://thehackernews.com/2025/02/microsoft-identifies-3000-publicly.html
๐ฅ9โก6๐5๐3๐1
๐จ CISA warns of active exploitation in Trimble Cityworks GIS software, with a high-severity vulnerability (CVE-2025-0994, CVSS 8.6) being weaponized in the wild.
If left unpatched, attackers could gain unauthorized access and deploy harmful payloads like Cobalt Strike and VShell.
Read: https://thehackernews.com/2025/02/cisa-warns-of-active-exploitation-in.html
If left unpatched, attackers could gain unauthorized access and deploy harmful payloads like Cobalt Strike and VShell.
Read: https://thehackernews.com/2025/02/cisa-warns-of-active-exploitation-in.html
๐8๐4โก2๐ฅ1
๐ AI-Powered Social Engineering is Here โ And It's Evolving FAST!
Criminals are automating and personalizing attacks, making them more effective than ever.
AI-generated phishing emails and deepfake CFOs are tricking employees into transferring millions.
๐ Learn how to equip your workforce to spot deception: https://thehackernews.com/2025/02/ai-powered-social-engineering.html
Criminals are automating and personalizing attacks, making them more effective than ever.
AI-generated phishing emails and deepfake CFOs are tricking employees into transferring millions.
๐ Learn how to equip your workforce to spot deception: https://thehackernews.com/2025/02/ai-powered-social-engineering.html
๐18๐ค8โก3๐2
๐ DeepSeek's iOS app is transmitting sensitive user data without encryption to a cloud platform linked to ByteDance (TikTok), leaving it wide open to hackers.
๐ See the full story and analysis here: https://thehackernews.com/2025/02/deepseek-app-transmits-sensitive-user.html
๐ See the full story and analysis here: https://thehackernews.com/2025/02/deepseek-app-transmits-sensitive-user.html
๐คฏ62๐46๐18โก5๐ค5๐4
โ ๏ธ Researchers have uncovered two malicious ML models on Hugging Face using a new attack methodโ"broken" pickle filesโto bypass detection.
These models execute a reverse shell right from the start, connecting to a hard-coded IP.
๐ง Learn more: https://thehackernews.com/2025/02/malicious-ml-models-found-on-hugging.html
These models execute a reverse shell right from the start, connecting to a hard-coded IP.
๐ง Learn more: https://thehackernews.com/2025/02/malicious-ml-models-found-on-hugging.html
๐21๐ฑ12๐ฅ11๐7๐ค5๐คฏ4โก2
๐ XE Group has evolved. Theyโre no longer just stealing credit card dataโtheyโre exploiting zero-day vulnerabilities (like CVE-2024-57968 in VeraCore) to target supply chains
Once in, they can drop reverse shells, exfiltrate files, and even modify data
https://thehackernews.com/2025/02/xe-hacker-group-exploits-veracore-zero.html
Once in, they can drop reverse shells, exfiltrate files, and even modify data
https://thehackernews.com/2025/02/xe-hacker-group-exploits-veracore-zero.html
๐8๐4๐ฑ3โก2๐ค2
Zimbra's latest patch addresses three new vulnerabilities:
โข SQL Injection (CVE-2025-25064) exposing email metadata to authenticated attackers.
โข XSS vulnerability in the Classic Web Client, risking user security.
โข SSRF flaw (CVE-2025-25065) allowing unauthorized redirection to internal systems.
Upgrade ASAP to avoid potential exploitation and secure your systems.
Read: https://thehackernews.com/2025/02/zimbra-releases-security-updates-for.html
โข SQL Injection (CVE-2025-25064) exposing email metadata to authenticated attackers.
โข XSS vulnerability in the Classic Web Client, risking user security.
โข SSRF flaw (CVE-2025-25065) allowing unauthorized redirection to internal systems.
Upgrade ASAP to avoid potential exploitation and secure your systems.
Read: https://thehackernews.com/2025/02/zimbra-releases-security-updates-for.html
๐ฅ13๐6๐3โก1
A Chinese-speaking hacker group, DragonRank, is targeting IIS servers across Asia with BadIIS malware, redirecting users to rogue gambling sites.
Critical sectorsโgovernments, universities, and tech firmsโare at risk.
๐ Read more: https://thehackernews.com/2025/02/dragonrank-exploits-iis-servers-with.html
Critical sectorsโgovernments, universities, and tech firmsโare at risk.
๐ Read more: https://thehackernews.com/2025/02/dragonrank-exploits-iis-servers-with.html
๐11๐10๐ฅ3๐ค3โก2๐คฏ1
๐จ This Week in Cyber: Hackers Are Getting SmarterโAre You?
๐น AI-powered fraud is on the rise
๐น Stolen ASP .NET keys fuel cyberattacks
๐น Ransomware payouts drop, but attacks surge
๐น Abandoned cloud storage = hacker goldmine
Stay ahead of the threats. Read the full recap now: https://thehackernews.com/2025/02/thn-weekly-recap-top-cybersecurity_10.html
๐น AI-powered fraud is on the rise
๐น Stolen ASP .NET keys fuel cyberattacks
๐น Ransomware payouts drop, but attacks surge
๐น Abandoned cloud storage = hacker goldmine
Stay ahead of the threats. Read the full recap now: https://thehackernews.com/2025/02/thn-weekly-recap-top-cybersecurity_10.html
๐11โก5๐4
โ ๏ธ WARNING: Hackers are using Google Tag Manager (GTM) to deliver credit card skimming malware on Magento e-commerce sites.
Targeting checkout pages to capture credit card details
3 sites found infected; it could be more
Learn more about this attack: https://thehackernews.com/2025/02/hackers-exploit-google-tag-manager-to.html
Targeting checkout pages to capture credit card details
3 sites found infected; it could be more
Learn more about this attack: https://thehackernews.com/2025/02/hackers-exploit-google-tag-manager-to.html
๐22๐10๐ฅ8โก5
๐ Apple has released emergency security updates for iOS and iPadOS to patch a vulnerability exploited in the wild.
This flaw, identified as CVE-2025-24200, could allow attackers to disable USB Restricted Mode on locked devices.
Update your devices now: https://thehackernews.com/2025/02/apple-patches-actively-exploited-ios.html
This flaw, identified as CVE-2025-24200, could allow attackers to disable USB Restricted Mode on locked devices.
Update your devices now: https://thehackernews.com/2025/02/apple-patches-actively-exploited-ios.html
๐ฅ19๐6โก3๐ค2
๐ Think VPNs are enough? Think again. VPNs are a band-aid solutionโthey expose your network to new attack vectors. Attacks through VPNs can bypass security defenses like firewalls.
Want a better way to secure your network? Discover Zero Trust and how it reduces your risk.
Read more now: https://thehackernews.com/expert-insights/2025/02/eliminate-your-attack-surface-by.html
Want a better way to secure your network? Discover Zero Trust and how it reduces your risk.
Read more now: https://thehackernews.com/expert-insights/2025/02/eliminate-your-attack-surface-by.html
๐15๐ฅ7๐คฏ7โก4๐ฑ2
A global law enforcement operation has shut down the dark web data leak and negotiation sites tied to the notorious 8Base ransomware gang.
The seizure of over 40 pieces of evidence signals serious progress in the fight against cybercrime.
Find out more: https://thehackernews.com/2025/02/8base-ransomware-data-leak-sites-seized.html
The seizure of over 40 pieces of evidence signals serious progress in the fight against cybercrime.
Find out more: https://thehackernews.com/2025/02/8base-ransomware-data-leak-sites-seized.html
๐12๐ฑ8โก7๐5๐ค1