π¨ URGENT: Attackers are exploiting newly discovered flaws in SimpleHelp RMM software to establish persistent access to networks and deploy ransomware.
CVE-2024-57726, CVE-2024-57727, CVE-2024-57728: Flaws enabling privilege escalation, remote code execution.
π Secure your systems and read the full details: https://thehackernews.com/2025/02/hackers-exploit-simplehelp-rmm-flaws.html
CVE-2024-57726, CVE-2024-57727, CVE-2024-57728: Flaws enabling privilege escalation, remote code execution.
π Secure your systems and read the full details: https://thehackernews.com/2025/02/hackers-exploit-simplehelp-rmm-flaws.html
π₯15π7β‘2π2π€―2
The RBI is introducing a dedicated "bank[.]in" domain to combat digital fraud and secure digital transactions.
Read the full article: https://thehackernews.com/2025/02/indias-rbi-introduces-exclusive-bankin.html
Read the full article: https://thehackernews.com/2025/02/indias-rbi-introduces-exclusive-bankin.html
π₯8π5β‘3π€2π€―2π1
π¨ Alert: Publicly exposed ASP'NET machine keys could give attackers an easy way to infiltrate your systems.
π Over 3,000 keys are now available for exploitation. Microsoft reveals how attackers can inject malicious code using these keys to gain remote code execution.
π Read full article: https://thehackernews.com/2025/02/microsoft-identifies-3000-publicly.html
π Over 3,000 keys are now available for exploitation. Microsoft reveals how attackers can inject malicious code using these keys to gain remote code execution.
π Read full article: https://thehackernews.com/2025/02/microsoft-identifies-3000-publicly.html
π₯9β‘6π5π3π1
π¨ CISA warns of active exploitation in Trimble Cityworks GIS software, with a high-severity vulnerability (CVE-2025-0994, CVSS 8.6) being weaponized in the wild.
If left unpatched, attackers could gain unauthorized access and deploy harmful payloads like Cobalt Strike and VShell.
Read: https://thehackernews.com/2025/02/cisa-warns-of-active-exploitation-in.html
If left unpatched, attackers could gain unauthorized access and deploy harmful payloads like Cobalt Strike and VShell.
Read: https://thehackernews.com/2025/02/cisa-warns-of-active-exploitation-in.html
π8π4β‘2π₯1
π AI-Powered Social Engineering is Here β And It's Evolving FAST!
Criminals are automating and personalizing attacks, making them more effective than ever.
AI-generated phishing emails and deepfake CFOs are tricking employees into transferring millions.
π Learn how to equip your workforce to spot deception: https://thehackernews.com/2025/02/ai-powered-social-engineering.html
Criminals are automating and personalizing attacks, making them more effective than ever.
AI-generated phishing emails and deepfake CFOs are tricking employees into transferring millions.
π Learn how to equip your workforce to spot deception: https://thehackernews.com/2025/02/ai-powered-social-engineering.html
π18π€8β‘3π2
π DeepSeek's iOS app is transmitting sensitive user data without encryption to a cloud platform linked to ByteDance (TikTok), leaving it wide open to hackers.
π See the full story and analysis here: https://thehackernews.com/2025/02/deepseek-app-transmits-sensitive-user.html
π See the full story and analysis here: https://thehackernews.com/2025/02/deepseek-app-transmits-sensitive-user.html
π€―62π46π18β‘5π€5π4
β οΈ Researchers have uncovered two malicious ML models on Hugging Face using a new attack methodβ"broken" pickle filesβto bypass detection.
These models execute a reverse shell right from the start, connecting to a hard-coded IP.
π§ Learn more: https://thehackernews.com/2025/02/malicious-ml-models-found-on-hugging.html
These models execute a reverse shell right from the start, connecting to a hard-coded IP.
π§ Learn more: https://thehackernews.com/2025/02/malicious-ml-models-found-on-hugging.html
π21π±12π₯11π7π€5π€―4β‘2
π XE Group has evolved. Theyβre no longer just stealing credit card dataβtheyβre exploiting zero-day vulnerabilities (like CVE-2024-57968 in VeraCore) to target supply chains
Once in, they can drop reverse shells, exfiltrate files, and even modify data
https://thehackernews.com/2025/02/xe-hacker-group-exploits-veracore-zero.html
Once in, they can drop reverse shells, exfiltrate files, and even modify data
https://thehackernews.com/2025/02/xe-hacker-group-exploits-veracore-zero.html
π8π4π±3β‘2π€2
Zimbra's latest patch addresses three new vulnerabilities:
β’ SQL Injection (CVE-2025-25064) exposing email metadata to authenticated attackers.
β’ XSS vulnerability in the Classic Web Client, risking user security.
β’ SSRF flaw (CVE-2025-25065) allowing unauthorized redirection to internal systems.
Upgrade ASAP to avoid potential exploitation and secure your systems.
Read: https://thehackernews.com/2025/02/zimbra-releases-security-updates-for.html
β’ SQL Injection (CVE-2025-25064) exposing email metadata to authenticated attackers.
β’ XSS vulnerability in the Classic Web Client, risking user security.
β’ SSRF flaw (CVE-2025-25065) allowing unauthorized redirection to internal systems.
Upgrade ASAP to avoid potential exploitation and secure your systems.
Read: https://thehackernews.com/2025/02/zimbra-releases-security-updates-for.html
π₯13π6π3β‘1
A Chinese-speaking hacker group, DragonRank, is targeting IIS servers across Asia with BadIIS malware, redirecting users to rogue gambling sites.
Critical sectorsβgovernments, universities, and tech firmsβare at risk.
π Read more: https://thehackernews.com/2025/02/dragonrank-exploits-iis-servers-with.html
Critical sectorsβgovernments, universities, and tech firmsβare at risk.
π Read more: https://thehackernews.com/2025/02/dragonrank-exploits-iis-servers-with.html
π11π10π₯3π€3β‘2π€―1
π¨ This Week in Cyber: Hackers Are Getting SmarterβAre You?
πΉ AI-powered fraud is on the rise
πΉ Stolen ASP .NET keys fuel cyberattacks
πΉ Ransomware payouts drop, but attacks surge
πΉ Abandoned cloud storage = hacker goldmine
Stay ahead of the threats. Read the full recap now: https://thehackernews.com/2025/02/thn-weekly-recap-top-cybersecurity_10.html
πΉ AI-powered fraud is on the rise
πΉ Stolen ASP .NET keys fuel cyberattacks
πΉ Ransomware payouts drop, but attacks surge
πΉ Abandoned cloud storage = hacker goldmine
Stay ahead of the threats. Read the full recap now: https://thehackernews.com/2025/02/thn-weekly-recap-top-cybersecurity_10.html
π11β‘5π4
β οΈ WARNING: Hackers are using Google Tag Manager (GTM) to deliver credit card skimming malware on Magento e-commerce sites.
Targeting checkout pages to capture credit card details
3 sites found infected; it could be more
Learn more about this attack: https://thehackernews.com/2025/02/hackers-exploit-google-tag-manager-to.html
Targeting checkout pages to capture credit card details
3 sites found infected; it could be more
Learn more about this attack: https://thehackernews.com/2025/02/hackers-exploit-google-tag-manager-to.html
π22π10π₯8β‘5
π Apple has released emergency security updates for iOS and iPadOS to patch a vulnerability exploited in the wild.
This flaw, identified as CVE-2025-24200, could allow attackers to disable USB Restricted Mode on locked devices.
Update your devices now: https://thehackernews.com/2025/02/apple-patches-actively-exploited-ios.html
This flaw, identified as CVE-2025-24200, could allow attackers to disable USB Restricted Mode on locked devices.
Update your devices now: https://thehackernews.com/2025/02/apple-patches-actively-exploited-ios.html
π₯19π6β‘3π€2
π Think VPNs are enough? Think again. VPNs are a band-aid solutionβthey expose your network to new attack vectors. Attacks through VPNs can bypass security defenses like firewalls.
Want a better way to secure your network? Discover Zero Trust and how it reduces your risk.
Read more now: https://thehackernews.com/expert-insights/2025/02/eliminate-your-attack-surface-by.html
Want a better way to secure your network? Discover Zero Trust and how it reduces your risk.
Read more now: https://thehackernews.com/expert-insights/2025/02/eliminate-your-attack-surface-by.html
π15π₯7π€―7β‘4π±2
A global law enforcement operation has shut down the dark web data leak and negotiation sites tied to the notorious 8Base ransomware gang.
The seizure of over 40 pieces of evidence signals serious progress in the fight against cybercrime.
Find out more: https://thehackernews.com/2025/02/8base-ransomware-data-leak-sites-seized.html
The seizure of over 40 pieces of evidence signals serious progress in the fight against cybercrime.
Find out more: https://thehackernews.com/2025/02/8base-ransomware-data-leak-sites-seized.html
π12π±8β‘7π5π€1
π¨ Cybercriminals are using the ClickFix technique to deliver NetSupport RATβa powerful malware that gives attackers full control over your device.
Fake CAPTCHA pages are injecting malicious PowerShell commands to deploy the malware.
Learn more: https://thehackernews.com/2025/02/threat-actors-exploit-clickfix-to.html
Fake CAPTCHA pages are injecting malicious PowerShell commands to deploy the malware.
Learn more: https://thehackernews.com/2025/02/threat-actors-exploit-clickfix-to.html
π₯13β‘5π5
π¨ DDoS Attacks Skyrocket by 56%β2 Tbps Peak!
The largest DDoS attack ever recorded hit a shocking 2 Tbps in Q3βQ4 2024, marking an 18% increase from the previous record.
Learn how to protect your organization from the rising tide of DDoS threats
Read: https://thehackernews.com/2025/02/gcore-ddos-radar-reveals-56-yoy.html
The largest DDoS attack ever recorded hit a shocking 2 Tbps in Q3βQ4 2024, marking an 18% increase from the previous record.
Learn how to protect your organization from the rising tide of DDoS threats
Read: https://thehackernews.com/2025/02/gcore-ddos-radar-reveals-56-yoy.html
π8π€―4β‘3
π Progress Software has patched high-severity vulnerabilities in its LoadMaster software. These flaws could let hackers execute commands or download sensitive files.
Act now: Update to version 7.2.61.0 or higher to fix these critical flaws.
Learn more: https://thehackernews.com/2025/02/progress-software-patches-high-severity.html
Act now: Update to version 7.2.61.0 or higher to fix these critical flaws.
Learn more: https://thehackernews.com/2025/02/progress-software-patches-high-severity.html
π5π₯4β‘2
π¨ MFA is more critical than everβbut it's NOT without its challenges.
The price of implementing MFA goes beyond just subscriptions. Training, support, and help desk calls add up.
Learn how to make MFA work for your business without the sticker shock: https://thehackernews.com/2025/02/4-ways-to-keep-mfa-from-becoming-too.html
The price of implementing MFA goes beyond just subscriptions. Training, support, and help desk calls add up.
Learn how to make MFA work for your business without the sticker shock: https://thehackernews.com/2025/02/4-ways-to-keep-mfa-from-becoming-too.html
π13β‘2π2
π¬ Industry-first report examines the relationship between remediation delays and incidents, based on insights from over 150 security decision makers in large U.S. enterprises.
Some key findings:
β‘ Over 62% of incidents are directly related to backlogged risks that the security team was already fully aware of.
β‘ It takes organizations 10X longer to remediate vulnerabilities than it takes for attackers to exploit them.
Get ZEST Security's full report here: https://thn.news/cloud-risk-impact-2025
Some key findings:
β‘ Over 62% of incidents are directly related to backlogged risks that the security team was already fully aware of.
β‘ It takes organizations 10X longer to remediate vulnerabilities than it takes for attackers to exploit them.
Get ZEST Security's full report here: https://thn.news/cloud-risk-impact-2025
π5π4β‘2