β οΈ China-linked espionage group used PlugX malware and a Toshiba binary in a ransomware attack on a South Asian software company.
The attack exploited the CVE-2024-0012 vulnerability in Palo Alto Networks software.
π Read the full story to learn more: https://thehackernews.com/2025/02/hackers-exploited-pan-os-flaw-to-deploy.html
The attack exploited the CVE-2024-0012 vulnerability in Palo Alto Networks software.
π Read the full story to learn more: https://thehackernews.com/2025/02/hackers-exploited-pan-os-flaw-to-deploy.html
π7π4π±3
π Are last-minute security fixes slowing your releases? Is your team caught in a tug-of-war between speed and safety?
Our next cybersecurity webinar shows you how to:
β’ Bridge the gap between development and security
β’ Secure your code from the start
β’ Get actionable tips from Palo Alto Networks
Ready to learn? Register now: https://thehackernews.com/2025/02/fast-deployments-secure-code-watch-this.html
Our next cybersecurity webinar shows you how to:
β’ Bridge the gap between development and security
β’ Secure your code from the start
β’ Get actionable tips from Palo Alto Networks
Ready to learn? Register now: https://thehackernews.com/2025/02/fast-deployments-secure-code-watch-this.html
β‘5π5
π₯ Simplify Security & Boost Efficiency with Extensible CIAM!
An extensible CIAM solution strengthens security, improves user experience, and accelerates growth.
π Reduce identity-based threats
β‘ Speed up time-to-market with seamless integrations
β Ensure compliance without added complexity
Discover how CIAM transforms security and efficiency: https://thehackernews.com/expert-insights/2025/02/solving-identity-challenges-with.html
An extensible CIAM solution strengthens security, improves user experience, and accelerates growth.
π Reduce identity-based threats
β‘ Speed up time-to-market with seamless integrations
β Ensure compliance without added complexity
Discover how CIAM transforms security and efficiency: https://thehackernews.com/expert-insights/2025/02/solving-identity-challenges-with.html
π6π₯5
π North Korea-linked hackers are actively targeting South Koreaβs government, business, and cryptocurrency sectorsβusing Dropbox for payload distribution and data exfiltration.
β’ Short-lived, dynamic cloud infrastructure to evade tracking
β’ OAuth token authentication to seamlessly move data
β’ Multi-stage PowerShell execution to remain stealthy
π Read the full analysis: https://thehackernews.com/2025/02/north-korean-apt43-uses-powershell-and.html
β’ Short-lived, dynamic cloud infrastructure to evade tracking
β’ OAuth token authentication to seamlessly move data
β’ Multi-stage PowerShell execution to remain stealthy
π Read the full analysis: https://thehackernews.com/2025/02/north-korean-apt43-uses-powershell-and.html
π₯6π5π3π1
π¨ Enter your card details once? It βfails.β Try again? Still βfails.β Third time? Youβre sent to an error pageβbut the attackers now have everything they need.
Cybercriminals are using bogus PDFs on Webflow CDN to steal credit card details from unsuspecting users.
π Donβt fall for itβknow the warning signs: https://thehackernews.com/2025/02/hackers-use-captcha-trick-on-webflow.html
Cybercriminals are using bogus PDFs on Webflow CDN to steal credit card details from unsuspecting users.
π Donβt fall for itβknow the warning signs: https://thehackernews.com/2025/02/hackers-use-captcha-trick-on-webflow.html
π₯12π5β‘3π€―3π1
π AI is everywhereβand hackers are also using AI to run large-scale social engineering, create deepfakes, and exploit app vulnerabilities faster than ever.
How can we build AI securely while leveraging it for defense?
Find out in this latest analysis: https://thehackernews.com/2025/02/ai-and-security-new-puzzle-to-figure-out.html
How can we build AI securely while leveraging it for defense?
Find out in this latest analysis: https://thehackernews.com/2025/02/ai-and-security-new-puzzle-to-figure-out.html
π₯8π6π1
Struggling to filter the AI hype from actual threat? Check out the latest webinar from Push Security to learn how new AI Computer-Using Agents (no, not DeepSeek) can be used to automate identity attacks against SaaS through the kill chain, from Recon to Exfil π€π¨
Register now! https://thn.news/ai-attacks-webinar-tg
Register now! https://thn.news/ai-attacks-webinar-tg
π₯10π6π€1π€―1
π A dangerous combo attack has been discovered exploiting a PostgreSQL SQL injection flaw (CVE-2025-1094) and a BeyondTrust remote access bug (CVE-2024-12356).
π οΈ Patches available for both vulnerabilities.
π Read more and secure your systems NOW: https://thehackernews.com/2025/02/postgresql-vulnerability-exploited.html
π οΈ Patches available for both vulnerabilities.
π Read more and secure your systems NOW: https://thehackernews.com/2025/02/postgresql-vulnerability-exploited.html
π€13π4π€―2
π¨ WARNING: CVE-2025-0108 Under Active Exploitation
Palo Alto Networks PAN-OS is being targeted by attackers exploiting a newly patched authentication bypass flaw (CVE-2025-0108).
β Flaw allows unauthenticated attackers to execute specific PHP scripts.
β Exploitation attempts have been traced to IPs in U.S., China, and Israel.
π οΈ Patch now to prevent unauthorized access.
π Get the full details and patch guidance: https://thehackernews.com/2025/02/palo-alto-networks-patches.html
Palo Alto Networks PAN-OS is being targeted by attackers exploiting a newly patched authentication bypass flaw (CVE-2025-0108).
β Flaw allows unauthenticated attackers to execute specific PHP scripts.
β Exploitation attempts have been traced to IPs in U.S., China, and Israel.
π οΈ Patch now to prevent unauthorized access.
π Get the full details and patch guidance: https://thehackernews.com/2025/02/palo-alto-networks-patches.html
π14π4β‘3π€―1π±1
π¨ RansomHub, the most active ransomware group of 2024, has targeted over 600 organizations worldwide by exploiting flaws in Microsoft Active Directory and using brute-force attacks on VPNs to breach networks.
It also partners with LockBit & BlackCat to expand operations.
π Discover more about this evolving threat: https://thehackernews.com/2025/02/ransomhub-becomes-2024s-top-ransomware.html
It also partners with LockBit & BlackCat to expand operations.
π Discover more about this evolving threat: https://thehackernews.com/2025/02/ransomhub-becomes-2024s-top-ransomware.html
π€―12β‘5π₯5π3
β οΈ Microsoft warns of Russian-aligned hacker group Storm-2372 using 'device code phishing' to steal authentication tokens, gain persistent access, and infiltrate global sectors.
π― Targets: Government, IT, Defense, Health, Education, Energy
π Regions: Europe, North America, Africa, Middle East
π΅οΈββοΈ Tactics: Phishing via WhatsApp, Signal, Teams
π² Attack Method: Device code phishing to access accounts
π Read full report: https://thehackernews.com/2025/02/microsoft-russian-linked-hackers-using.html
π― Targets: Government, IT, Defense, Health, Education, Energy
π Regions: Europe, North America, Africa, Middle East
π΅οΈββοΈ Tactics: Phishing via WhatsApp, Signal, Teams
π² Attack Method: Device code phishing to access accounts
π Read full report: https://thehackernews.com/2025/02/microsoft-russian-linked-hackers-using.html
π22π5π€5π±2β‘1
β οΈ Generative AI is supercharging social engineering tacticsβtransforming cybercriminalsβ capabilities overnight.
From deepfake videos to voice cloning, attackers now have tools that go beyond traditional methods.
π Learn how these technologies are reshaping cyber risks: https://thehackernews.com/2025/02/ai-powered-social-engineering-ancillary.html
From deepfake videos to voice cloning, attackers now have tools that go beyond traditional methods.
π Learn how these technologies are reshaping cyber risks: https://thehackernews.com/2025/02/ai-powered-social-engineering-ancillary.html
π₯12π4β‘3
π¨βπ» Lazarus Group uses a previously undocumented JavaScript implant, Marstech1, targeting developers in a highly sophisticated attack.
This new implant poses a significant supply chain risk, collecting sensitive data and targeting cryptocurrency wallets across multiple platforms.
π Read the full article: https://thehackernews.com/2025/02/lazarus-group-deploys-marstech1.html
This new implant poses a significant supply chain risk, collecting sensitive data and targeting cryptocurrency wallets across multiple platforms.
π Read the full article: https://thehackernews.com/2025/02/lazarus-group-deploys-marstech1.html
π€―16π7π€5π3β‘1
β οΈ Cybersecurity researchers have uncovered the whoAMI attack, which allows hackers to gain access to AWS EC2 instances through a name confusion vulnerability in AMIs.
By publishing backdoored AMIs with specific names, attackers can exploit misconfigured API searches to trick systems into using their malicious AMIs.
Even simple misconfigurations in AMI searches can lead to code execution vulnerabilities, affecting both public and private AWS users.
Learn more: https://thehackernews.com/2025/02/new-whoami-attack-exploits-aws-ami-name.html
By publishing backdoored AMIs with specific names, attackers can exploit misconfigured API searches to trick systems into using their malicious AMIs.
Even simple misconfigurations in AMI searches can lead to code execution vulnerabilities, affecting both public and private AWS users.
Learn more: https://thehackernews.com/2025/02/new-whoami-attack-exploits-aws-ami-name.html
β‘22π10π₯6π3
Googleβs new Android security feature blocks scammers from altering critical settings, like installing apps from unknown sources, while on a phone call.
This feature aims to prevent a rise in telephone-oriented attack delivery (TOAD), a growing scam trend.
Learn more about this important update: https://thehackernews.com/2025/02/androids-new-feature-blocks-fraudsters.html
This feature aims to prevent a rise in telephone-oriented attack delivery (TOAD), a growing scam trend.
Learn more about this important update: https://thehackernews.com/2025/02/androids-new-feature-blocks-fraudsters.html
π38π₯14π13β‘6π€4π€―3π±2
Cybersecurity researchers have uncovered a new backdoor leveraging Telegram for command-and-control (C2).
π οΈ Golang-based malware hides in plain sight by mimicking system files.
π² Telegram Bot API used to send and receive commands remotely.
π¨ Russian origin suspected based on command language.
π Stealth features allow malware to reload itself after termination.
π Read: https://thehackernews.com/2025/02/new-golang-based-backdoor-uses-telegram.html
π οΈ Golang-based malware hides in plain sight by mimicking system files.
π² Telegram Bot API used to send and receive commands remotely.
π¨ Russian origin suspected based on command language.
π Stealth features allow malware to reload itself after termination.
π Read: https://thehackernews.com/2025/02/new-golang-based-backdoor-uses-telegram.html
π30β‘9π5π€―1
South Korea halts downloads of Chinese AI chatbot DeepSeek due to data protection concerns.
The suspension comes after security flaws were discovered and non-compliance with local privacy laws.
Read: https://thehackernews.com/2025/02/south-korea-suspends-deepseek-ai.html
The suspension comes after security flaws were discovered and non-compliance with local privacy laws.
Read: https://thehackernews.com/2025/02/south-korea-suspends-deepseek-ai.html
π24π15β‘5π€4π₯2π1π±1
π¨ This weekβs update: Former Google insider charged with espionage, UI flaws targeted by nation-state actors, and critical patches needed for ThinkPHP and OwnCloud.
Get the full scoop here: https://thehackernews.com/2025/02/thn-weekly-recap-google-secrets-stolen.html
Get the full scoop here: https://thehackernews.com/2025/02/thn-weekly-recap-google-secrets-stolen.html
π11π€―5π₯4β‘2π1
Is something missing from your cybersecurity strategy? It could be CTEM's continuous threat validation.
Discover why Continuous Threat Exposure Management (CTEM) is the next-gen solution for proactive cybersecurity.
π Explore the full report to learn more about CTEM: https://thehackernews.com/2025/02/cisos-expert-guide-to-ctem-and-why-it.html
Discover why Continuous Threat Exposure Management (CTEM) is the next-gen solution for proactive cybersecurity.
π Explore the full report to learn more about CTEM: https://thehackernews.com/2025/02/cisos-expert-guide-to-ctem-and-why-it.html
π16π4π₯2β‘1
π¨ Microsoft uncovers a new, advanced variant of the XCSSET malware targeting macOS users. It's the first major revision since 2022.
This latest update features sophisticated obfuscation and persistence methods, making it harder to detect and stop.
Learn about these new techniques: https://thehackernews.com/2025/02/microsoft-uncovers-new-xcsset-macos.html
This latest update features sophisticated obfuscation and persistence methods, making it harder to detect and stop.
Learn about these new techniques: https://thehackernews.com/2025/02/microsoft-uncovers-new-xcsset-macos.html
π16π₯11π2π€1