๐จ LockBit Dev Extradited to U.S.
Rostislav Panev, a 51-year-old dual Russian-Israeli national, is now in U.S. custodyโcharged for developing LockBit ransomware.
LockBit has hit 2,500+ victims in 120+ countries, raking in $500M+ in profits.
๐ Full story: https://thehackernews.com/2025/03/alleged-israeli-lockbit-developer.html
Rostislav Panev, a 51-year-old dual Russian-Israeli national, is now in U.S. custodyโcharged for developing LockBit ransomware.
LockBit has hit 2,500+ victims in 120+ countries, raking in $500M+ in profits.
๐ Full story: https://thehackernews.com/2025/03/alleged-israeli-lockbit-developer.html
๐16๐7๐5๐ฅ1๐คฏ1
๐จ Most microsegmentation projects fail before startingโtoo complex, slow, and disruptive.
But Andelyn Biosciences succeeded.
โ 2,700 security policies enforced
โ No hardware changes needed
โ Full segmentation in weeks, not years
They replaced legacy VLANs and firewalls with Elisity's identity-based microsegmentation.
๐ Learn how and get lessons for your Zero Trust journey: https://thehackernews.com/2025/03/why-most-microsegmentation-projects.html
But Andelyn Biosciences succeeded.
โ 2,700 security policies enforced
โ No hardware changes needed
โ Full segmentation in weeks, not years
They replaced legacy VLANs and firewalls with Elisity's identity-based microsegmentation.
๐ Learn how and get lessons for your Zero Trust journey: https://thehackernews.com/2025/03/why-most-microsegmentation-projects.html
๐9๐3๐ฑ1
๐จ 2025 is the year of cyberattacks.
๐น Phishing is getting smarter.
๐น MFA isnโt stopping breaches.
๐น AppSec tools are still missing the mark.
๐ Join these webinars to fix security for good: https://www.linkedin.com/pulse/phishing-mfa-bypass-appsec-failuresfix-them-webinars-thehackernews-t1oee/
๐น Phishing is getting smarter.
๐น MFA isnโt stopping breaches.
๐น AppSec tools are still missing the mark.
๐ Join these webinars to fix security for good: https://www.linkedin.com/pulse/phishing-mfa-bypass-appsec-failuresfix-them-webinars-thehackernews-t1oee/
Linkedin
๐ฅ Phishing, MFA Bypass & AppSec FailuresโFix Them in These Webinars
Cyberattacks are evolving. Are your defenses stuck in the past? Phishing, MFA bypass, and weak credentials fuel the majority of breaches.
๐16๐12โก2๐ฅ2๐1
๐จ Hackers are poisoning PyPI again. Devs, check your dependencies NOW!
Cybercriminals planted 20 fake Python packages on PyPIโstealing cloud access tokens from AWS, Alibaba Cloud, and Tencent Cloud. These packages, disguised as "time" utilities, racked up 14,100+ downloads before removal.
๐ One even snuck into a GitHub project with 519 stars and 42 forks.
๐ Read more: https://thehackernews.com/2025/03/malicious-pypi-packages-stole-cloud.html
Cybercriminals planted 20 fake Python packages on PyPIโstealing cloud access tokens from AWS, Alibaba Cloud, and Tencent Cloud. These packages, disguised as "time" utilities, racked up 14,100+ downloads before removal.
๐ One even snuck into a GitHub project with 519 stars and 42 forks.
๐ Read more: https://thehackernews.com/2025/03/malicious-pypi-packages-stole-cloud.html
๐19๐11๐ฅ10๐คฏ8๐7โก3๐ค1
๐จ WARNING: A supply chain attack hit tj-actions/changed-files, a GitHub Action used by 23,000+ reposโexposing AWS keys, PATs, and RSA keys in CI/CD logs.
๐ Affected? Update to v46.0.1 NOW and Audit workflows for leaks.
๐ Read more: https://thehackernews.com/2025/03/github-action-compromise-puts-cicd.html
๐ Affected? Update to v46.0.1 NOW and Audit workflows for leaks.
๐ Read more: https://thehackernews.com/2025/03/github-action-compromise-puts-cicd.html
๐12๐คฏ3๐ค2๐ฅ1
๐ Your email client might be leaking more than you think...
Hackers are exploiting CSS to bypass spam filters and track users without JavaScript.
๐จ Cisco Talos warns that attackers use CSS properties like media, text-indent, and opacity to hide phishing content and fingerprint victims.
Stay aheadโlearn how at https://thehackernews.com/2025/03/cybercriminals-exploit-css-to-evade.html.
Hackers are exploiting CSS to bypass spam filters and track users without JavaScript.
๐จ Cisco Talos warns that attackers use CSS properties like media, text-indent, and opacity to hide phishing content and fingerprint victims.
Stay aheadโlearn how at https://thehackernews.com/2025/03/cybercriminals-exploit-css-to-evade.html.
๐ฅ17๐4๐4๐ค1
๐จ Cloud ransomware is evolvingโyour security settings wonโt save you.
66% of cloud storage buckets hold sensitive data. Attackers now exploit legit AWS & Azure features to lock you out.
๐น Block risky encryption methods
๐น Enable backups & versioning (not default!)
๐น Lock down IAM policies
The cloud wonโt save youโtake action now.
๐ฅ Read & Watch: https://thehackernews.com/2025/03/sans-institute-warns-of-novel-cloud.html
66% of cloud storage buckets hold sensitive data. Attackers now exploit legit AWS & Azure features to lock you out.
๐น Block risky encryption methods
๐น Enable backups & versioning (not default!)
๐น Lock down IAM policies
The cloud wonโt save youโtake action now.
๐ฅ Read & Watch: https://thehackernews.com/2025/03/sans-institute-warns-of-novel-cloud.html
๐15
๐จ Old Cameras, New Threats ๐ฅ
A critical flaw (CVE-2025-1316, CVSS 9.3) in Edimax IC-7100 cameras is under active attackโturning unpatched devices into Mirai botnet soldiers for massive DDoS strikes.
Default creds (admin:1234) = easy pickings for attackers
๐ Details: https://thehackernews.com/2025/03/unpatched-edimax-camera-flaw-exploited.html
A critical flaw (CVE-2025-1316, CVSS 9.3) in Edimax IC-7100 cameras is under active attackโturning unpatched devices into Mirai botnet soldiers for massive DDoS strikes.
Default creds (admin:1234) = easy pickings for attackers
๐ Details: https://thehackernews.com/2025/03/unpatched-edimax-camera-flaw-exploited.html
๐ฅ18๐4
๐จ Last Week in Cybersecurity...
Routers hacked, malicious PyPI packages detected, new ransomware decryptors released, and major threats uncovered.
Read: https://thehackernews.com/2025/03/thn-weekly-recap-router-hacks-pypi.html
Stay informedโstay secure. #THNWeeklyRecap
Routers hacked, malicious PyPI packages detected, new ransomware decryptors released, and major threats uncovered.
Read: https://thehackernews.com/2025/03/thn-weekly-recap-router-hacks-pypi.html
Stay informedโstay secure. #THNWeeklyRecap
๐14โก8๐4
๐จ Apache Tomcat Under Attack.
Hackers are actively exploiting CVE-2025-24813 just 30 hours after disclosure.
๐น RCE & Info Disclosure Risk
๐น No Authentication Needed
๐น Attackers Upload & Execute Malicious Files
โ ๏ธ Delaying could mean backdoors, config tampering & full compromise.
Read: https://thehackernews.com/2025/03/apache-tomcat-vulnerability-comes-under.html
Donโt waitโsecure your systems NOW
Hackers are actively exploiting CVE-2025-24813 just 30 hours after disclosure.
๐น RCE & Info Disclosure Risk
๐น No Authentication Needed
๐น Attackers Upload & Execute Malicious Files
โ ๏ธ Delaying could mean backdoors, config tampering & full compromise.
Read: https://thehackernews.com/2025/03/apache-tomcat-vulnerability-comes-under.html
Donโt waitโsecure your systems NOW
๐25๐ฅ15๐11๐คฏ4๐1๐ค1
This media is not supported in your browser
VIEW IN TELEGRAM
๐ New Malware Alert โ Microsoft warns of StilachiRAT, a stealthy remote access trojan that:
๐น Steals browser passwords & clipboard data
๐น Targets crypto wallets
๐น Executes remote commands & monitors RDP sessions
๐น Evades detection by clearing event logs
Read: https://thehackernews.com/2025/03/microsoft-warns-of-stilachirat-stealthy.html
๐ต๏ธโโ๏ธ No known actor yet, but itโs spreading. Protect your assets NOW.
๐น Steals browser passwords & clipboard data
๐น Targets crypto wallets
๐น Executes remote commands & monitors RDP sessions
๐น Evades detection by clearing event logs
Read: https://thehackernews.com/2025/03/microsoft-warns-of-stilachirat-stealthy.html
๐ต๏ธโโ๏ธ No known actor yet, but itโs spreading. Protect your assets NOW.
๐21๐ค7๐ฑ6
โ ๏ธ Your Device Might Be Part of the Largest CTV Botnet Ever!
Cybercriminals are exploiting cheap Android devices to build a massive botnet for:
๐น Ad fraud & fake clicks
๐น Residential proxy abuse
๐น DDoS attacks & account takeovers
๐น Hidden malware pre-installed in devices
Learn more: https://thehackernews.com/2025/03/badbox-20-botnet-infects-1-million.html
๐ 1M+ devices infected worldwide, mostly in Brazil, US, & Mexico. Google removed 24 malicious apps, but the operation is still evolving.
Cybercriminals are exploiting cheap Android devices to build a massive botnet for:
๐น Ad fraud & fake clicks
๐น Residential proxy abuse
๐น DDoS attacks & account takeovers
๐น Hidden malware pre-installed in devices
Learn more: https://thehackernews.com/2025/03/badbox-20-botnet-infects-1-million.html
๐ 1M+ devices infected worldwide, mostly in Brazil, US, & Mexico. Google removed 24 malicious apps, but the operation is still evolving.
๐16๐5
๐จ China-linked MirrorFace just carried out a stealthy attack on a European diplomatic groupโusing:
๐น ANEL backdoorโrevived after 6 years
๐น AsyncRAT & HiddenFace malware
๐น Stealthy access via VS Code Remote Tunnels
Learn more: https://thehackernews.com/2025/03/china-linked-mirrorface-deploys-anel.html
๐น ANEL backdoorโrevived after 6 years
๐น AsyncRAT & HiddenFace malware
๐น Stealthy access via VS Code Remote Tunnels
Learn more: https://thehackernews.com/2025/03/china-linked-mirrorface-deploys-anel.html
๐ค16๐7๐5๐ฅ3โก1๐1
What are the essential skills security analysts need to succeed?
IDC's latest survey of 900+ security leaders reveals the top five.
Uncover these and more findings in a live webinar with sponsors Tines and AWS.
Sign up to attend: https://thn.news/voice-of-security-2025-tw
IDC's latest survey of 900+ security leaders reveals the top five.
Uncover these and more findings in a live webinar with sponsors Tines and AWS.
Sign up to attend: https://thn.news/voice-of-security-2025-tw
๐11๐2๐2๐ค2
๐จ 331 Malicious Android Google Play Apps, 60 Million+ Downloads!
The Vapor scam used:
๐น Full-screen adsโlocking devices
๐น Phishing attacksโstealing credentials & credit cards
๐น Hidden icons & impersonationโevading detection
๐น Versioning tricksโturning clean apps malicious later
โ ๏ธ Check your phone NOW. Delete suspicious apps!
๐ Full details โ https://thehackernews.com/2025/03/new-ad-fraud-campaign-exploits-331-apps.html
The Vapor scam used:
๐น Full-screen adsโlocking devices
๐น Phishing attacksโstealing credentials & credit cards
๐น Hidden icons & impersonationโevading detection
๐น Versioning tricksโturning clean apps malicious later
โ ๏ธ Check your phone NOW. Delete suspicious apps!
๐ Full details โ https://thehackernews.com/2025/03/new-ad-fraud-campaign-exploits-331-apps.html
๐ค12๐ฅ6๐4๐3โก1
๐จ Critical AMI BMC Vulnerability (CVE-2024-54085) โ CVSS 10.0!
A severe authentication bypass flaw allows attackers to:
๐น Remotely control servers & deploy malware
๐น Tamper with firmware, brick motherboards & cause reboot loops
๐น Potentially damage hardware
โ ๏ธ Affected: HPE, ASUS, ASRockRack & more
๐ Read more: https://thehackernews.com/2025/03/new-critical-ami-bmc-vulnerability.html
๐ข Admins: Patch ASAP! Patches released (March 11, 2025), OEM updates required.
A severe authentication bypass flaw allows attackers to:
๐น Remotely control servers & deploy malware
๐น Tamper with firmware, brick motherboards & cause reboot loops
๐น Potentially damage hardware
โ ๏ธ Affected: HPE, ASUS, ASRockRack & more
๐ Read more: https://thehackernews.com/2025/03/new-critical-ami-bmc-vulnerability.html
๐ข Admins: Patch ASAP! Patches released (March 11, 2025), OEM updates required.
๐9๐5๐คฏ3
๐จ WARNING: Windows Zero-Day!
A still-unpatched flaw (ZDI-CAN-25373) in Windows has been actively exploited since 2017 by state-backed hackers from China, Russia, Iran & North Korea for cyber espionage & data theft.
๐น 1,000+ malicious .LNK files discovered
๐น Targets: Governments, banks, telecoms, defense sectors
Learn more: https://thehackernews.com/2025/03/unpatched-windows-zero-day-flaw.html
Microsoft wonโt release a patch, citing โlow severityโ
A still-unpatched flaw (ZDI-CAN-25373) in Windows has been actively exploited since 2017 by state-backed hackers from China, Russia, Iran & North Korea for cyber espionage & data theft.
๐น 1,000+ malicious .LNK files discovered
๐น Targets: Governments, banks, telecoms, defense sectors
Learn more: https://thehackernews.com/2025/03/unpatched-windows-zero-day-flaw.html
Microsoft wonโt release a patch, citing โlow severityโ
๐คฏ20๐8โก4๐3๐3
๐ฅ Breaking: Google is acquiring cloud security firm Wiz for $32 Billionโits largest deal in history.
๐ฐ Largest acquisition in Googleโs history
๐ก๏ธ Boosts AI-powered cloud security
๐ Wiz remains independent, still working with AWS, Azure, Oracle
https://thehackernews.com/2025/03/google-acquires-wiz-for-32-billion-in.html
๐ฐ Largest acquisition in Googleโs history
๐ก๏ธ Boosts AI-powered cloud security
๐ Wiz remains independent, still working with AWS, Azure, Oracle
https://thehackernews.com/2025/03/google-acquires-wiz-for-32-billion-in.html
๐ฑ22๐ฅ9๐6โก2
๐จ Android Threat Hunters, Your Job Just Got Easier!
ANY.RUN has just released a brand-new OS designed for real-time Android threat analysis inside a secure sandbox environment.
Now, businesses and security teams can:
โ Detect Android threats faster
๐ Investigate APK behavior in real time
โก Speed up incident response
๐ฐ Reduce cybersecurity costs
Best part? Itโs available for all plansโeven FREE users!
๐ Try now: https://thn.news/malware-sandbox-android-tg
ANY.RUN has just released a brand-new OS designed for real-time Android threat analysis inside a secure sandbox environment.
Now, businesses and security teams can:
โ Detect Android threats faster
๐ Investigate APK behavior in real time
โก Speed up incident response
๐ฐ Reduce cybersecurity costs
Best part? Itโs available for all plansโeven FREE users!
๐ Try now: https://thn.news/malware-sandbox-android-tg
๐21๐ฅ13๐ฑ3
๐จ Is Your Okta Environment Secure? Even with best practices, misconfigurations and identity sprawl can leave your system exposed.
โ ๏ธ Key risks:
โ Inactive admin accounts & weak MFA
โ Misconfigured security settings
โ Forgotten API tokens granting access
โ Lingering access for ex-employees
๐ Learn how to protect your identity infrastructure: https://thehackernews.com/2025/03/how-to-improve-okta-security-in-four.html
โ ๏ธ Key risks:
โ Inactive admin accounts & weak MFA
โ Misconfigured security settings
โ Forgotten API tokens granting access
โ Lingering access for ex-employees
๐ Learn how to protect your identity infrastructure: https://thehackernews.com/2025/03/how-to-improve-okta-security-in-four.html
๐9