π¨ Theyβre back. Russian threat group FIN7 is using Anubisβa lightweight Python backdoor that grants full remote access to Windows machines without leaving detectable files.
It runs entirely in memory, evades most defenses, and can steal passwords, take screenshots, and exfiltrate dataβall masked with Base64 and hosted on compromised SharePoint sites.
π Full analysis: https://thehackernews.com/2025/04/fin7-deploys-anubis-backdoor-to-hijack.html
It runs entirely in memory, evades most defenses, and can steal passwords, take screenshots, and exfiltrate dataβall masked with Base64 and hosted on compromised SharePoint sites.
π Full analysis: https://thehackernews.com/2025/04/fin7-deploys-anubis-backdoor-to-hijack.html
π€―14π₯10π8β‘5π4
π₯ New Linux botnet ALERT!
Outlawβa Romanian-linked groupβis actively hijacking SSH servers to mine crypto via auto-spreading malware.
β Targets servers with weak SSH creds
β Uses BLITZ to self-propagate
β Installs SHELLBOT for remote control, DDoS, and data theft
β Exploits old bugs like Dirty COW (CVE-2016-5195)
π Full report: https://thehackernews.com/2025/04/outlaw-group-uses-ssh-brute-force-to.html
Outlawβa Romanian-linked groupβis actively hijacking SSH servers to mine crypto via auto-spreading malware.
β Targets servers with weak SSH creds
β Uses BLITZ to self-propagate
β Installs SHELLBOT for remote control, DDoS, and data theft
β Exploits old bugs like Dirty COW (CVE-2016-5195)
π Full report: https://thehackernews.com/2025/04/outlaw-group-uses-ssh-brute-force-to.html
π₯12π4π€3
53.5% of websites have weak SSL.
Not firewalls. Not zero-days. Just bad encryption setups.
π Thatβs how attackers walk in the front door.
SSL misconfigs = MITM attacks, eavesdropping & breaches.
π₯ Your attack surface is growing. Fix it before it spreads.
π Learn more: https://thehackernews.com/2025/04/how-ssl-misconfigurations-impact-your.html
Not firewalls. Not zero-days. Just bad encryption setups.
π Thatβs how attackers walk in the front door.
SSL misconfigs = MITM attacks, eavesdropping & breaches.
π₯ Your attack surface is growing. Fix it before it spreads.
π Learn more: https://thehackernews.com/2025/04/how-ssl-misconfigurations-impact-your.html
π8π5β‘4π±4
π₯ 93% of service providers struggle with cybersecurity compliance.
Only 2% feel confident. Thatβs a problemβand an opportunity.
This guide breaks down NIST compliance into clear, doable steps for MSPs & MSSPs.
β Find gaps
β Automate tasks
β Build client trust
β Cut manual work by 70%
Start here β https://thehackernews.com/2025/04/helping-your-clients-achieve-nist.html
Only 2% feel confident. Thatβs a problemβand an opportunity.
This guide breaks down NIST compliance into clear, doable steps for MSPs & MSSPs.
β Find gaps
β Automate tasks
β Build client trust
β Cut manual work by 70%
Start here β https://thehackernews.com/2025/04/helping-your-clients-achieve-nist.html
π7π2
This media is not supported in your browser
VIEW IN TELEGRAM
π New Google Cloud vulnerability exposed private containersβnow patched.
A flaw in Google Cloud Run (ImageRunner) let attackers with limited access pull private images and inject malicious code.
Attackers could exploit this to steal secrets or run malicious containers.
π Learn more: https://thehackernews.com/2025/04/google-fixed-cloud-run-vulnerability.html
A flaw in Google Cloud Run (ImageRunner) let attackers with limited access pull private images and inject malicious code.
Attackers could exploit this to steal secrets or run malicious containers.
π Learn more: https://thehackernews.com/2025/04/google-fixed-cloud-run-vulnerability.html
π9π6π2
π¨ Kidflix Taken Down!
The largest CSAM platformβ1.8M users, 91K videosβhas been dismantled in a global sting across 38 countries.
β‘ Operation Stream seized 72,000 files on March 11. Crypto. Tokens. Gamified abuse.
Real kids. Real crimes.
π Read: https://thehackernews.com/2025/04/europol-dismantles-kidflix-with-72000.html
The largest CSAM platformβ1.8M users, 91K videosβhas been dismantled in a global sting across 38 countries.
β‘ Operation Stream seized 72,000 files on March 11. Crypto. Tokens. Gamified abuse.
Real kids. Real crimes.
π Read: https://thehackernews.com/2025/04/europol-dismantles-kidflix-with-72000.html
π32π₯13π12π1
π¨ New web skimming campaign abuses old Stripe API to steal real credit cards
π³ 49+ sites hit. Real Stripe screen, fake iframe. Cloned buttons.
Targets: WooCommerce, WordPress, PrestaShop.
π Details β https://thehackernews.com/2025/04/legacy-stripe-api-exploited-to-validate.html
π³ 49+ sites hit. Real Stripe screen, fake iframe. Cloned buttons.
Targets: WooCommerce, WordPress, PrestaShop.
π Details β https://thehackernews.com/2025/04/legacy-stripe-api-exploited-to-validate.html
π16π8
π Think that cheap Android phone is a bargain? It might come loaded with Triadaβa powerful malware pre-installed on counterfeit devices.
π 2,600+ victims hit in just two weeks; and hackers stole π° $270K+ in crypto.
π Learn more: https://thehackernews.com/2025/04/triada-malware-preloaded-on-counterfeit.html
π 2,600+ victims hit in just two weeks; and hackers stole π° $270K+ in crypto.
π Learn more: https://thehackernews.com/2025/04/triada-malware-preloaded-on-counterfeit.html
π9π5π€5π₯4π1
π¨ New Google Quick Share flaw exposed.
π CVE-2024-10668
Attackers could crash your PC or send files to it without approval via Quick Share for Windows.
π Learn more: https://thehackernews.com/2025/04/google-patches-quick-share.html
π CVE-2024-10668
Attackers could crash your PC or send files to it without approval via Quick Share for Windows.
π Learn more: https://thehackernews.com/2025/04/google-patches-quick-share.html
π16π4π₯3π1π€―1
π¨ AI isnβt waiting for your compliance checklist.
CISOs want faster, smarter SOCsβbut GRC teams hit pause. Result? Missed threats. Wasted time. Rising risk.
β The fix: Practical AI governance.
π Break the deadlock now. Read the guide: https://thehackernews.com/2025/04/ai-adoption-in-enterprise-breaking.html
CISOs want faster, smarter SOCsβbut GRC teams hit pause. Result? Missed threats. Wasted time. Rising risk.
β The fix: Practical AI governance.
π Break the deadlock now. Read the guide: https://thehackernews.com/2025/04/ai-adoption-in-enterprise-breaking.html
π±5π4
π₯ North Koreaβs Lazarus Group is backβwith a new twist on fake job scams.
Theyβre using ClickFix tricks to infect crypto job seekers with GolangGhost, a stealthy Go-based backdoor hitting Windows & macOS.
Now expanding fast in Europeβwith IT workers faking identities to infiltrate companies in π©πͺGermany, π΅πΉPortugal & π¬π§UK.
π Full story: https://thehackernews.com/2025/04/lazarus-group-targets-job-seekers-with.html
Theyβre using ClickFix tricks to infect crypto job seekers with GolangGhost, a stealthy Go-based backdoor hitting Windows & macOS.
Now expanding fast in Europeβwith IT workers faking identities to infiltrate companies in π©πͺGermany, π΅πΉPortugal & π¬π§UK.
π Full story: https://thehackernews.com/2025/04/lazarus-group-targets-job-seekers-with.html
π16π₯6π6π€2
π¨ Cybercriminals just got smarter. Did your defenses?
AI isn't just a tool for goodβitβs a weapon in the wrong hands. Deepfake phishing, AI-powered exploits, invisible breachesβtheyβre already here.
If your security hasnβt adapted, youβre already behind. But thereβs a way forward.
π Join us for our next WEBINAR
ποΈ Featuring expert from @Zscaler
π‘ Learn how to outsmart AI-powered threats
Watch now β https://thehackernews.com/2025/04/ai-threats-are-evolving-fast-learn.html
AI isn't just a tool for goodβitβs a weapon in the wrong hands. Deepfake phishing, AI-powered exploits, invisible breachesβtheyβre already here.
If your security hasnβt adapted, youβre already behind. But thereβs a way forward.
π Join us for our next WEBINAR
ποΈ Featuring expert from @Zscaler
π‘ Learn how to outsmart AI-powered threats
Watch now β https://thehackernews.com/2025/04/ai-threats-are-evolving-fast-learn.html
π14π6
Stop patching blindly. Start defending smart.
Threat-Led Vulnerability Management (TLVM) helps you focus on what attackers are actually exploitingβnot just whatβs labeled βcritical.β
In todayβs AI-fueled threat landscape, context > CVSS.
π― Prioritize real risks.
π‘οΈ Strengthen your defenses.
β±οΈ Act before attackers do.
Learn how: https://thehackernews.com/expert-insights/2025/03/why-now-is-time-to-adopt-threat-led.html
Threat-Led Vulnerability Management (TLVM) helps you focus on what attackers are actually exploitingβnot just whatβs labeled βcritical.β
In todayβs AI-fueled threat landscape, context > CVSS.
π― Prioritize real risks.
π‘οΈ Strengthen your defenses.
β±οΈ Act before attackers do.
Learn how: https://thehackernews.com/expert-insights/2025/03/why-now-is-time-to-adopt-threat-led.html
π9
π¨ Microsoft Alert: New tax-season phishing wave hits 2,300+ U.S. Companies!
Hackers are using PDFs, QR codes, and fake DocuSign pages to steal passwords and install malware like Latrodectus and Brute Ratel.
π― Targeted: IT, consulting, and engineering firms
π¦ Malware: Remcos, AHKBot, GuLoader, more
π Full story here: https://thehackernews.com/2025/04/microsoft-warns-of-tax-themed-email.html
Hackers are using PDFs, QR codes, and fake DocuSign pages to steal passwords and install malware like Latrodectus and Brute Ratel.
π― Targeted: IT, consulting, and engineering firms
π¦ Malware: Remcos, AHKBot, GuLoader, more
π Full story here: https://thehackernews.com/2025/04/microsoft-warns-of-tax-themed-email.html
π11π₯5π±1
π¨ Massive new risk for data systems!
CVE-2025-30065 | Apache Parquet Java lib flaw (CVSS 10.0) lets attackers execute arbitrary code via poisoned files.
If your pipelines touch untrusted Parquet files, patch NOW.
Read: https://thehackernews.com/2025/04/critical-flaw-in-apache-parquet-allows.html
CVE-2025-30065 | Apache Parquet Java lib flaw (CVSS 10.0) lets attackers execute arbitrary code via poisoned files.
If your pipelines touch untrusted Parquet files, patch NOW.
Read: https://thehackernews.com/2025/04/critical-flaw-in-apache-parquet-allows.html
π±7π€―5π1π₯1π1
π The cloud never slows down β neither do the threats.
Wiz, now part of Googleβs biggest acquisition ever, can show you in 15 mins how to secure everything from code to runtimeβwithout adding friction.
π See how it works: https://thehackernews.com/videos/2025/03/wiz-15-minute-demo-secure-everything.html
Wiz, now part of Googleβs biggest acquisition ever, can show you in 15 mins how to secure everything from code to runtimeβwithout adding friction.
π See how it works: https://thehackernews.com/videos/2025/03/wiz-15-minute-demo-secure-everything.html
π7π€―3π1
β‘ CERT-UA confirms 3+ attacks on Ukraineβs government and critical systems since Fall 2024 using phishing links (DropMeFiles, Google Drive) to deploy WRECKSTEEL malware.
Cyber threats are escalating.
Read more β https://thehackernews.com/2025/04/cert-ua-reports-cyberattacks-targeting.html
Cyber threats are escalating.
Read more β https://thehackernews.com/2025/04/cert-ua-reports-cyberattacks-targeting.html
π11π€6π4π2
π₯ New Ivanti ZERO-DAY exploited in the wild β China-linked UNC5221 hits Connect Secure (CVE-2025-22457, CVSS 9.0).
π£ Exploits spotted mid-March by Mandiant.
π΅οΈββοΈMalware: TRAILBLAZE, BRUSHFIRE, SPAWN.
π― Persistence. Credential theft. Data exfiltration.
β‘ Patch now | See full story + urgent guidance: https://thehackernews.com/2025/04/critical-ivanti-flaw-actively-exploited.html
π£ Exploits spotted mid-March by Mandiant.
π΅οΈββοΈMalware: TRAILBLAZE, BRUSHFIRE, SPAWN.
π― Persistence. Credential theft. Data exfiltration.
β‘ Patch now | See full story + urgent guidance: https://thehackernews.com/2025/04/critical-ivanti-flaw-actively-exploited.html
π8π4π€4π2
π¨ Hackers arenβt hiding in basements anymore β theyβre students with business plans.
A 19-year-old, Coquettte, used Russian bulletproof hosting to spread malware disguised as antivirus software.
An OPSEC mistake exposed ties to Horrid, a cybercrime group training new hackers.
π Learn more: https://thehackernews.com/2025/04/opsec-failure-exposes-coquetttes.html
A 19-year-old, Coquettte, used Russian bulletproof hosting to spread malware disguised as antivirus software.
An OPSEC mistake exposed ties to Horrid, a cybercrime group training new hackers.
π Learn more: https://thehackernews.com/2025/04/opsec-failure-exposes-coquetttes.html
π₯27π8π4π2
π₯ 10 years ago, Docker changed how we build software.
Today, Chainguard OS changes how we deliver it.
Chainguard OS:
β Secure upstream sources
β Daily updates
β Smaller, safer, faster
Containers evolved. Now software delivery has too.
π Whatβs next: https://thehackernews.com/2025/04/have-we-reached-distroless-tipping-point.html
Today, Chainguard OS changes how we deliver it.
Chainguard OS:
β Secure upstream sources
β Daily updates
β Smaller, safer, faster
Containers evolved. Now software delivery has too.
π Whatβs next: https://thehackernews.com/2025/04/have-we-reached-distroless-tipping-point.html
π8π6π±4π2π€2