CTM360 just uncovered 16,000+ malicious Android URLs tied to the evolving PlayPraetor campaign.
π‘οΈ 5 new variants (Phish, RAT, PWA, Phantom, Veil) now target banking, tech, and energy users globally.
The threat is expanding fast.
Read the full report: https://thehackernews.com/2025/04/playpraetor-reloaded-ctm360-uncovers.html
π‘οΈ 5 new variants (Phish, RAT, PWA, Phantom, Veil) now target banking, tech, and energy users globally.
The threat is expanding fast.
Read the full report: https://thehackernews.com/2025/04/playpraetor-reloaded-ctm360-uncovers.html
π9π1π1
π¨ NVIDIAβs critical security fix failed!
NVIDIAβs patch for CVE-2024-0132 (CVSS 9.0) was incomplete β attackers can still escape containers and gain root access (CVE-2025-23359).
π Admins: Threat actors are watching...
β Patch now
β Audit your containers
β Lock down Docker APIs
Full report β https://thehackernews.com/2025/04/incomplete-patch-in-nvidia-toolkit.html
NVIDIAβs patch for CVE-2024-0132 (CVSS 9.0) was incomplete β attackers can still escape containers and gain root access (CVE-2025-23359).
π Admins: Threat actors are watching...
β Patch now
β Audit your containers
β Lock down Docker APIs
Full report β https://thehackernews.com/2025/04/incomplete-patch-in-nvidia-toolkit.html
π±23π6π₯6π€―6π€4
ALERT β A critical OttoKit plugin flaw (CVE-2025-3102) is under active attack: 100K+ WordPress sites at risk.
Hackers can create admin accounts and fully take over vulnerable sites.
Check admin users β Remove any suspicious accounts.
π Full details: https://thehackernews.com/2025/04/ottokit-wordpress-plugin-admin-creation.html
If you use OttoKit, update to v1.0.79 NOW.
Hackers can create admin accounts and fully take over vulnerable sites.
Check admin users β Remove any suspicious accounts.
π Full details: https://thehackernews.com/2025/04/ottokit-wordpress-plugin-admin-creation.html
If you use OttoKit, update to v1.0.79 NOW.
π€11π6π€―3
β‘ Mobile Malware Alert β Cybersecurity researchers warn of rising threats from SpyNote, BadBazaar, and MOONSHINE malware.
β‘οΈ SpyNote exploits fake Google Play pages to hijack Android devices β stealing data, mic, and camera access.
β‘οΈ BadBazaar and MOONSHINE target Tibetan, Uyghur, and Taiwanese communities β tied to Chinese APT groups.
π Full report: https://thehackernews.com/2025/04/spynote-badbazaar-moonshine-malware.html
β‘οΈ SpyNote exploits fake Google Play pages to hijack Android devices β stealing data, mic, and camera access.
β‘οΈ BadBazaar and MOONSHINE target Tibetan, Uyghur, and Taiwanese communities β tied to Chinese APT groups.
π Full report: https://thehackernews.com/2025/04/spynote-badbazaar-moonshine-malware.html
π7π€4
π¨ 23,958 IPs. 5 countries. 1 target.
Palo Alto Networks' GlobalProtect portals are under coordinated brute-force login attacksβno vulnerability yet, but the threat is real.
Urgent:
β Update PAN-OS
β Enforce MFA
β Harden your portals
π Full story: https://thehackernews.com/2025/04/palo-alto-networks-warns-of-brute-force.html
Palo Alto Networks' GlobalProtect portals are under coordinated brute-force login attacksβno vulnerability yet, but the threat is real.
Urgent:
β Update PAN-OS
β Enforce MFA
β Harden your portals
π Full story: https://thehackernews.com/2025/04/palo-alto-networks-warns-of-brute-force.html
π₯10π3π2π±2
π₯ Cyberattacks are scaling like startups β thanks to Initial Access Brokers (IABs).
πΉ In 2024, 58% of hacked access sells for under $1K.
πΉ Target sectors are widening β no oneβs safe.
πΉ USA, Brazil, France top the hit list.
Cheaper access = faster, wider cyberattacks.
Details + defense tips π https://thehackernews.com/2025/04/initial-access-brokers-shift-tactics.html
πΉ In 2024, 58% of hacked access sells for under $1K.
πΉ Target sectors are widening β no oneβs safe.
πΉ USA, Brazil, France top the hit list.
Cheaper access = faster, wider cyberattacks.
Details + defense tips π https://thehackernews.com/2025/04/initial-access-brokers-shift-tactics.html
π19π3
π¨ Paper Werewolf (aka GOFFEE) is hitting Russian government, energy, and media sectors with a stealthy new weapon β PowerModul.
It hijacks systems via fake Word/PDF files β deploys PowerShell malware β pivots with Mythic agents.
Read: https://thehackernews.com/2025/04/paper-werewolf-deploys-powermodul.html
It hijacks systems via fake Word/PDF files β deploys PowerShell malware β pivots with Mythic agents.
Read: https://thehackernews.com/2025/04/paper-werewolf-deploys-powermodul.html
π€19π6β‘4π±3π1
β‘ Even patching won't save you.
Fortinet confirms attackers kept read-only access to FortiGate devices after patching old flaws (CVE-2022-42475, CVE-2023-27997, CVE-2024-21762) via hidden symlink in SSL-VPN.
Full details π https://thehackernews.com/2025/04/fortinet-warns-attackers-retain.html
Fortinet confirms attackers kept read-only access to FortiGate devices after patching old flaws (CVE-2022-42475, CVE-2023-27997, CVE-2024-21762) via hidden symlink in SSL-VPN.
Full details π https://thehackernews.com/2025/04/fortinet-warns-attackers-retain.html
π29π16π€―15π₯6π5β‘2
π¨ New cyber threat alert!
Pakistan-linked hackers are ramping up attacks on India's oil, railways, and external affairs sectors using Xeno RAT, Spark RAT, and new malware CurlBack RAT.
They're now using MSI packagesβditching old methodsβto steal browser data, files, and credentials across Windows & Linux.
Find details here: https://thehackernews.com/2025/04/pakistan-linked-hackers-expand-targets.html
Pakistan-linked hackers are ramping up attacks on India's oil, railways, and external affairs sectors using Xeno RAT, Spark RAT, and new malware CurlBack RAT.
They're now using MSI packagesβditching old methodsβto steal browser data, files, and credentials across Windows & Linux.
Find details here: https://thehackernews.com/2025/04/pakistan-linked-hackers-expand-targets.html
π19π₯10π7π€4π1
AI is already rewriting cybersecurityβand most defenders are unprepared.
Hackers are using AI to automate attacks in minutes, while security teams still react manually.
The new arms race isnβt humans vs. humans.
Itβs AI vs. AI.
Learn more β https://thehackernews.com/2025/04/cybersecurity-in-ai-era-evolve-faster.html
Hackers are using AI to automate attacks in minutes, while security teams still react manually.
The new arms race isnβt humans vs. humans.
Itβs AI vs. AI.
Learn more β https://thehackernews.com/2025/04/cybersecurity-in-ai-era-evolve-faster.html
π25π€―10π8π₯7
π₯ Defenses can fail. Trusted tools can turn.
This week's newsletter covers how breaches happen before you even know they're possible.
β‘ Read and prepare β https://thehackernews.com/2025/04/weekly-recap-windows-0-day-vpn-exploits.html
This week's newsletter covers how breaches happen before you even know they're possible.
β‘ Read and prepare β https://thehackernews.com/2025/04/weekly-recap-windows-0-day-vpn-exploits.html
π₯14π7
π¨ Precision-targeted attacks are validating emails in real-time before stealing credentials.
π Only verified, high-value accounts see fake login screens. No email? Youβre redirected to Wikipedia to dodge detection.
Learn more: https://thehackernews.com/2025/04/phishing-campaigns-use-real-time-checks.html
π Only verified, high-value accounts see fake login screens. No email? Youβre redirected to Wikipedia to dodge detection.
Learn more: https://thehackernews.com/2025/04/phishing-campaigns-use-real-time-checks.html
π23π6π±1
π¨ Threat ALERT: ResolverRAT is hitting healthcare and pharma sectors hard β phishing, fear-bait, stealth attacks.
π‘οΈ Sophisticated multi-stage RAT
π Localized lures: Hindi, Italian, Turkish + more
π΅οΈββοΈ Advanced evasion: encryption, IP rotation, memory-only payload
π Read: https://thehackernews.com/2025/04/resolverrat-campaign-targets-healthcare.html
π‘οΈ Sophisticated multi-stage RAT
π Localized lures: Hindi, Italian, Turkish + more
π΅οΈββοΈ Advanced evasion: encryption, IP rotation, memory-only payload
π Read: https://thehackernews.com/2025/04/resolverrat-campaign-targets-healthcare.html
π28π₯4π1
π₯ Metaβs AI is coming for your public posts β but you can still opt out.
Starting this week, Meta is using public EU content from Facebook, Instagram & more (comments, posts, AI chats β not DMs).
Regulators approved it after a 1-year pause. Opt-out links are rolling out. Check your app or email.
π Act now β https://thehackernews.com/2025/04/meta-resumes-eu-ai-training-using.html
Starting this week, Meta is using public EU content from Facebook, Instagram & more (comments, posts, AI chats β not DMs).
Regulators approved it after a 1-year pause. Opt-out links are rolling out. Check your app or email.
π Act now β https://thehackernews.com/2025/04/meta-resumes-eu-ai-training-using.html
π€13π7π±2π€―1
π¨ Alert β A 9.0 CVSS flaw in Gladinetβs CentreStack also affects Triofoxβboth used for remote access.
Attackers exploited it as a zero-day in March, hitting 7 orgs by April 11.
π Root cause: Hardcoded crypto keys β enabled RCE via PowerShell + DLL sideloading
π Read: https://thehackernews.com/2025/04/gladinets-triofox-and-centrestack-under.html
Attackers exploited it as a zero-day in March, hitting 7 orgs by April 11.
π Root cause: Hardcoded crypto keys β enabled RCE via PowerShell + DLL sideloading
π Read: https://thehackernews.com/2025/04/gladinets-triofox-and-centrestack-under.html
π16
π¨ Hired by Hackers?
Devs on LinkedIn targeted in stealth malware attacks disguised as job offers.
Slow Pisces, linked to North Koreaβs Bybit hack (Feb 2025), is now luring coders with fake challenges to drop RN Stealerβa macOS info-stealer pulling iCloud, SSH, and cloud config files.
β‘οΈ Learn how it works: https://thehackernews.com/2025/04/crypto-developers-targeted-by-python.html
Devs on LinkedIn targeted in stealth malware attacks disguised as job offers.
Slow Pisces, linked to North Koreaβs Bybit hack (Feb 2025), is now luring coders with fake challenges to drop RN Stealerβa macOS info-stealer pulling iCloud, SSH, and cloud config files.
β‘οΈ Learn how it works: https://thehackernews.com/2025/04/crypto-developers-targeted-by-python.html
π13
π¨ Apache Roller Hit by 10.0 CVSS Flaw!
Old sessions stay active even after a password change (CVE-2025-24859). Hackers can keep access silently.
All versions β€6.1.4 affected.
π Full details: https://thehackernews.com/2025/04/critical-apache-roller-vulnerability.html
π Fixed in v6.1.5. Patch now.
Old sessions stay active even after a password change (CVE-2025-24859). Hackers can keep access silently.
All versions β€6.1.4 affected.
π Full details: https://thehackernews.com/2025/04/critical-apache-roller-vulnerability.html
π Fixed in v6.1.5. Patch now.
π14π5
π¨ Your biggest enterprise risk might be hiding in plain sight β THE BROWSER EXTENSIONS.
π 99% of employees use them
π 53% access sensitive data
π 54% have unknown publishers
π₯ Your entire org could be one extension away from compromise.
π Act now β Audit, assess, and lock down. Learn how: https://thehackernews.com/2025/04/majority-of-browser-extensions-can.html
π 99% of employees use them
π 53% access sensitive data
π 54% have unknown publishers
π₯ Your entire org could be one extension away from compromise.
π Act now β Audit, assess, and lock down. Learn how: https://thehackernews.com/2025/04/majority-of-browser-extensions-can.html
π₯13π10π6
Sophisticated phishing attacks are now routinely bypassing MFA, SSO, and multiple security layers across email, network, and endpoints.
Join the latest webinar from Push Security to learn why phishing attacks are more attractive than ever for attackers in 2025 β and what you can do to stop it.
Register here π https://thn.news/phishing-webinar-it
Join the latest webinar from Push Security to learn why phishing attacks are more attractive than ever for attackers in 2025 β and what you can do to stop it.
Register here π https://thn.news/phishing-webinar-it
π10π2
β οΈ UNC5174 (aka Uteus), tied to China, is quietly breaching Linux & macOS systems using SNOWLIGHT malware + a fake Cloudflare app (VShell).
π Targets: 20+ nations | Sectors: Gov, finance, defense
π Tactics: Open-source tools, fileless payloads, fake authenticator apps
π Risk: Remote control, in-memory attacks, hard-to-trace
π Full details: https://thehackernews.com/2025/04/chinese-hackers-target-linux-systems.html
π Targets: 20+ nations | Sectors: Gov, finance, defense
π Tactics: Open-source tools, fileless payloads, fake authenticator apps
π Risk: Remote control, in-memory attacks, hard-to-trace
π Full details: https://thehackernews.com/2025/04/chinese-hackers-target-linux-systems.html
π21π1