"Your firewall wonβt save you."
Hackers are using ChatGPT to craft phishing lures & scan attack surfaces.
Meanwhile, most orgs still cling to VPNs & 30-year-old security models.
π₯ Zero Trust + AI isnβt hype β itβs survival.
Donβt fall behind: https://thehackernews.com/expert-insights/2025/04/rethinking-cyber-defense-with-zero.html
Hackers are using ChatGPT to craft phishing lures & scan attack surfaces.
Meanwhile, most orgs still cling to VPNs & 30-year-old security models.
π₯ Zero Trust + AI isnβt hype β itβs survival.
Donβt fall behind: https://thehackernews.com/expert-insights/2025/04/rethinking-cyber-defense-with-zero.html
π13π7π€―3
π CRITICAL ALERT β U.S. funding for MITREβs CVE vulnerability database program ends Wednesday.
MITRE warns: no funding = no new CVEs, degraded threat advisories, and slower incident response.
π οΈ CVEs power security tools, alerts, and patching across critical infrastructure.
π Without it, defenders lose a key part of their playbook.
π Full story β https://thehackernews.com/2025/04/us-govt-funding-for-mitres-cve-ends.html
MITRE warns: no funding = no new CVEs, degraded threat advisories, and slower incident response.
π οΈ CVEs power security tools, alerts, and patching across critical infrastructure.
π Without it, defenders lose a key part of their playbook.
π Full story β https://thehackernews.com/2025/04/us-govt-funding-for-mitres-cve-ends.html
π€―38π€7π6π4π₯3π±3β‘2π1
π¨ New Android Phones, Pre-Loaded with Malware?!
Since June 2024, cheap Androids from Chinese brands like SHOWJI come with trojanized WhatsApp/Telegram apps out of the box.
π± Fake models: βS24 Ultraβ, βNote 13 Proβ, etc.
πΈ Malware replaces your crypto wallet address in chats
π§ Scans your images for mnemonic phrases
π° Hackers netted $1.6M+ via 40+ infected apps & 60+ C2 servers
π Check the list & protect your crypto β https://thehackernews.com/2025/04/chinese-android-phones-shipped-with.html
Since June 2024, cheap Androids from Chinese brands like SHOWJI come with trojanized WhatsApp/Telegram apps out of the box.
π± Fake models: βS24 Ultraβ, βNote 13 Proβ, etc.
πΈ Malware replaces your crypto wallet address in chats
π§ Scans your images for mnemonic phrases
π° Hackers netted $1.6M+ via 40+ infected apps & 60+ C2 servers
π Check the list & protect your crypto β https://thehackernews.com/2025/04/chinese-android-phones-shipped-with.html
π12π6π₯3
π¨ BPFDoor is backβwith a stealthy new controller in play.
A fresh wave of BPFDoor attacks has hit telecom, finance & retail sectors in π°π·π²πΎππ°π²π²πͺπ¬ β using a stealth controller that opens reverse shells & moves laterally inside Linux networks.
π Read β https://thehackernews.com/2025/04/new-bpfdoor-controller-enables-stealthy.html
A fresh wave of BPFDoor attacks has hit telecom, finance & retail sectors in π°π·π²πΎππ°π²π²πͺπ¬ β using a stealth controller that opens reverse shells & moves laterally inside Linux networks.
π Read β https://thehackernews.com/2025/04/new-bpfdoor-controller-enables-stealthy.html
π11π₯3
β οΈ Why hack inβ¦ when you can just log in?
80% of breaches stem from SaaS identity misconfigurations.
One compromised account can trigger a chain: Entra ID takeover β GitHub exfiltration β Slack leaks
Wing Security gives full SaaS visibilityβno agents, no blind spots.
β Identity & app mapping
β Real-time threat detection
β Full attack timeline
π See how it works: https://thehackernews.com/2025/04/product-walkthrough-look-inside-wing.html
80% of breaches stem from SaaS identity misconfigurations.
One compromised account can trigger a chain: Entra ID takeover β GitHub exfiltration β Slack leaks
Wing Security gives full SaaS visibilityβno agents, no blind spots.
β Identity & app mapping
β Real-time threat detection
β Full attack timeline
π See how it works: https://thehackernews.com/2025/04/product-walkthrough-look-inside-wing.html
π9π5
β οΈ Hackers are abusing AI tool Gamma to craft fake presentations that lead you to spoofed Microsoft SharePoint loginsβand even fake CAPTCHA pages to dodge security scans.
πDetails: https://thehackernews.com/2025/04/ai-powered-gamma-used-to-host-microsoft.html
πDetails: https://thehackernews.com/2025/04/ai-powered-gamma-used-to-host-microsoft.html
π8π5π2π₯1π€1
π¨ Supply chain cyberattacks are exploding β and hitting where it hurts most: healthcare, retail, energy.
π¦ One breach = millions exposed.
The risk? Vendors are the backdoor. Hackers are walking right in.
Learn whatβs driving this wave and how to stay ahead: https://thehackernews.com/2025/04/from-third-party-vendors-to-us-tariffs.html
π¦ One breach = millions exposed.
The risk? Vendors are the backdoor. Hackers are walking right in.
Learn whatβs driving this wave and how to stay ahead: https://thehackernews.com/2025/04/from-third-party-vendors-to-us-tariffs.html
π10π3π₯2π€―1
π Google blocked 5.1B bad ads and banned 39.2M advertiser accounts in 2024.
AI flagged scams, deepfakes, and fraud at scaleβ700K accounts suspended for impersonating public figures alone.
π 5.1B bad ads blocked
π 9.1B restricted
π« 1.3B pages hit
π€ 5M+ scam accounts suspended
π€ AI flagged 700K deepfake scams
π Full story: https://thehackernews.com/2025/04/google-blocked-51b-harmful-ads-and.html
AI flagged scams, deepfakes, and fraud at scaleβ700K accounts suspended for impersonating public figures alone.
π 5.1B bad ads blocked
π 9.1B restricted
π« 1.3B pages hit
π€ 5M+ scam accounts suspended
π€ AI flagged 700K deepfake scams
π Full story: https://thehackernews.com/2025/04/google-blocked-51b-harmful-ads-and.html
π20π6π₯5β‘1π€1
Over 50% of vulnerabilities are exploited within 7 days of discovery.
Learn how to reduce MTTR and secure your apps with insights from ActiveState's 2025 State of Vulnerability Management & Remediation Report.
π‘οΈ Stay ahead of threatsβdownload now! https://thn.news/vulnerability-management-2025
#DevSecOps #OpenSource
Learn how to reduce MTTR and secure your apps with insights from ActiveState's 2025 State of Vulnerability Management & Remediation Report.
π‘οΈ Stay ahead of threatsβdownload now! https://thn.news/vulnerability-management-2025
#DevSecOps #OpenSource
π11π8
ππ UPDATE β CISA extends funding to prevent a shutdown of the CVE Program.
A new CVE Foundation is also launched to ensure global, independent oversightβjust as ENISA rolls out the EU Vulnerability Database.
Read: https://thehackernews.com/2025/04/us-govt-funding-for-mitres-cve-ends.html#update-cisa-extends-cve-program-contract-amid-funding-crisis
A new CVE Foundation is also launched to ensure global, independent oversightβjust as ENISA rolls out the EU Vulnerability Database.
Read: https://thehackernews.com/2025/04/us-govt-funding-for-mitres-cve-ends.html#update-cisa-extends-cve-program-contract-amid-funding-crisis
π25π9π₯6π€―3π1
π₯ One task away from total takeover?
4 local privilege escalation flaws found in schtasks.exeβa core part of Windows Task Scheduler.
Attackers can:
β’ Bypass UAC
β’ Run SYSTEM-level commands
β’ Erase security logs
β’ Impersonate admins using known passwords.
Fix not yet available.
π Full story β https://thehackernews.com/2025/04/experts-uncover-four-new-privilege.html
4 local privilege escalation flaws found in schtasks.exeβa core part of Windows Task Scheduler.
Attackers can:
β’ Bypass UAC
β’ Run SYSTEM-level commands
β’ Erase security logs
β’ Impersonate admins using known passwords.
Fix not yet available.
π Full story β https://thehackernews.com/2025/04/experts-uncover-four-new-privilege.html
π₯18π12
π¨ Targeted iPhone attacks in the wild.
Apple just patched 2 new zero-daysβbringing 2025βs total to 5 actively exploited flaws.
β One lets hackers run code via malicious audio files
β Another bypasses Pointer Authentication using memory tricks
π Details here: https://thehackernews.com/2025/04/apple-patches-two-actively-exploited.html
Update now: iOS 18.4.1, macOS Sequoia 15.4.1, tvOS, visionOS
Apple just patched 2 new zero-daysβbringing 2025βs total to 5 actively exploited flaws.
β One lets hackers run code via malicious audio files
β Another bypasses Pointer Authentication using memory tricks
π Details here: https://thehackernews.com/2025/04/apple-patches-two-actively-exploited.html
Update now: iOS 18.4.1, macOS Sequoia 15.4.1, tvOS, visionOS
π20π4π₯2π€1
π¨ Actively Exploited SonicWall Flaw Hits CISAβs KEV List.
Remote attackers can execute code via SMA 100 Series bug (CVE-2021-20035, CVSS 7.2).
β‘οΈ Injects OS commands as βnobodyβ user
β‘οΈ Impacts SMA 200β500v on outdated firmware
β‘οΈ FCEB agencies must patch by May 7, 2025
Your VPN gateway could be the backdoor. Patch it
Learn more: https://thehackernews.com/2025/04/cisa-flags-actively-exploited.html
Remote attackers can execute code via SMA 100 Series bug (CVE-2021-20035, CVSS 7.2).
β‘οΈ Injects OS commands as βnobodyβ user
β‘οΈ Impacts SMA 200β500v on outdated firmware
β‘οΈ FCEB agencies must patch by May 7, 2025
Your VPN gateway could be the backdoor. Patch it
Learn more: https://thehackernews.com/2025/04/cisa-flags-actively-exploited.html
π20π₯2
π¨ Microsoft Alert: Node.js-Powered Malware Campaign Ongoing...
Since Oct 2024, fake Binance & TradingView installers have been used to deploy malware via Node.js and PowerShell.
Linked threats include ClickFix tricks, SectopRAT malware, fake PDF tools, and HR-themed phishing kits.
Learn more: https://thehackernews.com/2025/04/nodejs-malware-campaign-targets-crypto.html
Since Oct 2024, fake Binance & TradingView installers have been used to deploy malware via Node.js and PowerShell.
Linked threats include ClickFix tricks, SectopRAT malware, fake PDF tools, and HR-themed phishing kits.
Learn more: https://thehackernews.com/2025/04/nodejs-malware-campaign-targets-crypto.html
π€―16π11
π¨ CVSS 10.0 ALERT: Remote Code Execution in Erlang/OTP SSH (CVE-2025-32433)
No auth. Full control. Widespread impact.
Used in Cisco, Ericsson, OT/IoT, and edge systems, this bug lets attackers run code without logging in.
If SSH runs as root? Game over. π
π Full details β https://thehackernews.com/2025/04/critical-erlangotp-ssh-vulnerability.html
π₯ Fix now β OTP-27.3.3 / 26.2.5.11 / 25.3.2.20 Block SSH ports as temp fix.
No auth. Full control. Widespread impact.
Used in Cisco, Ericsson, OT/IoT, and edge systems, this bug lets attackers run code without logging in.
If SSH runs as root? Game over. π
π Full details β https://thehackernews.com/2025/04/critical-erlangotp-ssh-vulnerability.html
π₯ Fix now β OTP-27.3.3 / 26.2.5.11 / 25.3.2.20 Block SSH ports as temp fix.
π€―15π9π₯4
π₯ Blockchain wonβt kill passwords yetβbut it may change how we authenticate.
Decentralized IDs + cryptographic keys = fewer breaches, no central targets.
Used in finance (KYC) & healthcare (patient data), itβs realβand growing.
But until blockchain scales, passwords stay. Just make them strong.
β‘οΈ Learn more: https://thehackernews.com/2025/04/blockchain-offers-security-benefits-but.html
Decentralized IDs + cryptographic keys = fewer breaches, no central targets.
Used in finance (KYC) & healthcare (patient data), itβs realβand growing.
But until blockchain scales, passwords stay. Just make them strong.
β‘οΈ Learn more: https://thehackernews.com/2025/04/blockchain-offers-security-benefits-but.html
π17π€3
π¨ Copy. Paste. Get hacked.
North Korea, Iran & Russia are now pushing ClickFixβa sneaky trick that fools users into running malware on their own devices.
Learn more β https://thehackernews.com/2025/04/state-sponsored-hackers-weaponize.html
North Korea, Iran & Russia are now pushing ClickFixβa sneaky trick that fools users into running malware on their own devices.
Learn more β https://thehackernews.com/2025/04/state-sponsored-hackers-weaponize.html
π27π6π₯3β‘2
π¨ AI isnβt just coding fasterβitβs rewriting the rulebook.
LLMs have entered the threat landscape. From spear-phishing and voice fraud to malware with OCR, attackers are now using AI to scale, blend, and evolve.
Defenders use AI tooβbut GenAI interfaces expose a new attack surface.
π Full deep dive in Security Navigator 2025: https://thehackernews.com/2025/04/artificial-intelligence-whats-all-fuss.html
LLMs have entered the threat landscape. From spear-phishing and voice fraud to malware with OCR, attackers are now using AI to scale, blend, and evolve.
Defenders use AI tooβbut GenAI interfaces expose a new attack surface.
π Full deep dive in Security Navigator 2025: https://thehackernews.com/2025/04/artificial-intelligence-whats-all-fuss.html
π€15π6π3
π¨ China-backed hackers are deploying TONESHELL v3, StarProxy, and stealth tools like SplatCloak to breach Myanmar targetsβdodging EDR, logging keystrokes, and hopping across networks with FakeTLS tricks.
β’ 3 TONESHELL variants
β’ 2 new keyloggers (PAKLOG, CorKLOG)
β’ StarProxy β a lateral movement proxy over FakeTLS
β’ SplatCloak β a Windows kernel-level EDR evasion driver
Details here π https://thehackernews.com/2025/04/mustang-panda-targets-myanmar-with.html
β’ 3 TONESHELL variants
β’ 2 new keyloggers (PAKLOG, CorKLOG)
β’ StarProxy β a lateral movement proxy over FakeTLS
β’ SplatCloak β a Windows kernel-level EDR evasion driver
Details here π https://thehackernews.com/2025/04/mustang-panda-targets-myanmar-with.html
π₯17π9π5β‘1
π¨ New NTLM flaw (CVE-2025-24054) is being actively exploited to steal Windows credentialsβjust by downloading a file. No clicks, no execution needed.
This "low-interaction" bug leaks NTLMv2 hashes via SMBβperfect for pass-the-hash attacks.
π Details here: https://thehackernews.com/2025/04/cve-2025-24054-under-active.html
This "low-interaction" bug leaks NTLMv2 hashes via SMBβperfect for pass-the-hash attacks.
π Details here: https://thehackernews.com/2025/04/cve-2025-24054-under-active.html
π22π€―16