๐จ Critical ASUS Router Flaw Exposed
9.2 CVSS | Remote Hijack Risk
A new bugโCVE-2025-2492โlets attackers remotely execute functions on ASUS routers with AiCloud enabled.
๐ Details: https://thehackernews.com/2025/04/asus-confirms-critical-flaw-in-aicloud.html
9.2 CVSS | Remote Hijack Risk
A new bugโCVE-2025-2492โlets attackers remotely execute functions on ASUS routers with AiCloud enabled.
๐ Details: https://thehackernews.com/2025/04/asus-confirms-critical-flaw-in-aicloud.html
๐20๐ฑ4๐3๐ฅ1
๐จ Malware Alert for Developers!
3 npm packages are mimicking a popular Telegram bot libraryโbut secretly install SSH backdoors & exfiltrate your data.
They replicate the look of node-telegram-bot-api (100K+ weekly users), use starjacking to fake credibility, and target Linux systems. Removal โ protectionโSSH keys stay behind.
Learn more: https://thehackernews.com/2025/04/rogue-npm-packages-mimic-telegram-bot.html
3 npm packages are mimicking a popular Telegram bot libraryโbut secretly install SSH backdoors & exfiltrate your data.
They replicate the look of node-telegram-bot-api (100K+ weekly users), use starjacking to fake credibility, and target Linux systems. Removal โ protectionโSSH keys stay behind.
Learn more: https://thehackernews.com/2025/04/rogue-npm-packages-mimic-telegram-bot.html
๐35๐คฏ7๐2โก1
๐จ Russiaโs APT29 hits EU diplomats with new malware disguised as wine-tasting invites.
๐ท GRAPELOADER is a stealthy first-stage loader hidden in โwine-zipโ
๐ฏ Targets: European Ministries of Foreign Affairs
๐ Launches WINELOADER for deep system access
๐ Full report: https://thehackernews.com/2025/04/apt29-deploys-grapeloader-malware.html
๐ท GRAPELOADER is a stealthy first-stage loader hidden in โwine-zipโ
๐ฏ Targets: European Ministries of Foreign Affairs
๐ Launches WINELOADER for deep system access
๐ Full report: https://thehackernews.com/2025/04/apt29-deploys-grapeloader-malware.html
๐35๐25๐ฅ3
๐จ Surge in cyberattacks tied to Russian bulletproof host Proton66 since Jan 8, 2025.
New research links it to brute-force, malware, ransomwareโeven traffic routed via Kaspersky Labโs network path.
Attackers exploit 2024โ25 zero-days, deploy SuperBlack & WeaXor ransomware, and run phishing via hacked WordPress sites.
Learn more: https://thehackernews.com/2025/04/hackers-abuse-russian-bulletproof-host.html
New research links it to brute-force, malware, ransomwareโeven traffic routed via Kaspersky Labโs network path.
Attackers exploit 2024โ25 zero-days, deploy SuperBlack & WeaXor ransomware, and run phishing via hacked WordPress sites.
Learn more: https://thehackernews.com/2025/04/hackers-abuse-russian-bulletproof-host.html
๐ฅ20๐7
โก From zero-click iOS exploits to NTLM credential leaks and the 4Chan breach โ this weekโs cyber threats hit where trust runs deepest.
THNโs Weekly Recap breaks down the stealth, the strategy, and the systems under fire.
๐ Read: https://thehackernews.com/2025/04/thn-weekly-recap-ios-zero-days-4chan.html
THNโs Weekly Recap breaks down the stealth, the strategy, and the systems under fire.
๐ Read: https://thehackernews.com/2025/04/thn-weekly-recap-ios-zero-days-4chan.html
๐ฅ18โก2
โ ๏ธ Hold your phone near your card... and they drain your bank account.
A new Android malware-as-a-service, SuperCard X, is targeting Italians with NFC relay attacksโletting cybercriminals remotely steal card data and pull off ATM & PoS fraud.
๐ Learn how it works: https://thehackernews.com/2025/04/supercard-x-android-malware-enables.html
Googleโs now working on a new Android update to block risky app installs. But until thenโstay sharp. Think before tapping.
A new Android malware-as-a-service, SuperCard X, is targeting Italians with NFC relay attacksโletting cybercriminals remotely steal card data and pull off ATM & PoS fraud.
๐ Learn how it works: https://thehackernews.com/2025/04/supercard-x-android-malware-enables.html
Googleโs now working on a new Android update to block risky app installs. But until thenโstay sharp. Think before tapping.
๐18๐ฅ9๐5๐3๐คฏ3โก1๐ค1
๐จ Your MDM isnโt enough. Most breaches start with a device you canโt see.
Unmanaged laptops, outdated personal phones, misconfigured toolsโattackers love them.
MDM/EDR miss the mark.
Device Trust closes the gap.
๐ See how: https://thehackernews.com/2025/04/5-reasons-device-management-isnt-device.html
Unmanaged laptops, outdated personal phones, misconfigured toolsโattackers love them.
MDM/EDR miss the mark.
Device Trust closes the gap.
๐ See how: https://thehackernews.com/2025/04/5-reasons-device-management-isnt-device.html
๐12๐ฅ5โก2๐2
๐ต๏ธโโ๏ธ Kimsuky is backโand digging deep.
A new Larva-24005 campaign is exploiting old RDP bugs (BlueKeep, CVE-2019-0708) to breach systems in South Korea, Japan & beyondโwith targets across energy, finance & tech.
Learn more: https://thehackernews.com/2025/04/kimsuky-exploits-bluekeep-rdp.html
A new Larva-24005 campaign is exploiting old RDP bugs (BlueKeep, CVE-2019-0708) to breach systems in South Korea, Japan & beyondโwith targets across energy, finance & tech.
Learn more: https://thehackernews.com/2025/04/kimsuky-exploits-bluekeep-rdp.html
๐ฅ17๐9
๐ฃ Lotus Panda, a China-linked APT, breached key sectors across Southeast Asiaโgovt, telecom, air trafficโfrom Aug 2024 to Feb 2025.
New tools. Stolen Chrome data. Hijacked legit software.
Read full report ๐ https://thehackernews.com/2025/04/lotus-panda-hacks-se-asian-governments.html
New tools. Stolen Chrome data. Hijacked legit software.
Read full report ๐ https://thehackernews.com/2025/04/lotus-panda-hacks-se-asian-governments.html
๐ค13๐2๐คฏ2๐ฑ1
โ ๏ธ AI is Supercharging DDoS Attacks.
Hackers now use AI to launch smarter, harder-to-stop DDoS attacks. Most defenses fail because theyโre poorly set up โ not because theyโre weak.
๐ Free DDoS Threat Check โ https://thehackernews.com/expert-insights/2025/04/how-ai-and-iot-are-supercharging-ddos.html
Hackers now use AI to launch smarter, harder-to-stop DDoS attacks. Most defenses fail because theyโre poorly set up โ not because theyโre weak.
๐ Free DDoS Threat Check โ https://thehackernews.com/expert-insights/2025/04/how-ai-and-iot-are-supercharging-ddos.html
๐ฅ13๐4
๐ฅ Microsoft boosts security after major China-backed breach.
โMSA sign-ins moved to Azure confidential VMs
โ92% of staff now use phishing-resistant MFA
โ81% of code branches protected with proof-of-presence
โNew Quick Machine Recovery auto-fixes Windows boot failures
See details: https://thehackernews.com/2025/04/microsoft-secures-msa-signing-with.html
โMSA sign-ins moved to Azure confidential VMs
โ92% of staff now use phishing-resistant MFA
โ81% of code branches protected with proof-of-presence
โNew Quick Machine Recovery auto-fixes Windows boot failures
See details: https://thehackernews.com/2025/04/microsoft-secures-msa-signing-with.html
๐20๐8๐1
๐จ Signed by Google. Hosted by Google. Hijacked by Hackers.
๐ Hackers sent real emails from [email protected] โ fully verified, signed, no warnings. Victims handed over passwords, believing it was legit.
โ๏ธ Real Google email
โ๏ธ Fake login on Google Sites
โ๏ธ Passed DKIM, SPF, DMARC
๐ Full story: https://thehackernews.com/2025/04/phishers-exploit-google-sites-and-dkim.html
๐ Hackers sent real emails from [email protected] โ fully verified, signed, no warnings. Victims handed over passwords, believing it was legit.
โ๏ธ Real Google email
โ๏ธ Fake login on Google Sites
โ๏ธ Passed DKIM, SPF, DMARC
๐ Full story: https://thehackernews.com/2025/04/phishers-exploit-google-sites-and-dkim.html
๐ฑ52๐14๐ฅ11๐10โก3๐2๐คฏ2
Each user is unique. Their security should be too.
Join Bitdefender on April 23 for the LIVE launch of GravityZone PHASR โ a breakthrough in reducing employee attack surfaces by up to 95%.
๐ Adaptive, user-focused protection
๐ฅ Live demo + expert insights
๐ Secure your spot here: https://thn.news/gravityzone-bitdefender-x
Join Bitdefender on April 23 for the LIVE launch of GravityZone PHASR โ a breakthrough in reducing employee attack surfaces by up to 95%.
๐ Adaptive, user-focused protection
๐ฅ Live demo + expert insights
๐ Secure your spot here: https://thn.news/gravityzone-bitdefender-x
๐10๐6๐ค2๐ฅ1
This media is not supported in your browser
VIEW IN TELEGRAM
๐ Privilege Escalation in Google Cloud!
A serious bug in Cloud Composer (GCP) let attackers with edit access take control of key services like Cloud Storage and Artifact Registry by uploading malicious code.
๐ Read this story here: https://thehackernews.com/2025/04/gcp-cloud-composer-bug-let-attackers.html
A serious bug in Cloud Composer (GCP) let attackers with edit access take control of key services like Cloud Storage and Artifact Registry by uploading malicious code.
๐ Read this story here: https://thehackernews.com/2025/04/gcp-cloud-composer-bug-let-attackers.html
๐12๐ฅ5๐ค3๐2
๐ Browsers are the new battleground. 70% of modern malware starts here, yet most organizations overlook it.
AI tools, phishing, shadow IT, and risky extensions hide in plain sight.
Legacy security is inadequate. Monitor where work happensโthe browser.
๐ Explore new risks. Read: https://thehackernews.com/2025/04/5-major-concerns-with-employees-using.html
AI tools, phishing, shadow IT, and risky extensions hide in plain sight.
Legacy security is inadequate. Monitor where work happensโthe browser.
๐ Explore new risks. Read: https://thehackernews.com/2025/04/5-major-concerns-with-employees-using.html
๐11๐5๐ฅ3
๐ New Malware Targets Docker โ but itโs not about crypto mining anymore.
Hackers are hijacking Docker to run fake nodes on a Web3 network called Teneo. Instead of mining, they farm TENEO tokens by sending fake heartbeat signals.
๐น 325+ downloads from Docker Hub
Read more โ https://thehackernews.com/2025/04/docker-malware-exploits-teneo-web3-node.html
Hackers are hijacking Docker to run fake nodes on a Web3 network called Teneo. Instead of mining, they farm TENEO tokens by sending fake heartbeat signals.
๐น 325+ downloads from Docker Hub
Read more โ https://thehackernews.com/2025/04/docker-malware-exploits-teneo-web3-node.html
๐25๐ฅ3๐3
๐ฅ Google pulls the plug on third-party cookie prompts in Chrome.
No more new pop-ups โ just Incognito upgrades & IP protection by Q3 2025.
While Firefox & Safari banned 3rd-party cookies in 2020, Google stallsโcaught between privacy & profit.
Read โ https://thehackernews.com/2025/04/google-drops-cookie-prompt-in-chrome.html
No more new pop-ups โ just Incognito upgrades & IP protection by Q3 2025.
While Firefox & Safari banned 3rd-party cookies in 2020, Google stallsโcaught between privacy & profit.
Read โ https://thehackernews.com/2025/04/google-drops-cookie-prompt-in-chrome.html
๐23๐14๐1
๐จ Crypto Devs, Watch Out!
Ripple's xrpl.js library was backdoored to steal private keys! Over 2.9M downloads, 135K devs at risk.
๐๏ธ Malicious versions: 4.2.1โ4.2.4, 2.14.2
๐ก๏ธ Safe versions: 4.2.5, 2.14.3
๐ค Hacker hijacked a Ripple dev's npm account on April 21, 2025.
๐ Learn more: https://thehackernews.com/2025/04/ripples-xrpljs-npm-package-backdoored.html
Ripple's xrpl.js library was backdoored to steal private keys! Over 2.9M downloads, 135K devs at risk.
๐๏ธ Malicious versions: 4.2.1โ4.2.4, 2.14.2
๐ก๏ธ Safe versions: 4.2.5, 2.14.3
๐ค Hacker hijacked a Ripple dev's npm account on April 21, 2025.
๐ Learn more: https://thehackernews.com/2025/04/ripples-xrpljs-npm-package-backdoored.html
๐16๐คฏ5โก1
๐จ New Tactics from Russian Hackers!
Since March 2025, Russian threat groups UTA0352 & UTA0355 are targeting Ukraine-linked orgs via Microsoft 365 OAuth abuse.
No fake sitesโjust official Microsoft URLs, real Signal/WhatsApp invites, and compromised Ukrainian Gov accounts.
๐ Learn more: https://thehackernews.com/2025/04/russian-hackers-exploit-microsoft-oauth.html
Since March 2025, Russian threat groups UTA0352 & UTA0355 are targeting Ukraine-linked orgs via Microsoft 365 OAuth abuse.
No fake sitesโjust official Microsoft URLs, real Signal/WhatsApp invites, and compromised Ukrainian Gov accounts.
๐ Learn more: https://thehackernews.com/2025/04/russian-hackers-exploit-microsoft-oauth.html
๐15๐ค4๐3๐คฏ2๐1
๐ Phishing isn't just an email problem anymore!
2025's #1 breach method? Identity attacks โ phishing + stolen creds now top software exploits. MFA? Often bypassed. Detection? Too slow.
Real-time browser-based defense is the future. Stop attacks before passwords are stolen.
Learn more: https://thehackernews.com/2025/04/three-reasons-why-browser-is-best-for.html
2025's #1 breach method? Identity attacks โ phishing + stolen creds now top software exploits. MFA? Often bypassed. Detection? Too slow.
Real-time browser-based defense is the future. Stop attacks before passwords are stolen.
Learn more: https://thehackernews.com/2025/04/three-reasons-why-browser-is-best-for.html
๐10๐5๐ค2๐คฏ1