π¨ Warning: A new high-severity Google Chrome flaw is being actively exploited in the wild.
CVE-2025-4664 allows attackers to steal sensitive data like account credentials via crafted HTML + image traps.
It affects Chrome < 136.0.7103.113 β and likely other Chromium-based browsers.
π Details: https://thehackernews.com/2025/05/new-chrome-vulnerability-enables-cross.html
CVE-2025-4664 allows attackers to steal sensitive data like account credentials via crafted HTML + image traps.
It affects Chrome < 136.0.7103.113 β and likely other Chromium-based browsers.
π Details: https://thehackernews.com/2025/05/new-chrome-vulnerability-enables-cross.html
π19π±12π₯1
π¨ One email. One click. Full inbox compromise.
APT28 is back with Operation RoundPress, exploiting zero-days in MDaemon, Roundcube, Zimbra & Horde to steal emails from govs, defense orgs & academics across Ukraine, Bulgaria, Greece & more.
π Read: https://thehackernews.com/2025/05/russia-linked-apt28-exploited-mdaemon.html
APT28 is back with Operation RoundPress, exploiting zero-days in MDaemon, Roundcube, Zimbra & Horde to steal emails from govs, defense orgs & academics across Ukraine, Bulgaria, Greece & more.
π Read: https://thehackernews.com/2025/05/russia-linked-apt28-exploited-mdaemon.html
π16π₯7
π¨ 2,000+ devs downloaded this npm package... and it was hiding malware
A seemingly harmless utility used Google Calendar as a stealth command link.
βUnicode tricks
βMulti-stage payloads
βReal downloads
βThe kicker? Itβs still live
Read here: https://thehackernews.com/2025/05/malicious-npm-package-leverages-unicode.html
A seemingly harmless utility used Google Calendar as a stealth command link.
βUnicode tricks
βMulti-stage payloads
βReal downloads
βThe kicker? Itβs still live
Read here: https://thehackernews.com/2025/05/malicious-npm-package-leverages-unicode.html
π15π₯4π€―1
π₯ Cybercriminals are now using Microsoftβs own Quick Assist tool to deploy ransomware like Black Basta. And with Ransomware-as-a-Service, anyone can launch an attack.
No BCDR? Youβre gambling your business.
Learn 5 must-have recovery moves now β https://thehackernews.com/2025/05/top-5-bcdr-capabilities-for-ransomware-defense.html
No BCDR? Youβre gambling your business.
Learn 5 must-have recovery moves now β https://thehackernews.com/2025/05/top-5-bcdr-capabilities-for-ransomware-defense.html
π9π4π₯4π€2
π Your last pen test passed. So why was there still a breach?
Compliance checks a box. Attackers exploit what happens next. Verizonβs 2025 report shows a 34% spike in exploited vulnerabilities β most after audits.
π Itβs time to move beyond point-in-time testing.
Only continuous pen testing + EASM reveals what attackers find first.
π See what your strategy might be missing: https://thehackernews.com/2025/05/pen-testing-for-compliance-only-its.html
Compliance checks a box. Attackers exploit what happens next. Verizonβs 2025 report shows a 34% spike in exploited vulnerabilities β most after audits.
π Itβs time to move beyond point-in-time testing.
Only continuous pen testing + EASM reveals what attackers find first.
π See what your strategy might be missing: https://thehackernews.com/2025/05/pen-testing-for-compliance-only-its.html
π9π2
π·οΈ NEW WEBINAR: Learn about Scattered Spiderβs evolving TTPs and how to defend your organization π·οΈ
Join Push Security to learn about Scattered Spiderβs current and future TTPs and how to stop breaches beginning with account takeover.
Register here π https://thn.news/scattered-spider-2025
Join Push Security to learn about Scattered Spiderβs current and future TTPs and how to stop breaches beginning with account takeover.
Register here π https://thn.news/scattered-spider-2025
π11π€―1
π¨ Coinbase insider breach exposed. Hackers bribed support agents to steal user dataβthen tried to extort $20M.
π§ No crypto lost, but names, emails, and IDs were leaked.
π‘οΈ Coinbase is reimbursing victims + offering a $20M reward.
π Full story β https://thehackernews.com/2025/05/coinbase-agents-bribed-data-of-1-users.html
π§ No crypto lost, but names, emails, and IDs were leaked.
π‘οΈ Coinbase is reimbursing victims + offering a $20M reward.
π Full story β https://thehackernews.com/2025/05/coinbase-agents-bribed-data-of-1-users.html
π±9π6π6π€2
π Meta vs. EuropeβRound 2
Starting May 27, Meta plans to train its AI using Facebook & Instagram user data across the E.U.βwithout asking for consent.
Privacy watchdog noyb says itβs illegal. A class action may be coming.
Full story: https://thehackernews.com/2025/05/meta-to-train-ai-on-eu-user-data-from.html
Starting May 27, Meta plans to train its AI using Facebook & Instagram user data across the E.U.βwithout asking for consent.
Privacy watchdog noyb says itβs illegal. A class action may be coming.
Full story: https://thehackernews.com/2025/05/meta-to-train-ai-on-eu-user-data-from.html
π15π9π€―5π€3
π« Your firewall isn't brokenβit's just outdated.
AI-powered attacks are faster than ever. Still exposing your network with public IPs? You're playing defense with a blindfold.
Zscaler's Zero Trust model flips the scriptβno public IPs, no easy targets. It's not magic. It's strategy.
π The most secure network is the one they can't see.
π Discover how it works β https://thehackernews.com/expert-insights/2025/05/eliminating-public-ips-case-for-zero.html
AI-powered attacks are faster than ever. Still exposing your network with public IPs? You're playing defense with a blindfold.
Zscaler's Zero Trust model flips the scriptβno public IPs, no easy targets. It's not magic. It's strategy.
π The most secure network is the one they can't see.
π Discover how it works β https://thehackernews.com/expert-insights/2025/05/eliminating-public-ips-case-for-zero.html
π13π₯3π€3
π» Spectre Isnβt Dead. Itβs Mutating! New CPU flaw hits ALL modern Intel chips.
π Researchers at ETH Zurich and VUSec uncovered Spectre-style Intel CPU flaws (CVE-2024-45332, CVE-2024-28956, CVE-2025-24495) that leak memory across users, guests, and hostsβat rates up to 17KB/sec.
Read details β https://thehackernews.com/2025/05/researchers-expose-new-intel-cpu-flaws.html
Patches are out. But is this just another Band-Aid?
π Researchers at ETH Zurich and VUSec uncovered Spectre-style Intel CPU flaws (CVE-2024-45332, CVE-2024-28956, CVE-2025-24495) that leak memory across users, guests, and hostsβat rates up to 17KB/sec.
Read details β https://thehackernews.com/2025/05/researchers-expose-new-intel-cpu-flaws.html
Patches are out. But is this just another Band-Aid?
β‘15π7π₯3π3
π¨ A new Windows-based botnetβHTTPBotβis quietly choking login and payment systems across Chinaβs gaming and tech sectors.
π₯ Over 200 targeted attacks since April 2025
π§ Mimics real users with Chrome, cookies & HTTP/2
Learn more about this: https://thehackernews.com/2025/05/new-httpbot-botnet-launches-200.html
π₯ Over 200 targeted attacks since April 2025
π§ Mimics real users with Chrome, cookies & HTTP/2
Learn more about this: https://thehackernews.com/2025/05/new-httpbot-botnet-launches-200.html
π€11π5π€―4π3π2
π What if your most sensitive data is already exposedβand no one knows yet?
AI-powered DLP, zero trust, browser isolation, and cloud posture control are reshaping data defense.
Learn 10 must-do strategies now β https://thehackernews.com/2025/05/top-10-best-practices-for-effective.html
AI-powered DLP, zero trust, browser isolation, and cloud posture control are reshaping data defense.
Learn 10 must-do strategies now β https://thehackernews.com/2025/05/top-10-best-practices-for-effective.html
π28π€―5π2π±1
π 2 critical Firefox zero-days β CVE-2025-4918 & CVE-2025-4919 β proven exploitable.
Attackers can read/write sensitive data or trigger remote code execution.
Affects all versions before: β’ Firefox 138.0.4 β’ ESR 128.10.1 / 115.23.1
π Patch now. Full story: https://thehackernews.com/2025/05/firefox-patches-2-zero-days-exploited.html
Attackers can read/write sensitive data or trigger remote code execution.
Affects all versions before: β’ Firefox 138.0.4 β’ ESR 128.10.1 / 115.23.1
π Patch now. Full story: https://thehackernews.com/2025/05/firefox-patches-2-zero-days-exploited.html
π30π15π€―9π±2π€1
βWe never drop tools on machines.β
84% of major cyberattacks now use built-in system tools like PowerShell & netsh.exe β not malware.
π Bitdefender analyzed 700,000 incidents: attackers are hiding in plain sight using legit admin utilities.
Living Off the Land isnβt just stealthβitβs standard.
β See how PHASR flips the script: smart blocking, zero disruption.
π Read: https://thehackernews.com/expert-insights/2025/05/living-off-land-what-we-learned-from.html
84% of major cyberattacks now use built-in system tools like PowerShell & netsh.exe β not malware.
π Bitdefender analyzed 700,000 incidents: attackers are hiding in plain sight using legit admin utilities.
Living Off the Land isnβt just stealthβitβs standard.
β See how PHASR flips the script: smart blocking, zero disruption.
π Read: https://thehackernews.com/expert-insights/2025/05/living-off-land-what-we-learned-from.html
π23π±2
β‘ Weekly Recap: Zero-days are just the tip. This weekβs threat activity points to a deeper shift in how attackers operate.
Read now, recalibrate faster β https://thehackernews.com/2025/05/weekly-recap-zero-day-exploits-insider.html
Read now, recalibrate faster β https://thehackernews.com/2025/05/weekly-recap-zero-day-exploits-insider.html
π6π4
π¨ New favorite toy of ransomware gangs? A stealthy malware called Skitnetβnow seen in live attacks.
First sold on dark forums in 2024, it's now powering phishing campaigns from groups like Black Basta in 2025.
β Reverse shell via DNS
β Evades AV using GetProcAddress
β Deploys legit tools like AnyDesk
β Modular, stealthy, persistent
Learn how it works: https://thehackernews.com/2025/05/ransomware-gangs-use-skitnet-malware.html
First sold on dark forums in 2024, it's now powering phishing campaigns from groups like Black Basta in 2025.
β Reverse shell via DNS
β Evades AV using GetProcAddress
β Deploys legit tools like AnyDesk
β Modular, stealthy, persistent
Learn how it works: https://thehackernews.com/2025/05/ransomware-gangs-use-skitnet-malware.html
π€15π7β‘1π₯1
π₯ CTEM is the new must-have for cybersecurity leaders.
Forget yearly audits. This is about always-on risk testing β and itβs working.
CTEM uses attack simulations, real-time testing & exposure tracking to stay ahead.
Why are top CISOs making the switch?
π Learn how it works: https://thehackernews.com/2025/05/why-ctem-is-winning-bet-for-cisos-in.html
Forget yearly audits. This is about always-on risk testing β and itβs working.
CTEM uses attack simulations, real-time testing & exposure tracking to stay ahead.
Why are top CISOs making the switch?
π Learn how it works: https://thehackernews.com/2025/05/why-ctem-is-winning-bet-for-cisos-in.html
π6π3
π WARNING: Popular VMware tool RVTools was hacked to spread Bumblebee malware via its official site.
The site is now offline β but β οΈ do not download from unofficial sources either.
Meanwhile, Procolored printer software was found carrying a Delphi backdoor and a $974K crypto clipper named SnipVex, which infects .exe files to hijack Bitcoin transactions.
π Full details here: https://thehackernews.com/2025/05/rvtools-official-site-hacked-to-deliver.html
The site is now offline β but β οΈ do not download from unofficial sources either.
Meanwhile, Procolored printer software was found carrying a Delphi backdoor and a $974K crypto clipper named SnipVex, which infects .exe files to hijack Bitcoin transactions.
π Full details here: https://thehackernews.com/2025/05/rvtools-official-site-hacked-to-deliver.html
β‘16π14π€―7π€5π1
π Devs, you're being hunted.
3 Python packages quietly turned stolen emails into verified TikTok & Instagram targets. Another posed as a dev toolβactually a stealth backdoor.
π Full story β https://thehackernews.com/2025/05/malicious-pypi-packages-exploit.html
3 Python packages quietly turned stolen emails into verified TikTok & Instagram targets. Another posed as a dev toolβactually a stealth backdoor.
π Full story β https://thehackernews.com/2025/05/malicious-pypi-packages-exploit.html
π€―16π9π₯7π3π±1
π¨ RedisRaider is hereβand it's hunting Linux servers.
A new cryptojacking campaign is weaponizing Redis config commands to silently hijack Linux systems and mine Monero.
π Learn more: https://thehackernews.com/2025/05/go-based-malware-deploys-xmrig-miner-on.html
A new cryptojacking campaign is weaponizing Redis config commands to silently hijack Linux systems and mine Monero.
π Learn more: https://thehackernews.com/2025/05/go-based-malware-deploys-xmrig-miner-on.html
π7π₯7π€―4π1