๐จ One email. One click. Full inbox compromise.
APT28 is back with Operation RoundPress, exploiting zero-days in MDaemon, Roundcube, Zimbra & Horde to steal emails from govs, defense orgs & academics across Ukraine, Bulgaria, Greece & more.
๐ Read: https://thehackernews.com/2025/05/russia-linked-apt28-exploited-mdaemon.html
APT28 is back with Operation RoundPress, exploiting zero-days in MDaemon, Roundcube, Zimbra & Horde to steal emails from govs, defense orgs & academics across Ukraine, Bulgaria, Greece & more.
๐ Read: https://thehackernews.com/2025/05/russia-linked-apt28-exploited-mdaemon.html
๐16๐ฅ7
๐จ 2,000+ devs downloaded this npm package... and it was hiding malware
A seemingly harmless utility used Google Calendar as a stealth command link.
โUnicode tricks
โMulti-stage payloads
โReal downloads
โThe kicker? Itโs still live
Read here: https://thehackernews.com/2025/05/malicious-npm-package-leverages-unicode.html
A seemingly harmless utility used Google Calendar as a stealth command link.
โUnicode tricks
โMulti-stage payloads
โReal downloads
โThe kicker? Itโs still live
Read here: https://thehackernews.com/2025/05/malicious-npm-package-leverages-unicode.html
๐15๐ฅ4๐คฏ1
๐ฅ Cybercriminals are now using Microsoftโs own Quick Assist tool to deploy ransomware like Black Basta. And with Ransomware-as-a-Service, anyone can launch an attack.
No BCDR? Youโre gambling your business.
Learn 5 must-have recovery moves now โ https://thehackernews.com/2025/05/top-5-bcdr-capabilities-for-ransomware-defense.html
No BCDR? Youโre gambling your business.
Learn 5 must-have recovery moves now โ https://thehackernews.com/2025/05/top-5-bcdr-capabilities-for-ransomware-defense.html
๐9๐4๐ฅ4๐ค2
๐ Your last pen test passed. So why was there still a breach?
Compliance checks a box. Attackers exploit what happens next. Verizonโs 2025 report shows a 34% spike in exploited vulnerabilities โ most after audits.
๐ Itโs time to move beyond point-in-time testing.
Only continuous pen testing + EASM reveals what attackers find first.
๐ See what your strategy might be missing: https://thehackernews.com/2025/05/pen-testing-for-compliance-only-its.html
Compliance checks a box. Attackers exploit what happens next. Verizonโs 2025 report shows a 34% spike in exploited vulnerabilities โ most after audits.
๐ Itโs time to move beyond point-in-time testing.
Only continuous pen testing + EASM reveals what attackers find first.
๐ See what your strategy might be missing: https://thehackernews.com/2025/05/pen-testing-for-compliance-only-its.html
๐9๐2
๐ท๏ธ NEW WEBINAR: Learn about Scattered Spiderโs evolving TTPs and how to defend your organization ๐ท๏ธ
Join Push Security to learn about Scattered Spiderโs current and future TTPs and how to stop breaches beginning with account takeover.
Register here ๐ https://thn.news/scattered-spider-2025
Join Push Security to learn about Scattered Spiderโs current and future TTPs and how to stop breaches beginning with account takeover.
Register here ๐ https://thn.news/scattered-spider-2025
๐11๐คฏ1
๐จ Coinbase insider breach exposed. Hackers bribed support agents to steal user dataโthen tried to extort $20M.
๐ง No crypto lost, but names, emails, and IDs were leaked.
๐ก๏ธ Coinbase is reimbursing victims + offering a $20M reward.
๐ Full story โ https://thehackernews.com/2025/05/coinbase-agents-bribed-data-of-1-users.html
๐ง No crypto lost, but names, emails, and IDs were leaked.
๐ก๏ธ Coinbase is reimbursing victims + offering a $20M reward.
๐ Full story โ https://thehackernews.com/2025/05/coinbase-agents-bribed-data-of-1-users.html
๐ฑ9๐6๐6๐ค2
๐ Meta vs. EuropeโRound 2
Starting May 27, Meta plans to train its AI using Facebook & Instagram user data across the E.U.โwithout asking for consent.
Privacy watchdog noyb says itโs illegal. A class action may be coming.
Full story: https://thehackernews.com/2025/05/meta-to-train-ai-on-eu-user-data-from.html
Starting May 27, Meta plans to train its AI using Facebook & Instagram user data across the E.U.โwithout asking for consent.
Privacy watchdog noyb says itโs illegal. A class action may be coming.
Full story: https://thehackernews.com/2025/05/meta-to-train-ai-on-eu-user-data-from.html
๐15๐9๐คฏ5๐ค3
๐ซ Your firewall isn't brokenโit's just outdated.
AI-powered attacks are faster than ever. Still exposing your network with public IPs? You're playing defense with a blindfold.
Zscaler's Zero Trust model flips the scriptโno public IPs, no easy targets. It's not magic. It's strategy.
๐ The most secure network is the one they can't see.
๐ Discover how it works โ https://thehackernews.com/expert-insights/2025/05/eliminating-public-ips-case-for-zero.html
AI-powered attacks are faster than ever. Still exposing your network with public IPs? You're playing defense with a blindfold.
Zscaler's Zero Trust model flips the scriptโno public IPs, no easy targets. It's not magic. It's strategy.
๐ The most secure network is the one they can't see.
๐ Discover how it works โ https://thehackernews.com/expert-insights/2025/05/eliminating-public-ips-case-for-zero.html
๐13๐ฅ3๐ค3
๐ป Spectre Isnโt Dead. Itโs Mutating! New CPU flaw hits ALL modern Intel chips.
๐ Researchers at ETH Zurich and VUSec uncovered Spectre-style Intel CPU flaws (CVE-2024-45332, CVE-2024-28956, CVE-2025-24495) that leak memory across users, guests, and hostsโat rates up to 17KB/sec.
Read details โ https://thehackernews.com/2025/05/researchers-expose-new-intel-cpu-flaws.html
Patches are out. But is this just another Band-Aid?
๐ Researchers at ETH Zurich and VUSec uncovered Spectre-style Intel CPU flaws (CVE-2024-45332, CVE-2024-28956, CVE-2025-24495) that leak memory across users, guests, and hostsโat rates up to 17KB/sec.
Read details โ https://thehackernews.com/2025/05/researchers-expose-new-intel-cpu-flaws.html
Patches are out. But is this just another Band-Aid?
โก15๐7๐ฅ3๐3
๐จ A new Windows-based botnetโHTTPBotโis quietly choking login and payment systems across Chinaโs gaming and tech sectors.
๐ฅ Over 200 targeted attacks since April 2025
๐ง Mimics real users with Chrome, cookies & HTTP/2
Learn more about this: https://thehackernews.com/2025/05/new-httpbot-botnet-launches-200.html
๐ฅ Over 200 targeted attacks since April 2025
๐ง Mimics real users with Chrome, cookies & HTTP/2
Learn more about this: https://thehackernews.com/2025/05/new-httpbot-botnet-launches-200.html
๐ค11๐5๐คฏ4๐3๐2
๐ What if your most sensitive data is already exposedโand no one knows yet?
AI-powered DLP, zero trust, browser isolation, and cloud posture control are reshaping data defense.
Learn 10 must-do strategies now โ https://thehackernews.com/2025/05/top-10-best-practices-for-effective.html
AI-powered DLP, zero trust, browser isolation, and cloud posture control are reshaping data defense.
Learn 10 must-do strategies now โ https://thehackernews.com/2025/05/top-10-best-practices-for-effective.html
๐28๐คฏ5๐2๐ฑ1
๐ 2 critical Firefox zero-days โ CVE-2025-4918 & CVE-2025-4919 โ proven exploitable.
Attackers can read/write sensitive data or trigger remote code execution.
Affects all versions before: โข Firefox 138.0.4 โข ESR 128.10.1 / 115.23.1
๐ Patch now. Full story: https://thehackernews.com/2025/05/firefox-patches-2-zero-days-exploited.html
Attackers can read/write sensitive data or trigger remote code execution.
Affects all versions before: โข Firefox 138.0.4 โข ESR 128.10.1 / 115.23.1
๐ Patch now. Full story: https://thehackernews.com/2025/05/firefox-patches-2-zero-days-exploited.html
๐30๐15๐คฏ9๐ฑ2๐ค1
โWe never drop tools on machines.โ
84% of major cyberattacks now use built-in system tools like PowerShell & netsh.exe โ not malware.
๐ Bitdefender analyzed 700,000 incidents: attackers are hiding in plain sight using legit admin utilities.
Living Off the Land isnโt just stealthโitโs standard.
โ See how PHASR flips the script: smart blocking, zero disruption.
๐ Read: https://thehackernews.com/expert-insights/2025/05/living-off-land-what-we-learned-from.html
84% of major cyberattacks now use built-in system tools like PowerShell & netsh.exe โ not malware.
๐ Bitdefender analyzed 700,000 incidents: attackers are hiding in plain sight using legit admin utilities.
Living Off the Land isnโt just stealthโitโs standard.
โ See how PHASR flips the script: smart blocking, zero disruption.
๐ Read: https://thehackernews.com/expert-insights/2025/05/living-off-land-what-we-learned-from.html
๐23๐ฑ2
โก Weekly Recap: Zero-days are just the tip. This weekโs threat activity points to a deeper shift in how attackers operate.
Read now, recalibrate faster โ https://thehackernews.com/2025/05/weekly-recap-zero-day-exploits-insider.html
Read now, recalibrate faster โ https://thehackernews.com/2025/05/weekly-recap-zero-day-exploits-insider.html
๐6๐4
๐จ New favorite toy of ransomware gangs? A stealthy malware called Skitnetโnow seen in live attacks.
First sold on dark forums in 2024, it's now powering phishing campaigns from groups like Black Basta in 2025.
โ Reverse shell via DNS
โ Evades AV using GetProcAddress
โ Deploys legit tools like AnyDesk
โ Modular, stealthy, persistent
Learn how it works: https://thehackernews.com/2025/05/ransomware-gangs-use-skitnet-malware.html
First sold on dark forums in 2024, it's now powering phishing campaigns from groups like Black Basta in 2025.
โ Reverse shell via DNS
โ Evades AV using GetProcAddress
โ Deploys legit tools like AnyDesk
โ Modular, stealthy, persistent
Learn how it works: https://thehackernews.com/2025/05/ransomware-gangs-use-skitnet-malware.html
๐ค15๐7โก1๐ฅ1
๐ฅ CTEM is the new must-have for cybersecurity leaders.
Forget yearly audits. This is about always-on risk testing โ and itโs working.
CTEM uses attack simulations, real-time testing & exposure tracking to stay ahead.
Why are top CISOs making the switch?
๐ Learn how it works: https://thehackernews.com/2025/05/why-ctem-is-winning-bet-for-cisos-in.html
Forget yearly audits. This is about always-on risk testing โ and itโs working.
CTEM uses attack simulations, real-time testing & exposure tracking to stay ahead.
Why are top CISOs making the switch?
๐ Learn how it works: https://thehackernews.com/2025/05/why-ctem-is-winning-bet-for-cisos-in.html
๐6๐3
๐ WARNING: Popular VMware tool RVTools was hacked to spread Bumblebee malware via its official site.
The site is now offline โ but โ ๏ธ do not download from unofficial sources either.
Meanwhile, Procolored printer software was found carrying a Delphi backdoor and a $974K crypto clipper named SnipVex, which infects .exe files to hijack Bitcoin transactions.
๐ Full details here: https://thehackernews.com/2025/05/rvtools-official-site-hacked-to-deliver.html
The site is now offline โ but โ ๏ธ do not download from unofficial sources either.
Meanwhile, Procolored printer software was found carrying a Delphi backdoor and a $974K crypto clipper named SnipVex, which infects .exe files to hijack Bitcoin transactions.
๐ Full details here: https://thehackernews.com/2025/05/rvtools-official-site-hacked-to-deliver.html
โก16๐14๐คฏ7๐ค5๐1
๐ Devs, you're being hunted.
3 Python packages quietly turned stolen emails into verified TikTok & Instagram targets. Another posed as a dev toolโactually a stealth backdoor.
๐ Full story โ https://thehackernews.com/2025/05/malicious-pypi-packages-exploit.html
3 Python packages quietly turned stolen emails into verified TikTok & Instagram targets. Another posed as a dev toolโactually a stealth backdoor.
๐ Full story โ https://thehackernews.com/2025/05/malicious-pypi-packages-exploit.html
๐คฏ16๐9๐ฅ7๐3๐ฑ1
๐จ RedisRaider is hereโand it's hunting Linux servers.
A new cryptojacking campaign is weaponizing Redis config commands to silently hijack Linux systems and mine Monero.
๐ Learn more: https://thehackernews.com/2025/05/go-based-malware-deploys-xmrig-miner-on.html
A new cryptojacking campaign is weaponizing Redis config commands to silently hijack Linux systems and mine Monero.
๐ Learn more: https://thehackernews.com/2025/05/go-based-malware-deploys-xmrig-miner-on.html
๐7๐ฅ7๐คฏ4๐1
๐จ New Chinese APT uncovered!
ESET reveals MarsSnake, a stealth backdoor used in a multi-year campaign targeting a Saudi org via fake flight emails.
The threat actor? UnsolicitedBookerโand itโs not working alone.
๐ More tactics, ties, and twists โ https://thehackernews.com/2025/05/chinese-hackers-deploy-marssnake.html
ESET reveals MarsSnake, a stealth backdoor used in a multi-year campaign targeting a Saudi org via fake flight emails.
The threat actor? UnsolicitedBookerโand itโs not working alone.
๐ More tactics, ties, and twists โ https://thehackernews.com/2025/05/chinese-hackers-deploy-marssnake.html
๐10๐คฏ7๐ฅ1