โWe never drop tools on machines.โ
84% of major cyberattacks now use built-in system tools like PowerShell & netsh.exe โ not malware.
๐ Bitdefender analyzed 700,000 incidents: attackers are hiding in plain sight using legit admin utilities.
Living Off the Land isnโt just stealthโitโs standard.
โ See how PHASR flips the script: smart blocking, zero disruption.
๐ Read: https://thehackernews.com/expert-insights/2025/05/living-off-land-what-we-learned-from.html
84% of major cyberattacks now use built-in system tools like PowerShell & netsh.exe โ not malware.
๐ Bitdefender analyzed 700,000 incidents: attackers are hiding in plain sight using legit admin utilities.
Living Off the Land isnโt just stealthโitโs standard.
โ See how PHASR flips the script: smart blocking, zero disruption.
๐ Read: https://thehackernews.com/expert-insights/2025/05/living-off-land-what-we-learned-from.html
๐23๐ฑ2
โก Weekly Recap: Zero-days are just the tip. This weekโs threat activity points to a deeper shift in how attackers operate.
Read now, recalibrate faster โ https://thehackernews.com/2025/05/weekly-recap-zero-day-exploits-insider.html
Read now, recalibrate faster โ https://thehackernews.com/2025/05/weekly-recap-zero-day-exploits-insider.html
๐6๐4
๐จ New favorite toy of ransomware gangs? A stealthy malware called Skitnetโnow seen in live attacks.
First sold on dark forums in 2024, it's now powering phishing campaigns from groups like Black Basta in 2025.
โ Reverse shell via DNS
โ Evades AV using GetProcAddress
โ Deploys legit tools like AnyDesk
โ Modular, stealthy, persistent
Learn how it works: https://thehackernews.com/2025/05/ransomware-gangs-use-skitnet-malware.html
First sold on dark forums in 2024, it's now powering phishing campaigns from groups like Black Basta in 2025.
โ Reverse shell via DNS
โ Evades AV using GetProcAddress
โ Deploys legit tools like AnyDesk
โ Modular, stealthy, persistent
Learn how it works: https://thehackernews.com/2025/05/ransomware-gangs-use-skitnet-malware.html
๐ค15๐7โก1๐ฅ1
๐ฅ CTEM is the new must-have for cybersecurity leaders.
Forget yearly audits. This is about always-on risk testing โ and itโs working.
CTEM uses attack simulations, real-time testing & exposure tracking to stay ahead.
Why are top CISOs making the switch?
๐ Learn how it works: https://thehackernews.com/2025/05/why-ctem-is-winning-bet-for-cisos-in.html
Forget yearly audits. This is about always-on risk testing โ and itโs working.
CTEM uses attack simulations, real-time testing & exposure tracking to stay ahead.
Why are top CISOs making the switch?
๐ Learn how it works: https://thehackernews.com/2025/05/why-ctem-is-winning-bet-for-cisos-in.html
๐6๐3
๐ WARNING: Popular VMware tool RVTools was hacked to spread Bumblebee malware via its official site.
The site is now offline โ but โ ๏ธ do not download from unofficial sources either.
Meanwhile, Procolored printer software was found carrying a Delphi backdoor and a $974K crypto clipper named SnipVex, which infects .exe files to hijack Bitcoin transactions.
๐ Full details here: https://thehackernews.com/2025/05/rvtools-official-site-hacked-to-deliver.html
The site is now offline โ but โ ๏ธ do not download from unofficial sources either.
Meanwhile, Procolored printer software was found carrying a Delphi backdoor and a $974K crypto clipper named SnipVex, which infects .exe files to hijack Bitcoin transactions.
๐ Full details here: https://thehackernews.com/2025/05/rvtools-official-site-hacked-to-deliver.html
โก16๐14๐คฏ7๐ค5๐1
๐ Devs, you're being hunted.
3 Python packages quietly turned stolen emails into verified TikTok & Instagram targets. Another posed as a dev toolโactually a stealth backdoor.
๐ Full story โ https://thehackernews.com/2025/05/malicious-pypi-packages-exploit.html
3 Python packages quietly turned stolen emails into verified TikTok & Instagram targets. Another posed as a dev toolโactually a stealth backdoor.
๐ Full story โ https://thehackernews.com/2025/05/malicious-pypi-packages-exploit.html
๐คฏ16๐9๐ฅ7๐3๐ฑ1
๐จ RedisRaider is hereโand it's hunting Linux servers.
A new cryptojacking campaign is weaponizing Redis config commands to silently hijack Linux systems and mine Monero.
๐ Learn more: https://thehackernews.com/2025/05/go-based-malware-deploys-xmrig-miner-on.html
A new cryptojacking campaign is weaponizing Redis config commands to silently hijack Linux systems and mine Monero.
๐ Learn more: https://thehackernews.com/2025/05/go-based-malware-deploys-xmrig-miner-on.html
๐7๐ฅ7๐คฏ4๐1
๐จ New Chinese APT uncovered!
ESET reveals MarsSnake, a stealth backdoor used in a multi-year campaign targeting a Saudi org via fake flight emails.
The threat actor? UnsolicitedBookerโand itโs not working alone.
๐ More tactics, ties, and twists โ https://thehackernews.com/2025/05/chinese-hackers-deploy-marssnake.html
ESET reveals MarsSnake, a stealth backdoor used in a multi-year campaign targeting a Saudi org via fake flight emails.
The threat actor? UnsolicitedBookerโand itโs not working alone.
๐ More tactics, ties, and twists โ https://thehackernews.com/2025/05/chinese-hackers-deploy-marssnake.html
๐10๐คฏ7๐ฅ1
๐ Most breaches begin with identity.
Issue isnโt firewallโit's login. You invest in EDR, NDR, ITDR, but attackers use valid credentials.
๐ฅ ITP stops attacks pre-access.
๐ Learn more: https://thehackernews.com/expert-insights/2025/05/breach-fatalism-is-over-why-identity.html
Issue isnโt firewallโit's login. You invest in EDR, NDR, ITDR, but attackers use valid credentials.
๐ฅ ITP stops attacks pre-access.
๐ Learn more: https://thehackernews.com/expert-insights/2025/05/breach-fatalism-is-over-why-identity.html
๐11๐3
๐ฅ 75 security tools, 2,000+ alerts/week โ Still breached.
This new "2025 State of Pentesting" report reveals whatโs really working (and whatโs not) in modern security testing.
๐ Get the key insights: https://thehackernews.com/2025/05/the-crowded-battle-key-insights-from.html
This new "2025 State of Pentesting" report reveals whatโs really working (and whatโs not) in modern security testing.
๐ Get the key insights: https://thehackernews.com/2025/05/the-crowded-battle-key-insights-from.html
๐9
๐จ One default IAM role can expose your entire AWS account.
Experts found overly permissive roles in AWS services like SageMaker & Glueโgranting attackers wide access, including full S3 control.
Itโs not just misconfigโit's a silent backdoor.
Details: https://thehackernews.com/2025/05/aws-default-iam-roles-found-to-enable.html
Experts found overly permissive roles in AWS services like SageMaker & Glueโgranting attackers wide access, including full S3 control.
Itโs not just misconfigโit's a silent backdoor.
Details: https://thehackernews.com/2025/05/aws-default-iam-roles-found-to-enable.html
โก9๐8
โ ๏ธ Old flawsโnew threat!
A new SideWinder campaign hit govโt agencies in ๐ฑ๐ฐ Sri Lanka, ๐ง๐ฉ Bangladesh & ๐ต๐ฐ Pakistan using geofenced malware and old MS Office flaws.
๐ Details just dropped: https://thehackernews.com/2025/05/south-asian-ministries-hit-by.html
A new SideWinder campaign hit govโt agencies in ๐ฑ๐ฐ Sri Lanka, ๐ง๐ฉ Bangladesh & ๐ต๐ฐ Pakistan using geofenced malware and old MS Office flaws.
๐ Details just dropped: https://thehackernews.com/2025/05/south-asian-ministries-hit-by.html
๐20
๐จ Over 100 malicious Chrome extensions slipped through Googleโs radar since Feb 2024.
They looked legitโVPNs, AI tools, banking appsโbut secretly stole data, hijacked sessions, and redirected traffic.
๐ Even bad reviews were filtered.
๐ Read: https://thehackernews.com/2025/05/100-fake-chrome-extensions-found.html
They looked legitโVPNs, AI tools, banking appsโbut secretly stole data, hijacked sessions, and redirected traffic.
๐ Even bad reviews were filtered.
๐ Read: https://thehackernews.com/2025/05/100-fake-chrome-extensions-found.html
๐15๐ฑ5๐ค4๐ฅ2
โ ๏ธ Trusted domains. Abandoned cloud assets. Hijacked by a ghost.
A threat actor called Hazy Hawk is hijacking unused domains from big names like CDC & PwCโturning trusted URLs into malware traps via DNS misconfig.
See how it works โ https://thehackernews.com/2025/05/hazy-hawk-exploits-dns-records-to.html
A threat actor called Hazy Hawk is hijacking unused domains from big names like CDC & PwCโturning trusted URLs into malware traps via DNS misconfig.
See how it works โ https://thehackernews.com/2025/05/hazy-hawk-exploits-dns-records-to.html
๐19๐1๐ค1
This media is not supported in your browser
VIEW IN TELEGRAM
๐ฅ Google Chrome just got SMARTER!!!
It now auto-changes compromised passwordsโin one click.
๐ Detects hacked passwords
๐ค Auto-generates a strong password
โก Instantly updates them
See it in action: https://thehackernews.com/2025/05/google-chrome-can-now-auto-change.html
It now auto-changes compromised passwordsโin one click.
๐ Detects hacked passwords
๐ค Auto-generates a strong password
โก Instantly updates them
See it in action: https://thehackernews.com/2025/05/google-chrome-can-now-auto-change.html
๐ฅ24๐11๐7๐ค6๐3
This media is not supported in your browser
VIEW IN TELEGRAM
โSaaS is quietly breaking everything we knew about security.โ โ JPMorganโs CISO just sounded the alarm.
From invisible AI agents to risky OAuth tokens, the stakes are rising fast.
๐ 4th-party risk is exploding
๐ Non-human identities outnumber users
๐ Admin backdoors + invisible AI agents
๐ What now? Read the analysis โ https://thehackernews.com/expert-insights/2025/05/jpmorgan-ciso-spotlights-saas-security.html
From invisible AI agents to risky OAuth tokens, the stakes are rising fast.
๐ 4th-party risk is exploding
๐ Non-human identities outnumber users
๐ Admin backdoors + invisible AI agents
๐ What now? Read the analysis โ https://thehackernews.com/expert-insights/2025/05/jpmorgan-ciso-spotlights-saas-security.html
๐16๐ฑ3
๐จ Mobile users, beware.
PWAs Weaponized in Adult-Content Scam.
Hackers are using full Progressive Web Apps (PWAs) to launch a redirection attackโtargeting only Android & iOS users while bypassing desktops entirely.
Learn more โค https://thehackernews.com/2025/05/researchers-expose-pwa-javascript.html
PWAs Weaponized in Adult-Content Scam.
Hackers are using full Progressive Web Apps (PWAs) to launch a redirection attackโtargeting only Android & iOS users while bypassing desktops entirely.
Learn more โค https://thehackernews.com/2025/05/researchers-expose-pwa-javascript.html
๐11๐ฑ5๐3๐1
๐จ One email = FULL BREACH.
Phishing kits like Tycoon2FA bypass filters, trick users & steal creds in seconds.
โก See every click, every redirect, every fake loginโliveโinside this sandbox. Verdicts in <40 seconds. IOC-rich reports.
๐ Learn how โ https://thehackernews.com/2025/05/how-to-detect-phishing-attacks-faster.html
Phishing kits like Tycoon2FA bypass filters, trick users & steal creds in seconds.
โก See every click, every redirect, every fake loginโliveโinside this sandbox. Verdicts in <40 seconds. IOC-rich reports.
๐ Learn how โ https://thehackernews.com/2025/05/how-to-detect-phishing-attacks-faster.html
๐13๐3
๐ WATCH OUT โ If itโs trending, itโs bait.
Cybercriminals are hijacking Facebook ads to impersonate Kling AIโtricking users into downloading malware via fake image generators.
Crypto wallets. Remote access. 70+ spoofed pages.
๐ Details โ https://thehackernews.com/2025/05/fake-kling-ai-facebook-ads-deliver-rat.html
Cybercriminals are hijacking Facebook ads to impersonate Kling AIโtricking users into downloading malware via fake image generators.
Crypto wallets. Remote access. 70+ spoofed pages.
๐ Details โ https://thehackernews.com/2025/05/fake-kling-ai-facebook-ads-deliver-rat.html
๐9๐5
๐จ CI/CD pipelines move fastโbut security often lags behind.
Misconfigs, weak containers, and unchecked code can open real attack paths.
Wazuh spots what others missโand stops it cold.
๐ See the risks + how to fix them โ https://thehackernews.com/2025/05/securing-cicd-workflows-with-wazuh.html
Misconfigs, weak containers, and unchecked code can open real attack paths.
Wazuh spots what others missโand stops it cold.
๐ See the risks + how to fix them โ https://thehackernews.com/2025/05/securing-cicd-workflows-with-wazuh.html
๐7๐ฑ5