💀 Most breaches begin with identity.
Issue isn’t firewall—it's login. You invest in EDR, NDR, ITDR, but attackers use valid credentials.
🔥 ITP stops attacks pre-access.
👉 Learn more: https://thehackernews.com/expert-insights/2025/05/breach-fatalism-is-over-why-identity.html
Issue isn’t firewall—it's login. You invest in EDR, NDR, ITDR, but attackers use valid credentials.
🔥 ITP stops attacks pre-access.
👉 Learn more: https://thehackernews.com/expert-insights/2025/05/breach-fatalism-is-over-why-identity.html
👍11😁3
💥 75 security tools, 2,000+ alerts/week — Still breached.
This new "2025 State of Pentesting" report reveals what’s really working (and what’s not) in modern security testing.
🔗 Get the key insights: https://thehackernews.com/2025/05/the-crowded-battle-key-insights-from.html
This new "2025 State of Pentesting" report reveals what’s really working (and what’s not) in modern security testing.
🔗 Get the key insights: https://thehackernews.com/2025/05/the-crowded-battle-key-insights-from.html
👍9
🚨 One default IAM role can expose your entire AWS account.
Experts found overly permissive roles in AWS services like SageMaker & Glue—granting attackers wide access, including full S3 control.
It’s not just misconfig—it's a silent backdoor.
Details: https://thehackernews.com/2025/05/aws-default-iam-roles-found-to-enable.html
Experts found overly permissive roles in AWS services like SageMaker & Glue—granting attackers wide access, including full S3 control.
It’s not just misconfig—it's a silent backdoor.
Details: https://thehackernews.com/2025/05/aws-default-iam-roles-found-to-enable.html
⚡9👍8
⚠️ Old flaws—new threat!
A new SideWinder campaign hit gov’t agencies in 🇱🇰 Sri Lanka, 🇧🇩 Bangladesh & 🇵🇰 Pakistan using geofenced malware and old MS Office flaws.
🔗 Details just dropped: https://thehackernews.com/2025/05/south-asian-ministries-hit-by.html
A new SideWinder campaign hit gov’t agencies in 🇱🇰 Sri Lanka, 🇧🇩 Bangladesh & 🇵🇰 Pakistan using geofenced malware and old MS Office flaws.
🔗 Details just dropped: https://thehackernews.com/2025/05/south-asian-ministries-hit-by.html
👍20
🚨 Over 100 malicious Chrome extensions slipped through Google’s radar since Feb 2024.
They looked legit—VPNs, AI tools, banking apps—but secretly stole data, hijacked sessions, and redirected traffic.
👀 Even bad reviews were filtered.
🔗 Read: https://thehackernews.com/2025/05/100-fake-chrome-extensions-found.html
They looked legit—VPNs, AI tools, banking apps—but secretly stole data, hijacked sessions, and redirected traffic.
👀 Even bad reviews were filtered.
🔗 Read: https://thehackernews.com/2025/05/100-fake-chrome-extensions-found.html
👍15😱5🤔4🔥2
⚠️ Trusted domains. Abandoned cloud assets. Hijacked by a ghost.
A threat actor called Hazy Hawk is hijacking unused domains from big names like CDC & PwC—turning trusted URLs into malware traps via DNS misconfig.
See how it works ➝ https://thehackernews.com/2025/05/hazy-hawk-exploits-dns-records-to.html
A threat actor called Hazy Hawk is hijacking unused domains from big names like CDC & PwC—turning trusted URLs into malware traps via DNS misconfig.
See how it works ➝ https://thehackernews.com/2025/05/hazy-hawk-exploits-dns-records-to.html
👍19👏1🤔1
This media is not supported in your browser
VIEW IN TELEGRAM
🔥 Google Chrome just got SMARTER!!!
It now auto-changes compromised passwords—in one click.
🔐 Detects hacked passwords
🤖 Auto-generates a strong password
⚡ Instantly updates them
See it in action: https://thehackernews.com/2025/05/google-chrome-can-now-auto-change.html
It now auto-changes compromised passwords—in one click.
🔐 Detects hacked passwords
🤖 Auto-generates a strong password
⚡ Instantly updates them
See it in action: https://thehackernews.com/2025/05/google-chrome-can-now-auto-change.html
🔥24👍11😁7🤔6👏3
This media is not supported in your browser
VIEW IN TELEGRAM
“SaaS is quietly breaking everything we knew about security.” — JPMorgan’s CISO just sounded the alarm.
From invisible AI agents to risky OAuth tokens, the stakes are rising fast.
👉 4th-party risk is exploding
👉 Non-human identities outnumber users
👉 Admin backdoors + invisible AI agents
👀 What now? Read the analysis → https://thehackernews.com/expert-insights/2025/05/jpmorgan-ciso-spotlights-saas-security.html
From invisible AI agents to risky OAuth tokens, the stakes are rising fast.
👉 4th-party risk is exploding
👉 Non-human identities outnumber users
👉 Admin backdoors + invisible AI agents
👀 What now? Read the analysis → https://thehackernews.com/expert-insights/2025/05/jpmorgan-ciso-spotlights-saas-security.html
👍16😱3
🚨 Mobile users, beware.
PWAs Weaponized in Adult-Content Scam.
Hackers are using full Progressive Web Apps (PWAs) to launch a redirection attack—targeting only Android & iOS users while bypassing desktops entirely.
Learn more ➤ https://thehackernews.com/2025/05/researchers-expose-pwa-javascript.html
PWAs Weaponized in Adult-Content Scam.
Hackers are using full Progressive Web Apps (PWAs) to launch a redirection attack—targeting only Android & iOS users while bypassing desktops entirely.
Learn more ➤ https://thehackernews.com/2025/05/researchers-expose-pwa-javascript.html
😁11😱5👍3👏1
🚨 One email = FULL BREACH.
Phishing kits like Tycoon2FA bypass filters, trick users & steal creds in seconds.
⚡ See every click, every redirect, every fake login—live—inside this sandbox. Verdicts in <40 seconds. IOC-rich reports.
🔗 Learn how → https://thehackernews.com/2025/05/how-to-detect-phishing-attacks-faster.html
Phishing kits like Tycoon2FA bypass filters, trick users & steal creds in seconds.
⚡ See every click, every redirect, every fake login—live—inside this sandbox. Verdicts in <40 seconds. IOC-rich reports.
🔗 Learn how → https://thehackernews.com/2025/05/how-to-detect-phishing-attacks-faster.html
👍13😁3
👀 WATCH OUT — If it’s trending, it’s bait.
Cybercriminals are hijacking Facebook ads to impersonate Kling AI—tricking users into downloading malware via fake image generators.
Crypto wallets. Remote access. 70+ spoofed pages.
🔗 Details → https://thehackernews.com/2025/05/fake-kling-ai-facebook-ads-deliver-rat.html
Cybercriminals are hijacking Facebook ads to impersonate Kling AI—tricking users into downloading malware via fake image generators.
Crypto wallets. Remote access. 70+ spoofed pages.
🔗 Details → https://thehackernews.com/2025/05/fake-kling-ai-facebook-ads-deliver-rat.html
👍9😁5
🚨 CI/CD pipelines move fast—but security often lags behind.
Misconfigs, weak containers, and unchecked code can open real attack paths.
Wazuh spots what others miss—and stops it cold.
🔍 See the risks + how to fix them → https://thehackernews.com/2025/05/securing-cicd-workflows-with-wazuh.html
Misconfigs, weak containers, and unchecked code can open real attack paths.
Wazuh spots what others miss—and stops it cold.
🔍 See the risks + how to fix them → https://thehackernews.com/2025/05/securing-cicd-workflows-with-wazuh.html
👍7😱5
🚨 From Inbox to Full Compromise:
Hackers are hitting Russian businesses with phishing emails disguised as docs, delivering PureRAT malware for full-system access, password theft & crypto hijacking.
🎯 Attacks have quadrupled in early 2025.
🔗 Details: https://thehackernews.com/2025/05/purerat-malware-spikes-4x-in-2025.html
Hackers are hitting Russian businesses with phishing emails disguised as docs, delivering PureRAT malware for full-system access, password theft & crypto hijacking.
🎯 Attacks have quadrupled in early 2025.
🔗 Details: https://thehackernews.com/2025/05/purerat-malware-spikes-4x-in-2025.html
🔥8😱3🤔2
⚠️ Russia’s cyber war isn’t just on the battlefield—it’s hitting inboxes across the West.
APT28 (Fancy Bear) is targeting logistics, defense & IT firms in 14 countries to track aid to Ukraine.
Outlook, Roundcube, VPNs—even border cameras compromised.
🔗 Learn more: https://thehackernews.com/2025/05/russian-hackers-exploit-email-and-vpn.html
APT28 (Fancy Bear) is targeting logistics, defense & IT firms in 14 countries to track aid to Ukraine.
Outlook, Roundcube, VPNs—even border cameras compromised.
🔗 Learn more: https://thehackernews.com/2025/05/russian-hackers-exploit-email-and-vpn.html
👍21🔥14😁7🤔6🤯2
🔥 Biggest Info-Stealer Takedown of 2025!
🚨 2,300+ domains seized | 10M+ infections cut off.
Lumma Stealer—the world’s top info-stealer—just got dismantled by a global strike led by Microsoft, FBI, and Europol.
🔗 Read this story → https://thehackernews.com/2025/05/fbi-and-europol-disrupt-lumma-stealer.html
🚨 2,300+ domains seized | 10M+ infections cut off.
Lumma Stealer—the world’s top info-stealer—just got dismantled by a global strike led by Microsoft, FBI, and Europol.
🔗 Read this story → https://thehackernews.com/2025/05/fbi-and-europol-disrupt-lumma-stealer.html
🤯11👏8👍6🔥1
Most companies think their identity security is under control—It’s not.
🚨 <4% have fully automated ID workflows
🔑 89% depend on users to manually enable MFA
📉 52% faced breaches from manual ID tasks
Read latest 2025 report → https://thehackernews.com/2025/05/identity-security-has-automation.html
🚨 <4% have fully automated ID workflows
🔑 89% depend on users to manually enable MFA
📉 52% faced breaches from manual ID tasks
Read latest 2025 report → https://thehackernews.com/2025/05/identity-security-has-automation.html
👍10🔥1👏1😁1
🚨 3 Critical Flaws. 1 Exploit Chain. No Fix.
Versa Concerto's SD-WAN platform has 3 severe CVEs—one rated 10.0—that can let attackers bypass auth, escalate privileges & gain full system control via reverse shell.
🔗 Read this story → https://thehackernews.com/2025/05/unpatched-versa-concerto-flaws-let.html
Versa Concerto's SD-WAN platform has 3 severe CVEs—one rated 10.0—that can let attackers bypass auth, escalate privileges & gain full system control via reverse shell.
🔗 Read this story → https://thehackernews.com/2025/05/unpatched-versa-concerto-flaws-let.html
🤔6🔥3👏3😁2👍1
🚨 China-linked UNC5221 hackers exploited Ivanti EPMM zero-days (CVE-2025-4427 & 4428) immediately after disclosure, targeting mobile endpoints in defense, healthcare, and finance sectors.
Full report → https://thehackernews.com/2025/05/chinese-hackers-exploit-ivanti-epmm.html
Full report → https://thehackernews.com/2025/05/chinese-hackers-exploit-ivanti-epmm.html
👍7🔥3👏2
⚡ Webinar ALERT!
Cybersecurity isn't enough—you must prove it.
Courts, regulators, and insurers demand "reasonable" programs, and vague efforts won't suffice. Learn what this means and how to comply.
📅 Register for this free session now → https://thehackernews.com/2025/05/webinar-learn-how-to-build-reasonable.html
Cybersecurity isn't enough—you must prove it.
Courts, regulators, and insurers demand "reasonable" programs, and vague efforts won't suffice. Learn what this means and how to comply.
📅 Register for this free session now → https://thehackernews.com/2025/05/webinar-learn-how-to-build-reasonable.html
🤔6👍1👏1
🛑 WARNING — Any user to Domain Admin?
Akamai researchers demoed BadSuccessor, an attack abusing the new dMSA feature—enabled by default—to escalate privileges in Active Directory.
✅ Works in 91% of orgs.
❌ No patch yet
Details here → https://thehackernews.com/2025/05/critical-windows-server-2025-dmsa.html
Akamai researchers demoed BadSuccessor, an attack abusing the new dMSA feature—enabled by default—to escalate privileges in Active Directory.
✅ Works in 91% of orgs.
❌ No patch yet
Details here → https://thehackernews.com/2025/05/critical-windows-server-2025-dmsa.html
😱12😁2👏1