๐ Two Linux flaws let local attackers steal secrets from crash dumps โ including password hashes.
Found in Ubuntu, RHEL & Fedora, the bugs (CVE-2025-5054 & CVE-2025-4598) exploit SUID crash handling.
A simple raceโtriggered at just the right timeโcan leak /etc/shadow data.
PoC is public. Mitigations exist.
Read: https://thehackernews.com/2025/05/new-linux-flaws-allow-password-hash.html
Found in Ubuntu, RHEL & Fedora, the bugs (CVE-2025-5054 & CVE-2025-4598) exploit SUID crash handling.
A simple raceโtriggered at just the right timeโcan leak /etc/shadow data.
PoC is public. Mitigations exist.
Read: https://thehackernews.com/2025/05/new-linux-flaws-allow-password-hash.html
๐ค16๐ฑ10๐7๐ฅ7๐7๐คฏ7๐4โก3
๐ โStrategic Opportunityโ or Silent Backdoor?
CFOs across Europe, Africa, & Asia are being hunted in a stealth phishing op impersonating Rothschild recruiters. Victims solve a CAPTCHAโthen unknowingly install NetBird & OpenSSH, giving attackers remote access.
Itโs legit software. Weaponized.
Learn more: https://thehackernews.com/2025/06/fake-recruiter-emails-target-cfos-using.html
CFOs across Europe, Africa, & Asia are being hunted in a stealth phishing op impersonating Rothschild recruiters. Victims solve a CAPTCHAโthen unknowingly install NetBird & OpenSSH, giving attackers remote access.
Itโs legit software. Weaponized.
Learn more: https://thehackernews.com/2025/06/fake-recruiter-emails-target-cfos-using.html
๐ฅ29๐10โก1
Cyberattacks are getting smarterโnot louder.
APTs, AI malware, and browser hijacks are slipping in through trusted tools.
Weโve cut through the noiseโhere are the key exploits, CVEs, and tactics to know.
๐ Read latest weekly recap: https://thehackernews.com/2025/06/weekly-recap-apt-intrusions-ai-malware.html
APTs, AI malware, and browser hijacks are slipping in through trusted tools.
Weโve cut through the noiseโhere are the key exploits, CVEs, and tactics to know.
๐ Read latest weekly recap: https://thehackernews.com/2025/06/weekly-recap-apt-intrusions-ai-malware.html
๐ฅ21๐6๐3๐2๐ค1
๐จ EDR alone wonโt cut it anymore.
Todayโs threats bypass traditional toolsโusing stealth, encryption, and insider tactics.
Thatโs why banks, energy firms, and governments are turning to Network Detection & Response (NDR) to catch what SIEM and EDR canโt.
From Volt Typhoon to hidden data theftโNDR sees what others miss.
Find out how โ https://thehackernews.com/2025/06/the-secret-defense-strategy-of-four.html
Todayโs threats bypass traditional toolsโusing stealth, encryption, and insider tactics.
Thatโs why banks, energy firms, and governments are turning to Network Detection & Response (NDR) to catch what SIEM and EDR canโt.
From Volt Typhoon to hidden data theftโNDR sees what others miss.
Find out how โ https://thehackernews.com/2025/06/the-secret-defense-strategy-of-four.html
๐13๐3๐1
๐จ Qualcomm just patched 3 zero-days actively exploited in the wildโtwo rated CVSS 8.6.
โถ CVE-2025-21479
โถ CVE-2025-21480
โถ CVE-2025-27038
๐ A twist? Similar bugs were used by spyware vendors like Variston and Cy4Gate.
More here: https://thehackernews.com/2025/06/qualcomm-fixes-3-zero-days-used-in.html
โถ CVE-2025-21479
โถ CVE-2025-21480
โถ CVE-2025-27038
๐ A twist? Similar bugs were used by spyware vendors like Variston and Cy4Gate.
More here: https://thehackernews.com/2025/06/qualcomm-fixes-3-zero-days-used-in.html
๐คฏ10๐8๐1
๐จ JINX-0132 is hijacking DevOps servers for cryptominingโno malware, no staging.
Theyโre exploiting Docker, Gitea, Consul & Nomad (first known wild exploit) using tools straight from GitHub.
๐ First known exploit of Nomad misconfigs in the wild
๐ฐ $10K+ in compute stolen/month
๐ 5,700+ exposed servers (US, China, EU...)
๐ Full story: https://thehackernews.com/2025/06/cryptojacking-campaign-exploits-devops.html
Theyโre exploiting Docker, Gitea, Consul & Nomad (first known wild exploit) using tools straight from GitHub.
๐ First known exploit of Nomad misconfigs in the wild
๐ฐ $10K+ in compute stolen/month
๐ 5,700+ exposed servers (US, China, EU...)
๐ Full story: https://thehackernews.com/2025/06/cryptojacking-campaign-exploits-devops.html
๐ค9๐4๐คฏ2
๐จ WARNING: Another Chrome zero-day exploited in the wild.
Google just patched CVE-2025-5419 โ a high-severity V8 engine flaw found by its own Threat Analysis Group.
Attackers are already using it via malicious HTML pages.
Update Chrome NOW | Read: https://thehackernews.com/2025/06/new-chrome-zero-day-actively-exploited.html
Google just patched CVE-2025-5419 โ a high-severity V8 engine flaw found by its own Threat Analysis Group.
Attackers are already using it via malicious HTML pages.
Update Chrome NOW | Read: https://thehackernews.com/2025/06/new-chrome-zero-day-actively-exploited.html
๐ฅ25๐8๐2
๐ต๏ธโโ๏ธ APT29? Cozy Bear? Midnight Blizzard?
Same hacker. Different names.
๐ฅ Microsoft and CrowdStrike are finally fixing the naming mess. Faster attribution. Better defense.
Check it out โ https://thehackernews.com/2025/06/microsoft-and-crowdstrike-launch-shared.html
Same hacker. Different names.
๐ฅ Microsoft and CrowdStrike are finally fixing the naming mess. Faster attribution. Better defense.
Check it out โ https://thehackernews.com/2025/06/microsoft-and-crowdstrike-launch-shared.html
๐14๐5
๐จ Chrome to Block TLS Certificates from Two Major Certificate Authorities.
Why? Repeated security failures. Broken promises. No real progress.
Read: https://thehackernews.com/2025/06/google-chrome-to-distrust-two.html
โ ๏ธ Switch CAs now to avoid disruptions.
Why? Repeated security failures. Broken promises. No real progress.
Read: https://thehackernews.com/2025/06/google-chrome-to-distrust-two.html
โ ๏ธ Switch CAs now to avoid disruptions.
๐ฅ21๐5๐4
๐จ New Android malware 'Crocodilus' spreads worldwide.
First seen in Spain & Turkey, it now targets users in ๐ต๐ฑ Poland, ๐ง๐ท Brazil, ๐ฆ๐ท Argentina, ๐ฎ๐ณ India & more.
It:
๐ธ Steals crypto seed phrases
๐ธ Poses as " Bank Support " to evade Google alerts
๐ธ Spreads via Facebook ads
๐ Details: https://thehackernews.com/2025/06/android-trojan-crocodilus-now-active-in.html
First seen in Spain & Turkey, it now targets users in ๐ต๐ฑ Poland, ๐ง๐ท Brazil, ๐ฆ๐ท Argentina, ๐ฎ๐ณ India & more.
It:
๐ธ Steals crypto seed phrases
๐ธ Poses as " Bank Support " to evade Google alerts
๐ธ Spreads via Facebook ads
๐ Details: https://thehackernews.com/2025/06/android-trojan-crocodilus-now-active-in.html
๐12๐ฅ4
New GenAI Security Best Practices Bundle
3-in-1 AI security guides. Get access to 3 resources that will help secure your AI pipeline and mitigate critical risks.
Unlock the Bundle: https://thehackernews.uk/wiz-genai-sec-bundle
3-in-1 AI security guides. Get access to 3 resources that will help secure your AI pipeline and mitigate critical risks.
Unlock the Bundle: https://thehackernews.uk/wiz-genai-sec-bundle
๐ค8๐ฅ4๐1
โHey, I got a new phoneโcan you reset my MFA?โ
Thatโs how $100M+ breaches begin.
Scattered Spider isnโt new โ theyโve been hijacking accounts using help desk scams, deepfakes & AiTM phishing kits since 2022.
Learn how to fight back โ https://thehackernews.com/2025/06/scattered-spider-understanding-help.html
Thatโs how $100M+ breaches begin.
Scattered Spider isnโt new โ theyโve been hijacking accounts using help desk scams, deepfakes & AiTM phishing kits since 2022.
Learn how to fight back โ https://thehackernews.com/2025/06/scattered-spider-understanding-help.html
๐ค8๐5๐คฏ5๐1
XPOSURE is back! The National Exposure Management Virtual Summit returns for its fourth year, focused on what matters most: reducing cyber exposure and risk.
Join top cybersecurity leaders from Pentera, Forrester, AWS, Armis, Recorded Future, and SecurityScorecard to learn how leading security teams are taking a proactive approach to exposure across the enterprise.
Featuring Jen Easterly, former Director of the Cybersecurity and Infrastructure Security Agency (CISA), as the XPOSURE 2025 keynote.
If youโre building toward a more proactive security model, this is where you need to be.
๐ June 18 | ๐ 11 AM ET
๐ Up to 3.5 CPE credits
๐ https://thn.news/xposure2025
#XPOSURE2025 #CTEM #CyberSecurityLeadership #EnterpriseSecurity
Join top cybersecurity leaders from Pentera, Forrester, AWS, Armis, Recorded Future, and SecurityScorecard to learn how leading security teams are taking a proactive approach to exposure across the enterprise.
Featuring Jen Easterly, former Director of the Cybersecurity and Infrastructure Security Agency (CISA), as the XPOSURE 2025 keynote.
If youโre building toward a more proactive security model, this is where you need to be.
๐ June 18 | ๐ 11 AM ET
๐ Up to 3.5 CPE credits
๐ https://thn.news/xposure2025
#XPOSURE2025 #CTEM #CyberSecurityLeadership #EnterpriseSecurity
๐2
๐จ A 10-year-old flaw (CVE-2025-49113 / CVSS 9.9) in Roundcube Webmail could let hackers take over your system.
Nation-state groups like APT28 have already exploited Roundcube before.
๐ Read: https://thehackernews.com/2025/06/critical-10-year-old-roundcube-webmail.html
๐ง Patch to 1.6.11 or 1.5.10 LTS now.
๐ PoC coming soon.
Nation-state groups like APT28 have already exploited Roundcube before.
๐ Read: https://thehackernews.com/2025/06/critical-10-year-old-roundcube-webmail.html
๐ง Patch to 1.6.11 or 1.5.10 LTS now.
๐ PoC coming soon.
๐11๐ฅ5๐ค5๐4
๐จ Watch your clipboard!
A fake DocuSign site tricks users into running malware with a sneaky PowerShell scriptโcopied via CAPTCHA.
โ๏ธ Clipboard poisoning
โ๏ธ Fake Gitcode & DocuSign sites
โ๏ธ NetSupport RAT deployed
๐ Learn how it works โ https://thehackernews.com/2025/06/fake-docusign-gitcode-sites-spread.html
A fake DocuSign site tricks users into running malware with a sneaky PowerShell scriptโcopied via CAPTCHA.
โ๏ธ Clipboard poisoning
โ๏ธ Fake Gitcode & DocuSign sites
โ๏ธ NetSupport RAT deployed
๐ Learn how it works โ https://thehackernews.com/2025/06/fake-docusign-gitcode-sites-spread.html
๐ฅ7๐6๐คฏ4
๐จ Critical bugs in HPE StoreOnce | 9.8 CVSS flaw allows auth bypass + RCE as root.
๐ One bug (CVE-2025-37093) lets attackers skip loginโthen chain others for full takeover.
Patch now if you're running pre-4.3.11 versions.
๐ Full details: https://thehackernews.com/2025/06/hpe-issues-security-patch-for-storeonce.html
๐ One bug (CVE-2025-37093) lets attackers skip loginโthen chain others for full takeover.
Patch now if you're running pre-4.3.11 versions.
๐ Full details: https://thehackernews.com/2025/06/hpe-issues-security-patch-for-storeonce.html
๐11๐ฅ4
๐จ New wave of supply chain attacks hits npm, PyPI & RubyGems.
Hackers are hiding malware in popular open-source packages to:
๐ป Steal crypto wallets
๐๏ธ Delete entire codebases
๐ต๏ธ Exfiltrate Telegram bot data
Full story & package list โ https://thehackernews.com/2025/06/malicious-pypi-npm-and-ruby-packages.html
Hackers are hiding malware in popular open-source packages to:
๐ป Steal crypto wallets
๐๏ธ Delete entire codebases
๐ต๏ธ Exfiltrate Telegram bot data
Full story & package list โ https://thehackernews.com/2025/06/malicious-pypi-npm-and-ruby-packages.html
๐คฏ11๐6
๐จ 70% of data leaks now happen in-browser.
Legacy DLP tools canโt see what your employees are copy-pasting into AI tools, Slack, or Gmail.
The browser is the new security perimeter.
Read why browser-centric DLP is now a must โ https://thehackernews.com/2025/06/your-saas-data-isnt-safe-why.html
Legacy DLP tools canโt see what your employees are copy-pasting into AI tools, Slack, or Gmail.
The browser is the new security perimeter.
Read why browser-centric DLP is now a must โ https://thehackernews.com/2025/06/your-saas-data-isnt-safe-why.html
๐14๐ค7
๐จ New Chaos RAT variant targets Linux & Windows users
Masquerading as a Linux network tool, the malware spreads via phishing to deploy crypto miners, steal data, and gain full device control.
๐ Full report: https://thehackernews.com/2025/06/chaos-rat-malware-targets-windows-and.html
Masquerading as a Linux network tool, the malware spreads via phishing to deploy crypto miners, steal data, and gain full device control.
๐ Full report: https://thehackernews.com/2025/06/chaos-rat-malware-targets-windows-and.html
๐9๐ฅ3โก2๐1
Do you know how and where AI is running in your org? That customer service agent isn't just an LLMโit's system prompts, tool calls, RAG data, user logs, and MCP servers.
Every untracked component = a breach waiting to happen.
Why AI asset sprawl goes way beyond model discovery โ https://thn.news/ai-assets-sprawl
Every untracked component = a breach waiting to happen.
Why AI asset sprawl goes way beyond model discovery โ https://thn.news/ai-assets-sprawl
๐7๐4