๐จ New wave of supply chain attacks hits npm, PyPI & RubyGems.
Hackers are hiding malware in popular open-source packages to:
๐ป Steal crypto wallets
๐๏ธ Delete entire codebases
๐ต๏ธ Exfiltrate Telegram bot data
Full story & package list โ https://thehackernews.com/2025/06/malicious-pypi-npm-and-ruby-packages.html
Hackers are hiding malware in popular open-source packages to:
๐ป Steal crypto wallets
๐๏ธ Delete entire codebases
๐ต๏ธ Exfiltrate Telegram bot data
Full story & package list โ https://thehackernews.com/2025/06/malicious-pypi-npm-and-ruby-packages.html
๐คฏ11๐6
๐จ 70% of data leaks now happen in-browser.
Legacy DLP tools canโt see what your employees are copy-pasting into AI tools, Slack, or Gmail.
The browser is the new security perimeter.
Read why browser-centric DLP is now a must โ https://thehackernews.com/2025/06/your-saas-data-isnt-safe-why.html
Legacy DLP tools canโt see what your employees are copy-pasting into AI tools, Slack, or Gmail.
The browser is the new security perimeter.
Read why browser-centric DLP is now a must โ https://thehackernews.com/2025/06/your-saas-data-isnt-safe-why.html
๐14๐ค7
๐จ New Chaos RAT variant targets Linux & Windows users
Masquerading as a Linux network tool, the malware spreads via phishing to deploy crypto miners, steal data, and gain full device control.
๐ Full report: https://thehackernews.com/2025/06/chaos-rat-malware-targets-windows-and.html
Masquerading as a Linux network tool, the malware spreads via phishing to deploy crypto miners, steal data, and gain full device control.
๐ Full report: https://thehackernews.com/2025/06/chaos-rat-malware-targets-windows-and.html
๐9๐ฅ3โก2๐1
Do you know how and where AI is running in your org? That customer service agent isn't just an LLMโit's system prompts, tool calls, RAG data, user logs, and MCP servers.
Every untracked component = a breach waiting to happen.
Why AI asset sprawl goes way beyond model discovery โ https://thn.news/ai-assets-sprawl
Every untracked component = a breach waiting to happen.
Why AI asset sprawl goes way beyond model discovery โ https://thn.news/ai-assets-sprawl
๐7๐4
๐จ Google warns: Fake IT calls breaching Salesforce accounts.
Hackers from UNC6040 trick staff into approving a malicious โData Loaderโ app to steal data.
๐ Learn how the scam works: https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html
Hackers from UNC6040 trick staff into approving a malicious โData Loaderโ app to steal data.
๐ Learn how the scam works: https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html
๐7๐5๐3๐ฅ2
๐จ One PASSWORD to rule them all?
A critical flaw (CVSS 9.9) in Cisco ISE cloud deployments (AWS, Azure, OCI) means static credentials are reused across systemsโallowing unauthenticated attackers to access configs, data, and more.
Details โ https://thehackernews.com/2025/06/critical-cisco-ise-auth-bypass-flaw.html
๐ No fixโonly factory reset.
A critical flaw (CVSS 9.9) in Cisco ISE cloud deployments (AWS, Azure, OCI) means static credentials are reused across systemsโallowing unauthenticated attackers to access configs, data, and more.
Details โ https://thehackernews.com/2025/06/critical-cisco-ise-auth-bypass-flaw.html
๐ No fixโonly factory reset.
๐11๐ฅ9๐4โก1๐คฏ1
๐จ Dark web carding site BidenCash taken down by U.S. DoJ
๐น 15M+ stolen credit cards sold
๐น $17M in criminal profits
๐น 3.3M cards leaked for free to attract buyers
๐น 117K+ users served since 2022
Seized in global sting with FBI & Europol.
Read: https://thehackernews.com/2025/06/doj-seizes-145-domains-tied-to.html
๐น 15M+ stolen credit cards sold
๐น $17M in criminal profits
๐น 3.3M cards leaked for free to attract buyers
๐น 117K+ users served since 2022
Seized in global sting with FBI & Europol.
Read: https://thehackernews.com/2025/06/doj-seizes-145-domains-tied-to.html
๐19๐9
๐ฅ 2025โs biggest cyber threat? The accounts you forgot existed.
Machine IDs now outnumber humans 45:1 โ and theyโre 7.5x more dangerous.
Leaked secrets, orphaned privileges, siloed teams.
Attackers see the full map. Do you?
๐ How to close identity gaps before itโs too late: https://thehackernews.com/expert-insights/2025/06/identity-first-security-multilayered.html
Machine IDs now outnumber humans 45:1 โ and theyโre 7.5x more dangerous.
Leaked secrets, orphaned privileges, siloed teams.
Attackers see the full map. Do you?
๐ How to close identity gaps before itโs too late: https://thehackernews.com/expert-insights/2025/06/identity-first-security-multilayered.html
๐ฅ8
Iran-linked hackers are spying on Kurdish & Iraqi officials using custom malware.
The group BladedFeline breached:
โข KRG diplomats
โข Iraq gov networks
โข Uzbekistan telecom
Backdoors used: Whisper, Spearal, Shahmaran, Slippery Snakelet.
๐ต๏ธโโ๏ธ Full story โ https://thehackernews.com/2025/06/iran-linked-bladedfeline-hits-iraqi-and.html
The group BladedFeline breached:
โข KRG diplomats
โข Iraq gov networks
โข Uzbekistan telecom
Backdoors used: Whisper, Spearal, Shahmaran, Slippery Snakelet.
๐ต๏ธโโ๏ธ Full story โ https://thehackernews.com/2025/06/iran-linked-bladedfeline-hits-iraqi-and.html
โก7๐3๐ฅ3๐ฑ3
๐ฅ $4.88M average breach cost โ boards want real ROI, not just patch counts.
Business Value Assessment (BVA) links risk to $$ and shows cost of inaction โ often $500K+ monthly.
Stop guessing. Measure impact. Turn security into business value.
Try this new ROI Calculator โฌ๏ธ https://thehackernews.com/2025/06/redefining-cyber-value-why-business.html
Business Value Assessment (BVA) links risk to $$ and shows cost of inaction โ often $500K+ monthly.
Stop guessing. Measure impact. Turn security into business value.
Try this new ROI Calculator โฌ๏ธ https://thehackernews.com/2025/06/redefining-cyber-value-why-business.html
๐ฅ7๐4๐ค2
๐จโBitterโ hacking group targets governments and diplomats worldwide using advanced malware and spear-phishing.
Recent attacks spread from South Asia to Turkey. Active during business hours.
Learn more โ https://thehackernews.com/2025/06/bitter-hacker-group-expands-cyber.html
Recent attacks spread from South Asia to Turkey. Active during business hours.
Learn more โ https://thehackernews.com/2025/06/bitter-hacker-group-expands-cyber.html
๐12
โ ๏ธ Ukraine hit by PathWiper malware wiping critical data via hacked admin tools. Linked to Russia-based APT groups.
๐จ Meanwhile, Silent Werewolf launches stealth attacks on Russian & Moldovan sectors using advanced loaders.
Stay informedโlearn here: https://thehackernews.com/2025/06/new-pathwiper-data-wiper-malware.html
๐จ Meanwhile, Silent Werewolf launches stealth attacks on Russian & Moldovan sectors using advanced loaders.
Stay informedโlearn here: https://thehackernews.com/2025/06/new-pathwiper-data-wiper-malware.html
๐ฅ23๐ฑ5๐2๐คฏ1
๐จ Enterprise security is under siege!
30% of attacks target web assets, 21% hit APIs & IoT devices.
โ ๏ธ Too many alerts
โ ๏ธ Scattered tests
โ ๏ธ Limited visibility = High risk
๐ AI-powered full-path attack simulation + centralized control = real defense.
Learn what it means โ https://thehackernews.com/expert-insights/2025/06/solving-enterprise-security-challenge.html
30% of attacks target web assets, 21% hit APIs & IoT devices.
โ ๏ธ Too many alerts
โ ๏ธ Scattered tests
โ ๏ธ Limited visibility = High risk
๐ AI-powered full-path attack simulation + centralized control = real defense.
Learn what it means โ https://thehackernews.com/expert-insights/2025/06/solving-enterprise-security-challenge.html
๐8๐5๐ฅ2
๐จAlert: Positive Technologies has confirmed the deadly CVE-2025-49113 exploitโauthenticated users can run arbitrary commands through PHP object deserialization.
Read: https://thehackernews.com/2025/06/critical-10-year-old-roundcube-webmail.html
Action: Update Roundcube immediately to the latest version.
Read: https://thehackernews.com/2025/06/critical-10-year-old-roundcube-webmail.html
Action: Update Roundcube immediately to the latest version.
๐8๐ฅ5๐คฏ1
Think like an attacker to defend better.
AEV continuously simulates cyber-attacks to show how hackers exploit your system.
It helps teams prioritize fixesโcredentials, misconfigs, etc.โbeyond patching.
Stay ahead by understanding attackers, not just checking boxes: https://thehackernews.com/2025/06/inside-mind-of-adversary-why-more.html
AEV continuously simulates cyber-attacks to show how hackers exploit your system.
It helps teams prioritize fixesโcredentials, misconfigs, etc.โbeyond patching.
Stay ahead by understanding attackers, not just checking boxes: https://thehackernews.com/2025/06/inside-mind-of-adversary-why-more.html
๐9๐ฅ5๐2
๐จ Tech support scam busted: 4 arrested in India, 2 fake call centers taken down targeting Japanese victims via AI-powered tricks.
66,000+ malicious domains removed since 2024 through global CBI-Microsoft-Japan effort.
Cybercrime is evolvingโglobal teamwork is the key.
Learn more: https://thehackernews.com/2025/06/microsoft-helps-cbi-dismantle-indian.html
66,000+ malicious domains removed since 2024 through global CBI-Microsoft-Japan effort.
Cybercrime is evolvingโglobal teamwork is the key.
Learn more: https://thehackernews.com/2025/06/microsoft-helps-cbi-dismantle-indian.html
๐ฅ11๐คฏ7๐4๐2โก1
โ ๏ธ macOS Alert โ Fake Spectrum CAPTCHA is a trap!
Russian hackers use clipboard hacks + terminal scripts to steal passwords & install Atomic Stealer.
Victims unknowingly run commands โ handing over control.
This sneaky ClickFix tactic preys on your โsecurity checkโ fatigue.
Read: https://thehackernews.com/2025/06/new-atomic-macos-stealer-campaign.html
Russian hackers use clipboard hacks + terminal scripts to steal passwords & install Atomic Stealer.
Victims unknowingly run commands โ handing over control.
This sneaky ClickFix tactic preys on your โsecurity checkโ fatigue.
Read: https://thehackernews.com/2025/06/new-atomic-macos-stealer-campaign.html
๐ฅ13๐6๐คฏ3๐2โก1
โ ๏ธ Generative AI is leaking your sensitive dataโ4 million+ blocked attempts just in Zscalerโs cloud alone.
Blocking AI apps wonโt stop employees; it just pushes data risks into the shadows.
The real fix? Visibility, context-aware policies, and secure AI alternatives that keep productivity high and data safe.
Hereโs what smart AI security looks like โ
Details here โ https://thehackernews.com/2025/06/empower-users-and-protect-against-genai.html
Blocking AI apps wonโt stop employees; it just pushes data risks into the shadows.
The real fix? Visibility, context-aware policies, and secure AI alternatives that keep productivity high and data safe.
Hereโs what smart AI security looks like โ
Details here โ https://thehackernews.com/2025/06/empower-users-and-protect-against-genai.html
๐16๐ค7๐3
๐จ Over 700 downloads of multiple malicious Chrome extensions are stealing banking data from Brazilians and 70+ companies.
Phishing emails disguised as invoices install spyware targeting Banco do Brasil.
Details here โ https://thehackernews.com/2025/06/malicious-browser-extensions-infect-722.html
Phishing emails disguised as invoices install spyware targeting Banco do Brasil.
Details here โ https://thehackernews.com/2025/06/malicious-browser-extensions-infect-722.html
๐13๐ฑ5โก4๐ฅ1
๐จ Supply chain attacks hit npm & PyPI: malware in 1M+ downloads steals data, runs commands, and wipes files.
A PyPI package steals Instagram creds, spreading them to botnets.
Check your dependencies NOW.
Full details โ https://thehackernews.com/2025/06/new-supply-chain-malware-operation-hits.html
A PyPI package steals Instagram creds, spreading them to botnets.
Check your dependencies NOW.
Full details โ https://thehackernews.com/2025/06/new-supply-chain-malware-operation-hits.html
๐10๐ฅ4๐2๐1๐คฏ1