A massive brute-force attack hit Apache Tomcat Manager on June 5, 2025β295 malicious IPs trying to break in, mostly from US, UK, Germany, and Singapore.
Exposed Tomcat services are a ticking time bombβthis could lead to serious breaches if left unchecked.
Also, 40,000+ security cameras worldwide are openly streaming, risking privacy and corporate espionage.
Full details here β https://thehackernews.com/2025/06/295-malicious-ips-launch-coordinated.html
Exposed Tomcat services are a ticking time bombβthis could lead to serious breaches if left unchecked.
Also, 40,000+ security cameras worldwide are openly streaming, risking privacy and corporate espionage.
Full details here β https://thehackernews.com/2025/06/295-malicious-ips-launch-coordinated.html
π9π₯5π5π3
Black Bastaβs old affiliates are backβnow using Teams phishing plus Python scripts to silently hijack networks.
Half their attacks come from legit-looking Microsoft domains, fooling security teams.
Hereβs what to watch for β https://thehackernews.com/2025/06/former-black-basta-members-use.html
Half their attacks come from legit-looking Microsoft domains, fooling security teams.
Hereβs what to watch for β https://thehackernews.com/2025/06/former-black-basta-members-use.html
π11π₯9π2π€―2
Over 80,000 Microsoft Entra ID accounts targeted by a stealthy takeover campaign using the open-source tool TeamFiltration.
Attackers exploit Microsoft Teams API & AWS servers worldwide to spray passwords, exfiltrate data, and plant persistent access.
Find details here β https://thehackernews.com/2025/06/over-80000-microsoft-entra-id-accounts.html
Attackers exploit Microsoft Teams API & AWS servers worldwide to spray passwords, exfiltrate data, and plant persistent access.
Find details here β https://thehackernews.com/2025/06/over-80000-microsoft-entra-id-accounts.html
π15π₯6π2π±2π€1
ConnectWise is urgently rotating code-signing certificates for ScreenConnect and RMM tools by June 13 due to a risky config data handling flaw β no breach, but on-prem users must update to avoid downtime.
Learn more β https://thehackernews.com/2025/06/connectwise-to-rotate-screenconnect.html
Learn more β https://thehackernews.com/2025/06/connectwise-to-rotate-screenconnect.html
π12π2π€2
π¨ Machine identities now outnumber humans 100:1. GitGuardian found 70% of leaked secrets from 2022 remain active in 2025, fueling major breaches like US Treasury & Toyota.
Secrets spread across repos, pipelines, cloudsβbeyond traditional vaultsβ reach.
Non-human identity risk is a top OWASP threat in 2025.
Full story β https://thehackernews.com/2025/06/non-human-identities-how-to-address.html
Secrets spread across repos, pipelines, cloudsβbeyond traditional vaultsβ reach.
Non-human identity risk is a top OWASP threat in 2025.
Full story β https://thehackernews.com/2025/06/non-human-identities-how-to-address.html
π4
π¨ Zero-click AI exploit in Microsoft 365 Copilot (CVE-2025-32711, CVSS 9.3) lets attackers steal sensitive data silently via emailβno user interaction needed.
Details β https://thehackernews.com/2025/06/zero-click-ai-vulnerability-exposes.html
Already patched, but shows serious AI security risks ahead.
Details β https://thehackernews.com/2025/06/zero-click-ai-vulnerability-exposes.html
Already patched, but shows serious AI security risks ahead.
π16β‘10π4π€4
β¨ Webinar Alert! Artificial Intelligence isnβt just transforming tech β itβs creating invisible, unchecked identities hackers exploit to breach your systems silently.
Traditional security canβt see or stop them.
If you use AI, youβre at risk.
LEARN out how to secure these hidden non-human identities β https://thehackernews.com/2025/06/ai-agents-run-on-secret-accounts-learn.html
Traditional security canβt see or stop them.
If you use AI, youβre at risk.
LEARN out how to secure these hidden non-human identities β https://thehackernews.com/2025/06/ai-agents-run-on-secret-accounts-learn.html
π9π€―4π±2
β οΈ New TokenBreak ATTACK lets attackers bypass AI content filters by tweaking just one letterβmaking harmful prompts slip past unnoticed.
It fools many text classifiers while keeping meaning clear to humans and AI, enabling prompt injections.
Read more β https://thehackernews.com/2025/06/new-tokenbreak-attack-bypasses-ai.html
It fools many text classifiers while keeping meaning clear to humans and AI, enabling prompt injections.
Read more β https://thehackernews.com/2025/06/new-tokenbreak-attack-bypasses-ai.html
π5π4π€3π€―1
VexTrioβs cybercrime network hijacks hundreds of thousands of websites to spread scams & malware through fake ads and push alerts.
Even after a setback in late 2024, they keep running using clever DNS tricks & Russian servers.
What;s really going on β https://thehackernews.com/2025/06/wordpress-sites-turned-weapon-how.html
Even after a setback in late 2024, they keep running using clever DNS tricks & Russian servers.
What;s really going on β https://thehackernews.com/2025/06/wordpress-sites-turned-weapon-how.html
π€―12π₯5π3π1π€1π±1
This media is not supported in your browser
VIEW IN TELEGRAM
π¨ WARNING: Apple just confirmed a serious zero-click flaw in Messages was actively exploited to spy on journalists using Israeli spyware Paragon Graphite β no user action needed.
Details here β https://thehackernews.com/2025/06/apple-zero-click-flaw-in-messages.html
Details here β https://thehackernews.com/2025/06/apple-zero-click-flaw-in-messages.html
π€―31π€8π₯6π3π±2π1
π¨ Ransomware gangs are exploiting unpatched SimpleHelp flaws to hit utility billing customers with double extortion attacks β since Jan 2025.
CISA warns: patch now or risk serious breaches.
Read β https://thehackernews.com/2025/06/ransomware-gangs-exploit-unpatched.html
Meanwhile, new Fog ransomware uses legit employee monitoring software to stay hidden and persistent for weeks.
CISA warns: patch now or risk serious breaches.
Read β https://thehackernews.com/2025/06/ransomware-gangs-exploit-unpatched.html
Meanwhile, new Fog ransomware uses legit employee monitoring software to stay hidden and persistent for weeks.
π14π₯2
Security teams drown in alertsβbut real risks slip through unnoticed.
Continuous Threat Exposure Management (CTEM) shifts focus from alerts to actual attack paths, prioritizing prevention over reaction.
Stop chasing every alert. Start managing risk with purpose.
Read more β https://thehackernews.com/2025/06/ctem-is-new-soc-shifting-from.html
Continuous Threat Exposure Management (CTEM) shifts focus from alerts to actual attack paths, prioritizing prevention over reaction.
Stop chasing every alert. Start managing risk with purpose.
Read more β https://thehackernews.com/2025/06/ctem-is-new-soc-shifting-from.html
π7π1
π¨ Over 269,000 legit websites hijacked with hidden JavaScript redirecting search engine visitors to malware and scams.
Using a stealthy JSFireTruck obfuscation, attackers fingerprint devices to serve fake CAPTCHAs, tech support scams, and malwareβevading detection at scale.
Learn how this massive campaign works β https://thehackernews.com/2025/06/over-269000-websites-infected-with.html
Using a stealthy JSFireTruck obfuscation, attackers fingerprint devices to serve fake CAPTCHAs, tech support scams, and malwareβevading detection at scale.
Learn how this massive campaign works β https://thehackernews.com/2025/06/over-269000-websites-infected-with.html
π€―9π5
Discord invite links are being hijacked to deliver malware that steals crypto wallets and personal data.
Attackers reuse expired/deleted invites, redirecting to fake servers, tricking users into running malicious PowerShell scripts disguised as verification.
Full details here β https://thehackernews.com/2025/06/discord-invite-link-hijacking-delivers.html
This Multi-stage attack uses Pastebin & GitHub to evade security tools.
Attackers reuse expired/deleted invites, redirecting to fake servers, tricking users into running malicious PowerShell scripts disguised as verification.
Full details here β https://thehackernews.com/2025/06/discord-invite-link-hijacking-delivers.html
This Multi-stage attack uses Pastebin & GitHub to evade security tools.
π35π€12π8π₯3π3
β οΈ A fake Python package just stole AWS tokens, Jamf data & CI/CD secrets β from devs at Grab.
The malware posed as a legit helper for ML workflows, hid a multi-stage info-stealer, and targeted macOS too.
Details here β https://thehackernews.com/2025/06/malicious-pypi-package-masquerades-as.html
The malware posed as a legit helper for ML workflows, hid a multi-stage info-stealer, and targeted macOS too.
Details here β https://thehackernews.com/2025/06/malicious-pypi-package-masquerades-as.html
π±19π₯12π10β‘5π2π2
π¨ Most cybersecurity providers are leaving money on the table.
Still selling one-off audits or patch jobs? You're missing the shift.
Strategic services like vCISO programs arenβt just higher valueβtheyβre recurring revenue machines.
How to evolve your offering β https://thehackernews.com/2025/06/playbook-transforming-your.html
Still selling one-off audits or patch jobs? You're missing the shift.
Strategic services like vCISO programs arenβt just higher valueβtheyβre recurring revenue machines.
How to evolve your offering β https://thehackernews.com/2025/06/playbook-transforming-your.html
π7π₯3π3
π¨ New ransomware βAnubisβ can encrypt your filesβand then erase them forever.
Even if you pay, recovery is impossible. Victims span healthcare, hospitality & more.
This rare dual-threat ups the pressure to pay.
Details here β https://thehackernews.com/2025/06/anubis-ransomware-encrypts-and-wipes.html
Even if you pay, recovery is impossible. Victims span healthcare, hospitality & more.
This rare dual-threat ups the pressure to pay.
Details here β https://thehackernews.com/2025/06/anubis-ransomware-encrypts-and-wipes.html
π€―19π₯10π±7β‘3π2
π¨ U.S. seizes $7.7M linked to North Korean IT worker scam targeting crypto firms.
Fake identities, AI tools, and Zoom hacks helped funnel millions to fund Pyongyangβs weapons program.
Hereβs how deep the deception goes β https://thehackernews.com/2025/06/us-seizes-774m-in-crypto-tied-to-north.html
Fake identities, AI tools, and Zoom hacks helped funnel millions to fund Pyongyangβs weapons program.
Hereβs how deep the deception goes β https://thehackernews.com/2025/06/us-seizes-774m-in-crypto-tied-to-north.html
π18π€8π€―7π6β‘5
π¨ WhatsApp ads are finally hereβinside your Status updates.
Meta says itβs privacy-friendly, but itβs tapping your location, device data, and even Facebook activity to target you.
Hereβs whatβs changing β https://thehackernews.com/2025/06/meta-starts-showing-ads-on-whatsapp.html
Meta says itβs privacy-friendly, but itβs tapping your location, device data, and even Facebook activity to target you.
Hereβs whatβs changing β https://thehackernews.com/2025/06/meta-starts-showing-ads-on-whatsapp.html
π±25π16π€―14π5β‘3π€2π₯1π1
π¨ VPNs are now a business risk β not just a security hole.
Hackers are using AI to scan for flaws 24/7. One bug in your VPN, and itβs open season.
The fix? Stop trusting the network. Start securing access.
Details here β https://thehackernews.com/expert-insights/2025/04/its-time-to-rethink-your-security-for.html
Hackers are using AI to scan for flaws 24/7. One bug in your VPN, and itβs open season.
The fix? Stop trusting the network. Start securing access.
Details here β https://thehackernews.com/expert-insights/2025/04/its-time-to-rethink-your-security-for.html
π18π₯3π1π€―1