Forwarded from The Hacker News
A massive botnet powered by 13,000 hijacked MikroTik routers is sending malicious emails to bypass email protections and launch malware campaigns.
The attack leverages misconfigured DNS and SPF records, making it easier for threat actors to spoof legitimate domains.
Read the full analysis here: https://thehackernews.com/2025/01/13000-mikrotik-routers-hijacked-by.html
The attack leverages misconfigured DNS and SPF records, making it easier for threat actors to spoof legitimate domains.
Read the full analysis here: https://thehackernews.com/2025/01/13000-mikrotik-routers-hijacked-by.html
Forwarded from The Hacker News
Your app’s security should be resilient, not just protective.
Join Guardsquare's webinar to learn how to safeguard against evolving threats with multilayered protections without compromising performance or speed.
Register now: https://thn.news/multi-layered-app-protection-x
Join Guardsquare's webinar to learn how to safeguard against evolving threats with multilayered protections without compromising performance or speed.
Register now: https://thn.news/multi-layered-app-protection-x
Forwarded from The Hacker News
🚨 New Murdoc_Botnet Targets IoT Devices Worldwide!
Researchers have uncovered a massive botnet exploiting security flaws (CVE-2017-17215 & CVE-2024-7029) in AVTECH cameras and Huawei routers.
It has already infected 1,370+ devices since July 2024.
👉 Update your firmware, change default passwords, and secure your network now.
Find details here: https://thehackernews.com/2025/01/murdocbotnet-found-exploiting-avtech-ip.html
Researchers have uncovered a massive botnet exploiting security flaws (CVE-2017-17215 & CVE-2024-7029) in AVTECH cameras and Huawei routers.
It has already infected 1,370+ devices since July 2024.
👉 Update your firmware, change default passwords, and secure your network now.
Find details here: https://thehackernews.com/2025/01/murdocbotnet-found-exploiting-avtech-ip.html
Forwarded from The Hacker News
🔒 Details Emerge About BitLocker Flaw!
CVE-2025-21210 allows attackers to bypass BitLocker encryption by corrupting a registry key, which causes unencrypted hibernation images to be written to disk.
Learn more: https://thehackernews.com/2025/01/3-actively-exploited-zero-day-flaws.html#details-emerge-about-cve-2025-21210
CVE-2025-21210 allows attackers to bypass BitLocker encryption by corrupting a registry key, which causes unencrypted hibernation images to be written to disk.
Learn more: https://thehackernews.com/2025/01/3-actively-exploited-zero-day-flaws.html#details-emerge-about-cve-2025-21210
Forwarded from The Hacker News
📣 CISA BOD 25-01 is here.
This latest directive outlines requirements to ensure that Microsoft 365 cloud environments and SaaS applications are safe and secure.
Get prepared to meet those essential compliance deadlines.
🔗 Learn how federal civilian agencies can ensure SCuBA policy alignment: https://thn.news/o8o8sp2s
This latest directive outlines requirements to ensure that Microsoft 365 cloud environments and SaaS applications are safe and secure.
Get prepared to meet those essential compliance deadlines.
🔗 Learn how federal civilian agencies can ensure SCuBA policy alignment: https://thn.news/o8o8sp2s
Forwarded from The Hacker News
⚡ Cloudflare’s latest report reveals the largest DDoS attack ever recorded — 5.6 Terabits per second!
⤷ Originated from over 13,000 IoT devices
⤷ The attack targeted an ISP in Eastern Asia
👉 Learn more: https://thehackernews.com/2025/01/mirai-botnet-launches-record-56-tbps.html
⤷ Originated from over 13,000 IoT devices
⤷ The attack targeted an ISP in Eastern Asia
👉 Learn more: https://thehackernews.com/2025/01/mirai-botnet-launches-record-56-tbps.html
Forwarded from The Hacker News
⚠️ Oracle has released its Critical Patch Update for January 2025, addressing a massive 318 security vulnerabilities across its products.
The most severe flaw could give attackers full control over affected systems.
Read the full update: https://thehackernews.com/2025/01/oracle-releases-january-2025-patch-to.html
The most severe flaw could give attackers full control over affected systems.
Read the full update: https://thehackernews.com/2025/01/oracle-releases-january-2025-patch-to.html
Forwarded from The Hacker News
🚨 Alert: A previously unknown China-linked APT group, PlushDaemon, has been linked to a 2023 supply chain attack targeting a South Korean VPN provider.
From screen recording to browser password harvesting – this backdoor does it all.
Read more: https://thehackernews.com/2025/01/plushdaemon-apt-targets-south-korean.html
From screen recording to browser password harvesting – this backdoor does it all.
Read more: https://thehackernews.com/2025/01/plushdaemon-apt-targets-south-korean.html
Forwarded from The Hacker News
🤔 65% of security teams rely solely on pentest vendors for their reports. What happens when you can’t verify those reports?
⤷ HackGATE fixes this by offering real-time visibility into pentest activities.
⤷ Gain deeper insight into every test phase, ensuring quality and accountability.
Don’t just trust the report—verify it!
⚡ See how HackGATE can help: https://thehackernews.com/2025/01/hackgate-setting-new-standards-for.html
⤷ HackGATE fixes this by offering real-time visibility into pentest activities.
⤷ Gain deeper insight into every test phase, ensuring quality and accountability.
Don’t just trust the report—verify it!
⚡ See how HackGATE can help: https://thehackernews.com/2025/01/hackgate-setting-new-standards-for.html
Forwarded from The Hacker News
⚖️ U.S. President Trump pardons Ross Ulbricht, creator of the Silk Road darkweb marketplace, after 11 years behind bars.
Ulbricht’s life sentence for trafficking and hacking is now officially void.
👉 Read the full article: https://thehackernews.com/2025/01/president-trump-pardons-silk-road.html
Ulbricht’s life sentence for trafficking and hacking is now officially void.
👉 Read the full article: https://thehackernews.com/2025/01/president-trump-pardons-silk-road.html
Forwarded from The Hacker News
🇰🇵 North Korean malware #InvisibleFerret uses fake tech job interviews
It's target: corporate info, crypto data, source code 🎯
Read comprehensive technical analysis of this threat from @AnyRun_app
https://thn.news/invisibleferret-tech-analysis
It's target: corporate info, crypto data, source code 🎯
Read comprehensive technical analysis of this threat from @AnyRun_app
https://thn.news/invisibleferret-tech-analysis
Forwarded from The Hacker News
🔐 New FREE Risk Assessment for Security Teams!
As GenAI and SaaS apps become essential, your organization’s security risks are growing. Employees' browser behavior could be leaking sensitive data.
🔍 Gain actionable insights and uncover hidden risks with this customized risk assessment: https://thehackernews.com/2025/01/discover-hidden-browsing-threats-free.html
As GenAI and SaaS apps become essential, your organization’s security risks are growing. Employees' browser behavior could be leaking sensitive data.
🔍 Gain actionable insights and uncover hidden risks with this customized risk assessment: https://thehackernews.com/2025/01/discover-hidden-browsing-threats-free.html
Forwarded from The Hacker News
🛑 Zero-Day Exploit in Cambium Routers!
Threat actors are exploiting this flaw to deploy the AIRASHI botnet, carrying out powerful DDoS attacks of up to 3 Tbps.
Take action to secure your IoT devices before it’s too late.
Learn more here: https://thehackernews.com/2025/01/hackers-exploit-zero-day-in-cnpilot.html
Threat actors are exploiting this flaw to deploy the AIRASHI botnet, carrying out powerful DDoS attacks of up to 3 Tbps.
Take action to secure your IoT devices before it’s too late.
Learn more here: https://thehackernews.com/2025/01/hackers-exploit-zero-day-in-cnpilot.html
Forwarded from The Hacker News
🔥 The Trump administration has just terminated all DHS advisory committee memberships, including the key Cyber Safety Review Board (CSRB).
CSRB's past work included:
⤷ Reporting on Log4Shell and LAPSUS$ intrusions
⤷ Holding tech firms accountable for cybersecurity lapses
⤷ Investigating Salt Typhoon, a Chinese hacking group targeting U.S. telecoms
Read → https://thehackernews.com/2025/01/trump-terminates-dhs-advisory-committee.html
CSRB's past work included:
⤷ Reporting on Log4Shell and LAPSUS$ intrusions
⤷ Holding tech firms accountable for cybersecurity lapses
⤷ Investigating Salt Typhoon, a Chinese hacking group targeting U.S. telecoms
Read → https://thehackernews.com/2025/01/trump-terminates-dhs-advisory-committee.html
Forwarded from The Hacker News
🔒 Google uncovers "TRIPLESTRENGTH," a financially motivated hacker group targeting cloud environments for cryptojacking and ransomware.
Their extensive reach includes Google Cloud, AWS, and Microsoft Azure.
👉 Read the full report: https://thehackernews.com/2025/01/triplestrength-targets-cloud-platforms.html
Their extensive reach includes Google Cloud, AWS, and Microsoft Azure.
👉 Read the full report: https://thehackernews.com/2025/01/triplestrength-targets-cloud-platforms.html
Forwarded from The Hacker News
🚨 Critical Cisco Flaw Exposes Admin Access!
A new vulnerability in Cisco Meeting Management (CVE-2025-20156) could allow attackers to gain full administrator control. 🔐
Also, CISA and FBI issue a warning on Ivanti exploit chains—targeting government and private sector networks.
Learn more: https://thehackernews.com/2025/01/cisco-fixes-critical-privilege.html
A new vulnerability in Cisco Meeting Management (CVE-2025-20156) could allow attackers to gain full administrator control. 🔐
Also, CISA and FBI issue a warning on Ivanti exploit chains—targeting government and private sector networks.
Learn more: https://thehackernews.com/2025/01/cisco-fixes-critical-privilege.html
Forwarded from The Hacker News
⚠️ A new BackConnect (BC) malware linked to QakBot is out, and it's evolving FAST.
Both QakBot and Black Basta are using this shared tool to ramp up their attacks, affecting thousands.
Find out: https://thehackernews.com/2025/01/qakbot-linked-bc-malware-adds-enhanced.html
Both QakBot and Black Basta are using this shared tool to ramp up their attacks, affecting thousands.
Find out: https://thehackernews.com/2025/01/qakbot-linked-bc-malware-adds-enhanced.html
Forwarded from The Hacker News
🔎 Is your website tracking users more than necessary?
🚨 45% of third-party apps on websites access sensitive user data unnecessarily.
Take steps to secure your site—get actionable tips in the full report: https://thehackernews.com/2025/01/new-research-state-of-web-exposure-2025.html
🚨 45% of third-party apps on websites access sensitive user data unnecessarily.
Take steps to secure your site—get actionable tips in the full report: https://thehackernews.com/2025/01/new-research-state-of-web-exposure-2025.html
Forwarded from The Hacker News
👉 50-80% of enterprise breaches are due to credential & user-based attacks.
Legacy authentication methods are outdated and vulnerable, but cutting-edge authentication systems are now making attacks impossible.
Learn how to upgrade your security today: https://thehackernews.com/2025/01/eliminate-identity-based-threats.html
Legacy authentication methods are outdated and vulnerable, but cutting-edge authentication systems are now making attacks impossible.
Learn how to upgrade your security today: https://thehackernews.com/2025/01/eliminate-identity-based-threats.html
Forwarded from The Hacker News
Did you know security teams can now enforce MFA on user accounts directly in their web browser — even for apps that don’t allow mandatory MFA enforcement?
With Push Security, spend less time chasing users to configure MFA or trying to manually enforce it across hundreds of apps.
https://thn.news/mfa-enforce-other
With Push Security, spend less time chasing users to configure MFA or trying to manually enforce it across hundreds of apps.
https://thn.news/mfa-enforce-other
Forwarded from The Hacker News
🔒 HellCat & Morpheus Ransomware Sharing Identical Code!
Cybercriminals are using the same payload for attacks—just with victim-specific tweaks. Smaller, more agile groups like these may dominate the threat landscape moving forward.
👉 Read analysis: https://thehackernews.com/2025/01/experts-find-shared-codebase-linking.html
Cybercriminals are using the same payload for attacks—just with victim-specific tweaks. Smaller, more agile groups like these may dominate the threat landscape moving forward.
👉 Read analysis: https://thehackernews.com/2025/01/experts-find-shared-codebase-linking.html