Forwarded from The Hacker News
⚠️ Kimsuky, the North Korea-linked hacker group, is adopting a new tactic: deceiving victims into running malicious PowerShell commands.
This method tricks targets into executing harmful code that allows remote access and data theft.
Learn more: https://thehackernews.com/2025/02/north-korean-hackers-exploit-powershell.html
This method tricks targets into executing harmful code that allows remote access and data theft.
Learn more: https://thehackernews.com/2025/02/north-korean-hackers-exploit-powershell.html
Forwarded from The Hacker News
Learn from the infosec lead at a bank who cut threat response time in half and saved millions of dollars in prevented incidents on a budget.
Must-read for all CISOs out there: https://thn.news/bank-security-sandbox-tg
Must-read for all CISOs out there: https://thn.news/bank-security-sandbox-tg
Forwarded from The Hacker News
CISOs are becoming AI leaders – and there’s a framework to guide them.
The CLEAR framework is your roadmap!
➤ Create AI asset inventories
➤ Learn user behaviors
➤ Enforce AI policies
➤ Apply security-focused AI use cases
➤ Reuse existing frameworks (NIST, ISO)
🔗 Read more: https://thehackernews.com/2025/02/how-to-steer-ai-adoption-ciso-guide.html
The CLEAR framework is your roadmap!
➤ Create AI asset inventories
➤ Learn user behaviors
➤ Enforce AI policies
➤ Apply security-focused AI use cases
➤ Reuse existing frameworks (NIST, ISO)
🔗 Read more: https://thehackernews.com/2025/02/how-to-steer-ai-adoption-ciso-guide.html
Forwarded from The Hacker News
🚨 Alert - A new vulnerability (CVE-2025-23359) in NVIDIA's Container Toolkit could break container isolation and give attackers full access to your system.
If exploited, attackers could bypass isolation protections, accessing your files and even running malicious code.
🔗 Get all the details: https://thehackernews.com/2025/02/researchers-find-new-exploit-bypassing.html
If exploited, attackers could bypass isolation protections, accessing your files and even running malicious code.
🔗 Get all the details: https://thehackernews.com/2025/02/researchers-find-new-exploit-bypassing.html
Forwarded from The Hacker News
⚠️ Russian-backed hacking group Sandworm has launched BadPilot—a massive global operation targeting high-value sectors worldwide.
➥ 8 known vulnerabilities exploited
➥ Energy, telecommunications, shipping, and government entities compromised
Read the full report: https://thehackernews.com/2025/02/microsoft-uncovers-sandworm-subgroups.html
➥ 8 known vulnerabilities exploited
➥ Energy, telecommunications, shipping, and government entities compromised
Read the full report: https://thehackernews.com/2025/02/microsoft-uncovers-sandworm-subgroups.html
Forwarded from The Hacker News
🚨 Alert: Hackers used Windows Remote Management (WinRM) to infiltrate networks and deploy FINALDRAFT malware on a South American ministry.
FINALDRAFT targets both Windows and Linux systems, using Microsoft Graph API to hide its command-and-control in Outlook drafts.
Learn more: https://thehackernews.com/2025/02/finaldraft-malware-exploits-microsoft.html
FINALDRAFT targets both Windows and Linux systems, using Microsoft Graph API to hide its command-and-control in Outlook drafts.
Learn more: https://thehackernews.com/2025/02/finaldraft-malware-exploits-microsoft.html
Forwarded from The Hacker News
🔴 Palo Alto Networks has rolled out fixes for PAN-OS vulnerabilities, including a severe authentication bypass (CVE-2025-0108) flaw.
🔧 Learn more about the patches: https://thehackernews.com/2025/02/palo-alto-networks-patches.html
🔧 Learn more about the patches: https://thehackernews.com/2025/02/palo-alto-networks-patches.html
Forwarded from The Hacker News
⚠️ China-linked espionage group used PlugX malware and a Toshiba binary in a ransomware attack on a South Asian software company.
The attack exploited the CVE-2024-0012 vulnerability in Palo Alto Networks software.
👉 Read the full story to learn more: https://thehackernews.com/2025/02/hackers-exploited-pan-os-flaw-to-deploy.html
The attack exploited the CVE-2024-0012 vulnerability in Palo Alto Networks software.
👉 Read the full story to learn more: https://thehackernews.com/2025/02/hackers-exploited-pan-os-flaw-to-deploy.html
Forwarded from The Hacker News
🔒 Are last-minute security fixes slowing your releases? Is your team caught in a tug-of-war between speed and safety?
Our next cybersecurity webinar shows you how to:
• Bridge the gap between development and security
• Secure your code from the start
• Get actionable tips from Palo Alto Networks
Ready to learn? Register now: https://thehackernews.com/2025/02/fast-deployments-secure-code-watch-this.html
Our next cybersecurity webinar shows you how to:
• Bridge the gap between development and security
• Secure your code from the start
• Get actionable tips from Palo Alto Networks
Ready to learn? Register now: https://thehackernews.com/2025/02/fast-deployments-secure-code-watch-this.html
Forwarded from The Hacker News
🔥 Simplify Security & Boost Efficiency with Extensible CIAM!
An extensible CIAM solution strengthens security, improves user experience, and accelerates growth.
🔒 Reduce identity-based threats
⚡ Speed up time-to-market with seamless integrations
✅ Ensure compliance without added complexity
Discover how CIAM transforms security and efficiency: https://thehackernews.com/expert-insights/2025/02/solving-identity-challenges-with.html
An extensible CIAM solution strengthens security, improves user experience, and accelerates growth.
🔒 Reduce identity-based threats
⚡ Speed up time-to-market with seamless integrations
✅ Ensure compliance without added complexity
Discover how CIAM transforms security and efficiency: https://thehackernews.com/expert-insights/2025/02/solving-identity-challenges-with.html
Forwarded from The Hacker News
🛑 North Korea-linked hackers are actively targeting South Korea’s government, business, and cryptocurrency sectors—using Dropbox for payload distribution and data exfiltration.
• Short-lived, dynamic cloud infrastructure to evade tracking
• OAuth token authentication to seamlessly move data
• Multi-stage PowerShell execution to remain stealthy
🔗 Read the full analysis: https://thehackernews.com/2025/02/north-korean-apt43-uses-powershell-and.html
• Short-lived, dynamic cloud infrastructure to evade tracking
• OAuth token authentication to seamlessly move data
• Multi-stage PowerShell execution to remain stealthy
🔗 Read the full analysis: https://thehackernews.com/2025/02/north-korean-apt43-uses-powershell-and.html
Forwarded from The Hacker News
🚨 Enter your card details once? It “fails.” Try again? Still “fails.” Third time? You’re sent to an error page—but the attackers now have everything they need.
Cybercriminals are using bogus PDFs on Webflow CDN to steal credit card details from unsuspecting users.
🔗 Don’t fall for it—know the warning signs: https://thehackernews.com/2025/02/hackers-use-captcha-trick-on-webflow.html
Cybercriminals are using bogus PDFs on Webflow CDN to steal credit card details from unsuspecting users.
🔗 Don’t fall for it—know the warning signs: https://thehackernews.com/2025/02/hackers-use-captcha-trick-on-webflow.html
Forwarded from The Hacker News
🛑 AI is everywhere—and hackers are also using AI to run large-scale social engineering, create deepfakes, and exploit app vulnerabilities faster than ever.
How can we build AI securely while leveraging it for defense?
Find out in this latest analysis: https://thehackernews.com/2025/02/ai-and-security-new-puzzle-to-figure-out.html
How can we build AI securely while leveraging it for defense?
Find out in this latest analysis: https://thehackernews.com/2025/02/ai-and-security-new-puzzle-to-figure-out.html
Forwarded from The Hacker News
Struggling to filter the AI hype from actual threat? Check out the latest webinar from Push Security to learn how new AI Computer-Using Agents (no, not DeepSeek) can be used to automate identity attacks against SaaS through the kill chain, from Recon to Exfil 🤖🚨
Register now! https://thn.news/ai-attacks-webinar-tg
Register now! https://thn.news/ai-attacks-webinar-tg
Forwarded from The Hacker News
🛑 A dangerous combo attack has been discovered exploiting a PostgreSQL SQL injection flaw (CVE-2025-1094) and a BeyondTrust remote access bug (CVE-2024-12356).
🛠️ Patches available for both vulnerabilities.
🔗 Read more and secure your systems NOW: https://thehackernews.com/2025/02/postgresql-vulnerability-exploited.html
🛠️ Patches available for both vulnerabilities.
🔗 Read more and secure your systems NOW: https://thehackernews.com/2025/02/postgresql-vulnerability-exploited.html
Forwarded from The Hacker News
🚨 WARNING: CVE-2025-0108 Under Active Exploitation
Palo Alto Networks PAN-OS is being targeted by attackers exploiting a newly patched authentication bypass flaw (CVE-2025-0108).
➔ Flaw allows unauthenticated attackers to execute specific PHP scripts.
➔ Exploitation attempts have been traced to IPs in U.S., China, and Israel.
🛠️ Patch now to prevent unauthorized access.
🔗 Get the full details and patch guidance: https://thehackernews.com/2025/02/palo-alto-networks-patches.html
Palo Alto Networks PAN-OS is being targeted by attackers exploiting a newly patched authentication bypass flaw (CVE-2025-0108).
➔ Flaw allows unauthenticated attackers to execute specific PHP scripts.
➔ Exploitation attempts have been traced to IPs in U.S., China, and Israel.
🛠️ Patch now to prevent unauthorized access.
🔗 Get the full details and patch guidance: https://thehackernews.com/2025/02/palo-alto-networks-patches.html
Forwarded from The Hacker News
🚨 RansomHub, the most active ransomware group of 2024, has targeted over 600 organizations worldwide by exploiting flaws in Microsoft Active Directory and using brute-force attacks on VPNs to breach networks.
It also partners with LockBit & BlackCat to expand operations.
🔗 Discover more about this evolving threat: https://thehackernews.com/2025/02/ransomhub-becomes-2024s-top-ransomware.html
It also partners with LockBit & BlackCat to expand operations.
🔗 Discover more about this evolving threat: https://thehackernews.com/2025/02/ransomhub-becomes-2024s-top-ransomware.html
Forwarded from The Hacker News
⚠️ Microsoft warns of Russian-aligned hacker group Storm-2372 using 'device code phishing' to steal authentication tokens, gain persistent access, and infiltrate global sectors.
🎯 Targets: Government, IT, Defense, Health, Education, Energy
🌍 Regions: Europe, North America, Africa, Middle East
🕵️♂️ Tactics: Phishing via WhatsApp, Signal, Teams
📲 Attack Method: Device code phishing to access accounts
🔗 Read full report: https://thehackernews.com/2025/02/microsoft-russian-linked-hackers-using.html
🎯 Targets: Government, IT, Defense, Health, Education, Energy
🌍 Regions: Europe, North America, Africa, Middle East
🕵️♂️ Tactics: Phishing via WhatsApp, Signal, Teams
📲 Attack Method: Device code phishing to access accounts
🔗 Read full report: https://thehackernews.com/2025/02/microsoft-russian-linked-hackers-using.html
Forwarded from The Hacker News
⚠️ Generative AI is supercharging social engineering tactics—transforming cybercriminals’ capabilities overnight.
From deepfake videos to voice cloning, attackers now have tools that go beyond traditional methods.
🔗 Learn how these technologies are reshaping cyber risks: https://thehackernews.com/2025/02/ai-powered-social-engineering-ancillary.html
From deepfake videos to voice cloning, attackers now have tools that go beyond traditional methods.
🔗 Learn how these technologies are reshaping cyber risks: https://thehackernews.com/2025/02/ai-powered-social-engineering-ancillary.html
Forwarded from The Hacker News
👨💻 Lazarus Group uses a previously undocumented JavaScript implant, Marstech1, targeting developers in a highly sophisticated attack.
This new implant poses a significant supply chain risk, collecting sensitive data and targeting cryptocurrency wallets across multiple platforms.
👉 Read the full article: https://thehackernews.com/2025/02/lazarus-group-deploys-marstech1.html
This new implant poses a significant supply chain risk, collecting sensitive data and targeting cryptocurrency wallets across multiple platforms.
👉 Read the full article: https://thehackernews.com/2025/02/lazarus-group-deploys-marstech1.html