π¨ Security vulnerabilities in Xerox VersaLink printers could allow attackers to steal authentication credentials via pass-back attacks, exposing critical systems.
CVE-2024-12510 and CVE-2024-12511 impact LDAP and SMB/FTP services and could lead to compromised Windows Active Directory access.
Get the full details: https://thehackernews.com/2025/02/new-xerox-printer-flaws-could-let.html
CVE-2024-12510 and CVE-2024-12511 impact LDAP and SMB/FTP services and could lead to compromised Windows Active Directory access.
Get the full details: https://thehackernews.com/2025/02/new-xerox-printer-flaws-could-let.html
π±13π6π€4π3π€―3
β οΈ A new campaign called RevivalStone, attributed to the China-linked Winnti group, is targeting Japanese manufacturers, materials, and energy sectors.
The attacks leveraging sophisticated tools like DEATHLOTUS and UNAPIMON to infiltrate and control enterprise systems.
Learn more: https://thehackernews.com/2025/02/winnti-apt41-targets-japanese-firms-in.html
The attacks leveraging sophisticated tools like DEATHLOTUS and UNAPIMON to infiltrate and control enterprise systems.
Learn more: https://thehackernews.com/2025/02/winnti-apt41-targets-japanese-firms-in.html
π15π€5π₯3
π¨ Critical vulnerability in Juniper Networks devices could let attackers hijack control.
The flaw affects Session Smart Routers, Conductor, and WAN Assurance Routersβputting your network at risk.
Update your devices now. Get the full details here: https://thehackernews.com/2025/02/juniper-session-smart-routers.html
The flaw affects Session Smart Routers, Conductor, and WAN Assurance Routersβputting your network at risk.
Update your devices now. Get the full details here: https://thehackernews.com/2025/02/juniper-session-smart-routers.html
π15π€3π€―1
New macOS malware alert: FrigidStealer is targeting users outside North America through fake updates to steal sensitive data.
This threat is linked to the elusive TA2727 group, which also spreads malware like Lumma Stealer and Marcher via web injects.
https://thehackernews.com/2025/02/new-frigidstealer-malware-targets-macos.html
This threat is linked to the elusive TA2727 group, which also spreads malware like Lumma Stealer and Marcher via web injects.
https://thehackernews.com/2025/02/new-frigidstealer-malware-targets-macos.html
π12π6π₯2π€2π±1
π» 93% of malware still relies on the Top 10 MITRE ATT&CK techniques.
π‘οΈ Focus on proven TTPs like credential theft and process injection to defend against the threats that matter today.
π Explore the full insights in the Picus Red Report 2025: https://thehackernews.com/2025/02/debunking-ai-hype-inside-real-hacker.html
π‘οΈ Focus on proven TTPs like credential theft and process injection to defend against the threats that matter today.
π Explore the full insights in the Picus Red Report 2025: https://thehackernews.com/2025/02/debunking-ai-hype-inside-real-hacker.html
π8π5π€2β‘1
πΌ Mustang Panda, a Chinese state-backed group, has evolved its attack methods by using Microsoftβs MAVInject.exe to inject malware into external processes, bypassing antivirus detection and remaining undetected.
Read more about the attack chain: https://thehackernews.com/2025/02/chinese-hackers-exploit-mavinjectexe-to.html
Read more about the attack chain: https://thehackernews.com/2025/02/chinese-hackers-exploit-mavinjectexe-to.html
π19π₯4π€4
π΄ Two new vulnerabilities found in OpenSSH β one allowing active Man-in-the-Middle (MitM) attacks and the other leading to Denial-of-Service (DoS).
Get the details on CVE-2025-26465 and CVE-2025-26466: https://thehackernews.com/2025/02/new-openssh-flaws-enable-man-in-middle.html
Get the details on CVE-2025-26465 and CVE-2025-26466: https://thehackernews.com/2025/02/new-openssh-flaws-enable-man-in-middle.html
π₯30π±15π3β‘1π€1π€―1
π¨ Two critical vulnerabilities in Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN are actively exploited, now added to CISA's KEV catalog.
CVE-2025-0108 allows unauthenticated attackers to bypass PAN-OS security, while CVE-2024-53704 compromises SSLVPN authentication.
Exploitation is escalating, with attack traffic spiking 10x in a week. Act now!
Read More: https://thehackernews.com/2025/02/cisa-adds-palo-alto-networks-and.html
CVE-2025-0108 allows unauthenticated attackers to bypass PAN-OS security, while CVE-2024-53704 compromises SSLVPN authentication.
Exploitation is escalating, with attack traffic spiking 10x in a week. Act now!
Read More: https://thehackernews.com/2025/02/cisa-adds-palo-alto-networks-and.html
π16π8π1π€1
π¨ALERT: A global cryptocurrency miner campaign is targeting gamers.
Cybercriminals are using popular games like BeamNG-drive and Garry's Mod to deliver malicious software, secretly mining cryptocurrency on infected gaming rigs.
Learn more: https://thehackernews.com/2025/02/trojanized-game-installers-deploy.html
Cybercriminals are using popular games like BeamNG-drive and Garry's Mod to deliver malicious software, secretly mining cryptocurrency on infected gaming rigs.
Learn more: https://thehackernews.com/2025/02/trojanized-game-installers-deploy.html
π€―13π€6π4π1
β οΈ Exposed or forgotten assets are prime hacker targets. In 2024, over 60% of breaches started with small, overlooked assets like old subdomains.
Learn how Attack Surface Management (ASM) helps you detect changes in real time and secure vulnerable assets.
Read: https://thehackernews.com/expert-insights/2025/02/how-hackers-exploit-your-attack-surface.html
Learn how Attack Surface Management (ASM) helps you detect changes in real time and secure vulnerable assets.
Read: https://thehackernews.com/expert-insights/2025/02/how-hackers-exploit-your-attack-surface.html
π17π€5
Looking to grow your cybersecurity business? vCISO services are the key to capturing the growing demand for strategic leadership.
This Ultimate Guide breaks down actionable steps for MSPs and MSSPs to build a profitable vCISO practice.
Check out: https://thehackernews.com/2025/02/the-ultimate-msp-guide-to-structuring.html
This Ultimate Guide breaks down actionable steps for MSPs and MSSPs to build a profitable vCISO practice.
Check out: https://thehackernews.com/2025/02/the-ultimate-msp-guide-to-structuring.html
π€7π1π€―1
A new Snake Keylogger variant is targeting Windows users in China, Turkey, Indonesia, Taiwan, and Spain, with over 280 million infection attempts blocked in a year.
Delivered via phishing emails, it logs keystrokes, steals credentials, and monitors clipboards from browsers like Chrome and Firefox.
Read more: https://thehackernews.com/2025/02/new-snake-keylogger-variant-leverages.html
Delivered via phishing emails, it logs keystrokes, steals credentials, and monitors clipboards from browsers like Chrome and Firefox.
Read more: https://thehackernews.com/2025/02/new-snake-keylogger-variant-leverages.html
π₯17π€5β‘4π4π3π±2π1
Russian-aligned threat actors are using malicious QR codes to hijack Signal accounts via the appβs legitimate βlinked devicesβ feature.
Once compromised, threat actors gain real-time access to victim messages, enabling persistent surveillance.
Learn how these attacks work: https://thehackernews.com/2025/02/hackers-exploit-signals-linked-devices.html
Once compromised, threat actors gain real-time access to victim messages, enabling persistent surveillance.
Learn how these attacks work: https://thehackernews.com/2025/02/hackers-exploit-signals-linked-devices.html
π₯23π11π€―11π3β‘2π€2π1
π¨ Microsoft has issued high-severity security updates for Bing (CVE-2025-21355) and Power Pages (CVE-2025-24989), addressing two serious flaws.
One of these vulnerabilities is already being exploited in the wild.
Read more: https://thehackernews.com/2025/02/microsoft-patches-actively-exploited.html
One of these vulnerabilities is already being exploited in the wild.
Read more: https://thehackernews.com/2025/02/microsoft-patches-actively-exploited.html
π₯13π6π€5π4
Citrix has patched a severe flaw in NetScaler Console & Agent (CVE-2024-12284) with a CVSS score of 8.8.
This privilege escalation bug could allow authenticated attackers to execute unauthorized actions.
UPDATE immediately to the latest versions.
Read: https://thehackernews.com/2025/02/citrix-releases-security-fix-for.html
This privilege escalation bug could allow authenticated attackers to execute unauthorized actions.
UPDATE immediately to the latest versions.
Read: https://thehackernews.com/2025/02/citrix-releases-security-fix-for.html
β‘9π6π€2π₯1
π UPDATE: Researchers reveal tech details on credential coercion vulnerabilities (CVE-2024-13159-13161, 10811) in Ivanti EPM. Attackers could compromise servers via relay attacks.
β‘ Patch urgently if you havenβt done so alreadyβPoC exploit now in the wild.
https://thehackernews.com/2025/01/researcher-uncovers-critical-flaws-in.html
β‘ Patch urgently if you havenβt done so alreadyβPoC exploit now in the wild.
https://thehackernews.com/2025/01/researcher-uncovers-critical-flaws-in.html
π12π€6π3π2
π
Mark your calendars!
Microsoft Exchange 2016 and 2019 support ends on October 14, 2025. This means no more security patches or technical support.
π Without updates, these versions will be prime targets for cybercriminals.
Get the full details on your migration options in the article: https://thehackernews.com/2025/02/microsoft-end-of-support-for-exchange-2016-and-exchange-2019.html
Microsoft Exchange 2016 and 2019 support ends on October 14, 2025. This means no more security patches or technical support.
π Without updates, these versions will be prime targets for cybercriminals.
Get the full details on your migration options in the article: https://thehackernews.com/2025/02/microsoft-end-of-support-for-exchange-2016-and-exchange-2019.html
π18π₯5π2π1π€1
Cybercriminals are using the Eclipse Foundationβs jarsigner tool to distribute XLoader malware, exploiting DLL side-loading techniques.
The malware now employs complex encryption at runtime, making signature-based defenses less effective.
Read more: https://thehackernews.com/2025/02/cybercriminals-use-eclipse-jarsigner-to.html
The malware now employs complex encryption at runtime, making signature-based defenses less effective.
Read more: https://thehackernews.com/2025/02/cybercriminals-use-eclipse-jarsigner-to.html
π±10π4π€2π1
π The Green Nailao campaign deployed NailaoLocker ransomware, locking files and demanding Bitcoin payments.
Attackers exploited a Check Point flaw to steal credentials and escalate via RDP.
π Learn more: https://thehackernews.com/2025/02/chinese-linked-attackers-exploit-check.html
Attackers exploited a Check Point flaw to steal credentials and escalate via RDP.
π Learn more: https://thehackernews.com/2025/02/chinese-linked-attackers-exploit-check.html
π₯12π3π2π€1π€―1
By March 31, 2025, all businesses handling cardholder data must implement PCI DSS 4.0 DMARC β No exceptions.
Failure to comply could cost you $5K-$100K in penaltiesβand thatβs just the start.
Read the full article now: https://thehackernews.com/2025/02/pci-dss-40-mandates-dmarc-by-31st-march.html
Failure to comply could cost you $5K-$100K in penaltiesβand thatβs just the start.
Read the full article now: https://thehackernews.com/2025/02/pci-dss-40-mandates-dmarc-by-31st-march.html
π11π₯6π5π€1π±1
π¨ Freelance developers are under attack.
North Korean hackers use fake job interviews on Upwork and GitHub to infect crypto developers with BeaverTail and InvisibleFerret malware, stealing credentials and funds.
π Get the full story: https://thehackernews.com/2025/02/north-korean-hackers-target-freelance.html
North Korean hackers use fake job interviews on Upwork and GitHub to infect crypto developers with BeaverTail and InvisibleFerret malware, stealing credentials and funds.
π Get the full story: https://thehackernews.com/2025/02/north-korean-hackers-target-freelance.html
π23π±11β‘9π6π€3π₯1