๐จ A fake CAPTCHA just breached hospitals, universities, and city networks.
The scary part? Victims copied the attack code themselves โ straight from their browser.
Itโs called ClickFix, and it hijacks users through โfix this pageโ pop-ups โ no downloads, no phishing email needed.
See how it slips past every control โ https://thehackernews.com/2025/10/analysing-clickfix-3-reasons-why.html
The scary part? Victims copied the attack code themselves โ straight from their browser.
Itโs called ClickFix, and it hijacks users through โfix this pageโ pop-ups โ no downloads, no phishing email needed.
See how it slips past every control โ https://thehackernews.com/2025/10/analysing-clickfix-3-reasons-why.html
๐31๐ฑ10๐ฅ5๐คฏ3โก2๐2
A Chinese-linked hacking group breached Europeโs telecom defenses โ weaponizing antivirus software.
They planted a backdoor in legitimate Norton and Bkav installs.
Payload: SnappyBee, a new ShadowPad variant delivered via DLL side-loading.
Learn more โ https://thehackernews.com/2025/10/hackers-used-snappybee-malware-and.html
They planted a backdoor in legitimate Norton and Bkav installs.
Payload: SnappyBee, a new ShadowPad variant delivered via DLL side-loading.
Learn more โ https://thehackernews.com/2025/10/hackers-used-snappybee-malware-and.html
๐ฅ10๐ค5๐3๐คฏ3๐ฑ2
Russiaโs COLDRIVER hackers rebuilt their malware tools in just 5 days.
Meet NOROBOT, YESROBOT, and MAYBEROBOT โ hidden behind fake CAPTCHA checks and PowerShell tricks.
Google just exposed how they did it โ https://thehackernews.com/2025/10/google-identifies-three-new-russian.html
Meet NOROBOT, YESROBOT, and MAYBEROBOT โ hidden behind fake CAPTCHA checks and PowerShell tricks.
Google just exposed how they did it โ https://thehackernews.com/2025/10/google-identifies-three-new-russian.html
๐14๐ฅ6โก4๐คฏ4
โ ๏ธ 7 out of 10 threats faced by SOCs begin with phishing.
Phishkits dominate the threat landscape and become increasingly harder to detect.
Act now to set up strong defenses with fresh, actionable intel from 15K orgs โคต๏ธ https://thn.news/threat-intel-tg
Phishkits dominate the threat landscape and become increasingly harder to detect.
Act now to set up strong defenses with fresh, actionable intel from 15K orgs โคต๏ธ https://thn.news/threat-intel-tg
๐7๐2๐ค2
โ ๏ธ Your AppSec blind spots are costing you.
The gap between code and cloud runtime drives 90% of delayed fixesโand missed accountability.
Map vulnerabilities, misconfigs, and secrets across your pipeline to regain control.
Cut the noise. Reduce risk. Start now โ https://thehacker.news/code-to-cloud-appsec
The gap between code and cloud runtime drives 90% of delayed fixesโand missed accountability.
Map vulnerabilities, misconfigs, and secrets across your pipeline to regain control.
Cut the noise. Reduce risk. Start now โ https://thehacker.news/code-to-cloud-appsec
๐ค6
๐ฅ Your Cisco, ASUS, QNAP, or Synology router might secretly be part of a botnet.
A new threat called PolarEdge is hiding inside routers, turning them into undetectable spies using a secret TLS server and a hidden config file.
Exploit chain, IOCs & decryption trick โ https://thehackernews.com/2025/10/polaredge-targets-cisco-asus-qnap.html
A new threat called PolarEdge is hiding inside routers, turning them into undetectable spies using a secret TLS server and a hidden config file.
Exploit chain, IOCs & decryption trick โ https://thehackernews.com/2025/10/polaredge-targets-cisco-asus-qnap.html
๐8๐ฅ2๐ค2
Meta just rolled out new anti-scam tools for WhatsApp & Messenger.
โ ๏ธ Screen-share warnings
๐ค AI scam detection
๐จ Instant alerts
... but one setting quietly breaks ๐ encryption.
Learn more โ https://thehackernews.com/2025/10/meta-rolls-out-new-tools-to-protect.html
โ ๏ธ Screen-share warnings
๐ค AI scam detection
๐จ Instant alerts
... but one setting quietly breaks ๐ encryption.
Learn more โ https://thehackernews.com/2025/10/meta-rolls-out-new-tools-to-protect.html
๐12๐ฑ6๐4๐ฅ3
Every new AI tool in your SOC adds another way in for attackers.
The defender might now be the weak spot.
AI agents are making decisions on their own โ and trust just became an identity problem.
Learn how to secure them before someone else does โ https://thehackernews.com/2025/10/securing-ai-to-benefit-from-ai.html
The defender might now be the weak spot.
AI agents are making decisions on their own โ and trust just became an identity problem.
Learn how to secure them before someone else does โ https://thehackernews.com/2025/10/securing-ai-to-benefit-from-ai.html
๐10๐7๐ฅ2
๐จ TP-Linkโs Omada gateways just got hit with four major security flaws โ two can let hackers run commands without logging in.
A remote attacker could take full control โ no password needed.
Patch now. Details โ https://thehackernews.com/2025/10/tp-link-patches-four-omada-gateway.html
A remote attacker could take full control โ no password needed.
Patch now. Details โ https://thehackernews.com/2025/10/tp-link-patches-four-omada-gateway.html
๐15๐คฏ6๐ฅ1
A tiny Rust bug just broke thousands of builds.
Itโs called TARmageddon (CVE-2025-62518) โ a flaw in the async-tar library that lets attackers slip hidden files inside nested TAR archives.
Unpatched since 2023, developers are now racing to fix it โ https://thehackernews.com/2025/10/tarmageddon-flaw-in-async-tar-rust.html
Itโs called TARmageddon (CVE-2025-62518) โ a flaw in the async-tar library that lets attackers slip hidden files inside nested TAR archives.
Unpatched since 2023, developers are now racing to fix it โ https://thehackernews.com/2025/10/tarmageddon-flaw-in-async-tar-rust.html
๐16๐ฅ1๐ค1
๐จ PassiveNeuron is still active.
Hackers are breaking in through Microsoft SQL servers, planting custom malware (Neursite & NeuralExecutor), and even using GitHub to hide their command servers โ a rare move in state-level spying.
Full story โ https://thehackernews.com/2025/10/researchers-identify-passiveneuron-apt.html
Hackers are breaking in through Microsoft SQL servers, planting custom malware (Neursite & NeuralExecutor), and even using GitHub to hide their command servers โ a rare move in state-level spying.
Full story โ https://thehackernews.com/2025/10/researchers-identify-passiveneuron-apt.html
๐ฅ14๐3
๐ค Nearly 40% of alerts still go unseen.
AI-SOCs now handle triage, cut false positives, and alert teams with full context. But as Shahar Ben-Hador explains โ outsource or not, you still own the breach.
$30K vs $100K+โฆ hereโs who should switch โ https://thehackernews.com/expert-insights/2025/10/what-happens-to-mssps-and-mdrs-in-age.html
AI-SOCs now handle triage, cut false positives, and alert teams with full context. But as Shahar Ben-Hador explains โ outsource or not, you still own the breach.
$30K vs $100K+โฆ hereโs who should switch โ https://thehackernews.com/expert-insights/2025/10/what-happens-to-mssps-and-mdrs-in-age.html
๐4๐ฅ2๐ค1
๐ 8-character passwords are dead.
๐ Hackers crack โP@ssw0rd!โ in months.
๐ก The fix isnโt symbols โ itโs length.
16 simple letters beat any complex mix.
Use words, not symbols.
Why your policy still fails โ https://thehackernews.com/2025/10/why-you-should-swap-passwords-for.html
๐ Hackers crack โP@ssw0rd!โ in months.
๐ก The fix isnโt symbols โ itโs length.
16 simple letters beat any complex mix.
Use words, not symbols.
Why your policy still fails โ https://thehackernews.com/2025/10/why-you-should-swap-passwords-for.html
๐ฅ22๐8๐ค3
Hackers linked to China exploited a โpatchedโ Microsoft SharePoint flaw to break into networks across four continents.
It wasnโt just spying โ they found a way to bypass the patch that fixed a previous bypass.
Symantec warns the campaign is still spreading.
Read โ https://thehackernews.com/2025/10/chinese-threat-actors-exploit-toolshell.html
It wasnโt just spying โ they found a way to bypass the patch that fixed a previous bypass.
Symantec warns the campaign is still spreading.
Read โ https://thehackernews.com/2025/10/chinese-threat-actors-exploit-toolshell.html
๐คฏ17๐ฅ8๐1
Your cloud might flag the same issue across five tools โ XDR, CSPM, SIEM, CMDB, and more.
Each reports it differently. None resolve it.
Thatโs the real challenge: detection is easy; remediation isnโt.
Learn how Pentera Resolve turns alerts into action โ https://thehackernews.com/2025/10/bridging-remediation-gap-introducing.html
Each reports it differently. None resolve it.
Thatโs the real challenge: detection is easy; remediation isnโt.
Learn how Pentera Resolve turns alerts into action โ https://thehackernews.com/2025/10/bridging-remediation-gap-introducing.html
๐5๐ฅ1
Which Industries Are Most at Risk for DDoS Attacks?
While DDoS attacks can hit any organization, some industries face far higher riskโand potentially greater impact when they do.
The latest DDoS Resiliency Score (DRS) report ranks the industries most frequently targeted and explains why.
Here's the list of the highest risk sectors. For the full list of industries, see here - https://thn.news/ddos-risk-map
Highest-risk sectors:
๐ฐ Financial Services โ Targets of hacktivism and extortion-driven outages.
โก Energy โ At risk from politically or state-backed disruptions.
๐๏ธ Government โ Frequent hacktivist targets, especially around elections.
๐ Telecom โ Increasingly hit by ransom-based attacks.
๐ฎ Gaming & Gambling โ Vulnerable to extortion and competitive disruption.
๐ป SaaS & Software โ Susceptible to DDoS that erodes customer trust.
While DDoS attacks can hit any organization, some industries face far higher riskโand potentially greater impact when they do.
The latest DDoS Resiliency Score (DRS) report ranks the industries most frequently targeted and explains why.
Here's the list of the highest risk sectors. For the full list of industries, see here - https://thn.news/ddos-risk-map
Highest-risk sectors:
๐ฐ Financial Services โ Targets of hacktivism and extortion-driven outages.
โก Energy โ At risk from politically or state-backed disruptions.
๐๏ธ Government โ Frequent hacktivist targets, especially around elections.
๐ Telecom โ Increasingly hit by ransom-based attacks.
๐ฎ Gaming & Gambling โ Vulnerable to extortion and competitive disruption.
๐ป SaaS & Software โ Susceptible to DDoS that erodes customer trust.
๐ฅ11โก4
๐จ Developers, check your NuGet packages.
A fake NuGet package โNetherะตum.Allโ โ spelled with a Cyrillic โeโ โ was stealing wallet keys from Ethereum .NET projects.
It even faked 11.7M downloads to look real.
Full story โ https://thehackernews.com/2025/10/fake-nethereum-nuget-package-used.html
A fake NuGet package โNetherะตum.Allโ โ spelled with a Cyrillic โeโ โ was stealing wallet keys from Ethereum .NET projects.
It even faked 11.7M downloads to look real.
Full story โ https://thehackernews.com/2025/10/fake-nethereum-nuget-package-used.html
๐คฏ9โก2๐ฅ2๐1
๐ด A fake โZoom meetingโ from Ukraineโs Presidentโs Office just hacked aid workers. The CAPTCHA wasnโt real โ it opened a live remote shell through WebSocket.
A one-day domain. Six months of setup. Russian servers behind it.
The trojanโs still active โ https://thehackernews.com/2025/10/ukraine-aid-groups-targeted-through.html
A one-day domain. Six months of setup. Russian servers behind it.
The trojanโs still active โ https://thehackernews.com/2025/10/ukraine-aid-groups-targeted-through.html
๐คฏ19๐7๐ฅ6