News
Entertainment
Science & Technology
Sport
Business & Money
Life
Culture & Art
Hobbies
4 | Follower
The Hacker News
19.04.2025
Smishing kits by Wang Duo Yu enabled toll fraud in 8 U.S. states since Oct 2024, stealing user data via fake E-ZPass pages.
Multi-stage phishing attack in Dec 2024 used .JSE, PowerShell, and AutoIt to deliver Agent Tesla.
AI use in SaaS tools bypasses security controls, creating shadow integrations and real breach risks.
18.04.2025
Blockchain reduces breach risks by removing central databases, but energy use and legal gaps remain.
AI-powered threats escalate: 25M fraud via voice cloning + state use of ChatGPT in cyberattacks.
Malicious crypto installers using Node.js since Oct 2024 evade Microsoft Defender via PowerShell and DLLs, enabling stealthy data theft.
CVE-2025-32433 in Erlang SSH scores 10.0 CVSS, enables unauthenticated code execution on telecom and IoT systems.
XorDDoS malware targeted 71.3% of U.S. systems in latest wave; Docker, IoT, and Linux bots fuel rise.
Mustang Panda uses StarProxy, SplatCloak, and updated TONESHELL to breach Myanmar target undetected.
ClickFix malware tactic used by Iran, Russia, and North Korea from Nov 2024–Feb 2025 replaces payload delivery in major phishing campaigns.
Windows flaw CVE-2025-24054 actively exploited since March 19 to leak NTLM hashes via phishing attacks.
17.04.2025
Google blocked 5.1B bad ads and suspended 39.2M advertiser accounts in 2024 using AI to fight scams.
BPFDoor malware’s new controller enables firewall-bypassing shell access + lateral movement in 2024 attacks.
Change Healthcare breach exposed 6TB of patient data via weak MFA, disrupting critical operations.
Apple fixed 2 exploited flaws in iOS 18.4.1, one flagged by Google TAG, urging urgent updates.
Four Windows Task Scheduler flaws allow attackers to bypass UAC, gain SYSTEM access, and erase logs.
CVE-2021-20035 added to CISA KEV list due to active exploitation; agencies must patch by May 7.
AI-based Gamma used in phishing to mimic Microsoft logins, bypass detection, and steal credentials.
80% of SaaS breaches stem from identity misconfigurations—Wing maps threats to stop attacks early.
16.04.2025
Malware-laced SHOWJI phones shipped with fake WhatsApp, stealing $1.6M in crypto via address swaps.
CVE funding ends April 16, risking delays in vulnerability tracking, advisories, and cyber response tools.
UNC5174 uses SNOWLIGHT and VShell to target Linux and macOS systems, exploiting Ivanti flaws for remote control.
North Korea’s Slow Pisces used LinkedIn lures in 2025 to drop RN Stealer malware on crypto developers.
99% of employees use browser extensions + 53% access sensitive data + exposing entire organizations to risk.
Malicious PyPI package rerouted MEXC crypto orders and exposed API keys, downloaded 1,065 times.
Apache Roller flaw CVE-2025-24859 keeps sessions active after password changes, risking persistent access.
15.04.2025
Precision-validating phishing filters verified emails via real-time checks, boosting credential theft success and evading security analysis.
ResolverRAT targets healthcare and pharma via localized phishing; uses advanced stealth tactics to ensure persistence and evade detection.
Meta resumes EU AI training using adult public data after regulatory approval, with opt-out option
This week's critical cybersecurity recap: breaches before patches, AI weaponization, silent persistence.
Hardcoded key flaw in Triofox and CentreStack exploited as zero-day in March, affecting 7 firms.
Attackers use AI to outpace defenders, but SANS' SEC595 course at SANSFIRE 2025 helps teams adapt fast.
14.04.2025
SideCopy hackers adopt MSI staging and launch CurlBack RAT attacks on Indian ministries, oil, and rail sectors.
12.04.2025
SpyNote malware disguised as Chrome installs hidden APKs via fake Play Store pages, stealing sensitive Android data.
Palo Alto detects 23,958-IP brute-force surge on GlobalProtect after March 17, urges MFA to mitigate risks.
Fortinet warns attackers used symlink exploits to retain access post-patch, prompting urgent FortiOS updates and SSL-VPN mitigations.
Paper Werewolf deploys PowerModul in phishing attacks between July and December 2024, expanding espionage with password changes and media file theft.
Initial Access Brokers shift to low-cost, high-volume access sales in 2024, fueling broader, faster cyberattacks.
11.04.2025
AI agents magnify NHI risks by scaling privileged access, Astrix secures identities to prevent breaches.
Gamaredon breached a Western military mission on Feb 26, 2025, using upgraded GammaSteel malware and new obfuscation tactics.