FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

Apple Drops iCloud's Advanced Data Protection in the U.K. Amid Encryption Backdoor Demands

By: Ravie Lakshmanan β€” February 21st 2025 at 16:15
Apple is removing its Advanced Data Protection (ADP) feature for iCloud from the United Kingdom with immediate effect following government demands for backdoor access to encrypted user data. The development was first reported by Bloomberg. ADP for iCloud is an optional setting that ensures that users' trusted devices retain sole access to the encryption keys used to unlock data stored in its
☐ β˜† βœ‡ The Hacker News

Data Leak Exposes TopSec's Role in China’s Censorship-as-a-Service Operations

By: Ravie Lakshmanan β€” February 21st 2025 at 16:06
An analysis of a data leak from a Chinese cybersecurity company TopSec has revealed that it likely offers censorship-as-a-service solutions to prospective customers, including a state-owned enterprise in the country. Founded in 1995, TopSec ostensibly offers services such as Endpoint Detection and Response (EDR) and vulnerability scanning. But it's also providing "boutique" solutions in order
☐ β˜† βœ‡ The Hacker News

Cybercriminals Can Now Clone Any Brand’s Site in Minutes Using Darcula PhaaS v3

By: Ravie Lakshmanan β€” February 21st 2025 at 13:03
The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform appear to be readying a new version that allows prospective customers and cyber crooks to clone any brand's legitimate website and create a phishing version, further bringing down the technical expertise required to pull off phishing attacks at scale. The latest iteration of the phishing suite "represents a significant
☐ β˜† βœ‡ The Hacker News

Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks

By: Ravie Lakshmanan β€” February 21st 2025 at 07:38
Cisco has confirmed that a Chinese threat actor known as Salt Typhoon gained access by likely abusing a known security flaw tracked as CVE-2018-0171, and by obtaining legitimate victim login credentials as part of a targeted campaign aimed at major U.S. telecommunications companies. "The threat actor then demonstrated their ability to persist in target environments across equipment from multiple
☐ β˜† βœ‡ The Hacker News

CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks

By: Ravie Lakshmanan β€” February 21st 2025 at 07:26
A high-severity security flaw impacting the Craft content management system (CMS) has been added by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2025-23209 (CVSS score: 8.1), which impacts Craft CMS versions 4 and 5. It was addressed by the
☐ β˜† βœ‡ The Hacker News

North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware

By: Ravie Lakshmanan β€” February 20th 2025 at 13:37
Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and InvisibleFerret. The activity, linked to North Korea, has been codenamed DeceptiveDevelopment, which overlaps with clusters tracked under the names Contagious Interview (aka CL-STA-0240), DEV#POPPER, Famous Chollima,
☐ β˜† βœ‡ The Hacker News

China-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware

By: Ravie Lakshmanan β€” February 20th 2025 at 11:21
A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare sector, to deploy PlugX and its successor, ShadowPad, with the intrusions ultimately leading to deployment of a ransomware called NailaoLocker in some cases. The campaign, codenamed Green Nailao by Orange Cyberdefense CERT, involved the exploitation of a now-patched security flaw
☐ β˜† βœ‡ The Hacker News

Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives

By: Ravie Lakshmanan β€” February 20th 2025 at 11:12
A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a legitimate application associated with the Eclipse Foundation. "The legitimate application used in the attack, jarsigner, is a file created during the installation of the IDE package distributed by the Eclipse Foundation," the AhnLab SEcurity Intelligence Center (ASEC)
☐ β˜† βœ‡ The Hacker News

Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability

By: Ravie Lakshmanan β€” February 20th 2025 at 04:36
Citrix has released security updates for a high-severity security flaw impacting NetScaler Console (formerly NetScaler ADM) and NetScaler Agent that could lead to privilege escalation under certain conditions. The vulnerability, tracked as CVE-2024-12284, has been given a CVSS v4 score of 8.8 out of a maximum of 10.0. It has been described as a case of improper privilege management that could
☐ β˜† βœ‡ The Hacker News

Microsoft Patches Actively Exploited Power Pages Privilege Escalation Vulnerability

By: Ravie Lakshmanan β€” February 20th 2025 at 04:29
Microsoft has released security updates to address two Critical-rated flaws impacting Bing and Power Pages, including one that has come under active exploitation in the wild. The vulnerabilities are listed below - CVE-2025-21355 (CVSS score: 8.6) - Microsoft Bing Remote Code Execution Vulnerability CVE-2025-24989 (CVSS score: 8.2) - Microsoft Power Pages Elevation of Privilege Vulnerability "
☐ β˜† βœ‡ The Hacker News

Hackers Exploit Signal's Linked Devices Feature to Hijack Accounts via Malicious QR Codes

By: Ravie Lakshmanan β€” February 19th 2025 at 16:59
Multiple Russia-aligned threat actors have been observed targeting individuals of interest via the privacy-focused messaging app Signal to gain unauthorized access to their accounts. "The most novel and widely used technique underpinning Russian-aligned attempts to compromise Signal accounts is the abuse of the app's legitimate 'linked devices' feature that enables Signal to be used on multiple
☐ β˜† βœ‡ The Hacker News

CISA Adds Palo Alto Networks and SonicWall Flaws to Exploited Vulnerabilities List

By: Ravie Lakshmanan β€” February 19th 2025 at 04:48
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added two security flaws impacting Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The flaws are listed below - CVE-2025-0108 (CVSS score: 7.8) - An authentication bypass vulnerability in the Palo Alto Networks PAN-OS
☐ β˜† βœ‡ The Hacker News

New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks β€” Patch Now

By: Ravie Lakshmanan β€” February 18th 2025 at 15:34
Two security vulnerabilities have been discovered in the OpenSSH secure networking utility suite that, if successfully exploited, could result in an active machine-in-the-middle (MitM) and a denial-of-service (DoS) attack, respectively, under certain conditions. The vulnerabilities, detailed by the Qualys Threat Research Unit (TRU), are listed below - CVE-2025-26465 (CVSS score: 6.8)Β - The
☐ β˜† βœ‡ The Hacker News

Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks

By: Ravie Lakshmanan β€” February 18th 2025 at 15:09
The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing a novel technique to evade detection and maintain control over infected systems. This involves the use of a legitimate Microsoft Windows utility called Microsoft Application Virtualization Injector (MAVInject.exe) to inject the threat actor's malicious payload into an external process, waitfor.exe,
☐ β˜† βœ‡ The Hacker News

New FrigidStealer Malware Targets macOS Users via Fake Browser Updates

By: Ravie Lakshmanan β€” February 18th 2025 at 13:00
Cybersecurity researchers are alerting to a new campaign that leverages web injects to deliver a new Apple macOS malware known as FrigidStealer. The activity has been attributed to a previously undocumented threat actor known as TA2727, with the information stealers for other platforms such as Windows (Lumma Stealer or DeerStealer) and Android (Marcher). TA2727 is a "threat actor that uses fake
☐ β˜† βœ‡ The Hacker News

Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication

By: Ravie Lakshmanan β€” February 18th 2025 at 12:18
Juniper Networks has released security updates to address a critical security flaw impacting Session Smart Router, Session Smart Conductor, and WAN Assurance Router products that could be exploited to hijack control of susceptible devices. Tracked as CVE-2025-21589, the vulnerability carries a CVSS v3.1 score of 9.8 and a CVS v4 score of 9.3. "An Authentication Bypass Using an Alternate Path or
☐ β˜† βœ‡ The Hacker News

Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign

By: Ravie Lakshmanan β€” February 18th 2025 at 09:52
The China-linked threat actor known as Winnti has been attributed to a new campaign dubbed RevivalStone that targeted Japanese companies in the manufacturing, materials, and energy sectors in March 2024. The activity, detailed by Japanese cybersecurity company LAC, overlaps with a threat cluster tracked by Trend Micro as Earth Freybug, which has been assessed to be a subset within the APT41
☐ β˜† βœ‡ The Hacker News

New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials

By: Ravie Lakshmanan β€” February 18th 2025 at 07:04
Security vulnerabilities have been disclosed in Xerox VersaLink C7025 Multifunction printers (MFPs) that could allow attackers to capture authentication credentials via pass-back attacks via Lightweight Directory Access Protocol (LDAP) and SMB/FTP services. "This pass-back style attack leverages a vulnerability that allows a malicious actor to alter the MFP's configuration and cause the MFP
☐ β˜† βœ‡ The Hacker News

Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers

By: Ravie Lakshmanan β€” February 18th 2025 at 05:26
Cybersecurity researchers have flagged a credit card stealing malware campaign that has been observed targeting e-commerce sites running Magento by disguising the malicious content within image tags in HTML code in order to stay under the radar. MageCart is the name given to a malware that's capable of stealing sensitive payment information from online shopping sites. The attacks are known to
☐ β˜† βœ‡ The Hacker News

Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics

By: Ravie Lakshmanan β€” February 17th 2025 at 16:30
Microsoft said it has discovered a new variant of a known Apple macOS malware called XCSSET as part of limited attacks in the wild. "Its first known variant since 2022, this latest XCSSET malware features enhanced obfuscation methods, updated persistence mechanisms, and new infection strategies," the Microsoft Threat Intelligence team said in a post shared on X. "These enhanced features add to
☐ β˜† βœ‡ The Hacker News

South Korea Suspends DeepSeek AI Downloads Over Privacy Violations

By: Ravie Lakshmanan β€” February 17th 2025 at 11:36
South Korea has formally suspended new downloads of Chinese artificial intelligence (AI) chatbot DeepSeek in the country until the service makes changes to its mobile apps to comply with data protection regulations. Downloads have been paused as of February 15, 2025, 6:00 p.m. local time, the Personal Information Protection Commission (PIPC) said in a statement. The web service remains
☐ β˜† βœ‡ The Hacker News

⚑ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More

By: Ravie Lakshmanan β€” February 17th 2025 at 09:19
Welcome to this week’s Cybersecurity News Recap. Discover how cyber attackers are using clever tricks like fake codes and sneaky emails to gain access to sensitive data. We cover everything from device code phishing to cloud exploits, breaking down the technical details into simple, easy-to-follow insights. ⚑ Threat of the Week Russian Threat Actors Leverage Device Code Phishing to Hack
☐ β˜† βœ‡ The Hacker News

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations

By: Ravie Lakshmanan β€” February 17th 2025 at 09:04
Cybersecurity researchers have shed light on a new Golang-based backdoor that uses Telegram as a mechanism for command-and-control (C2) communications. Netskope Threat Labs, which detailed the functions of the malware, described it as possibly of Russian origin. "The malware is compiled in Golang and once executed it acts like a backdoor," security researcher Leandro FrΓ³es said in an analysis
☐ β˜† βœ‡ The Hacker News

Android's New Feature Blocks Fraudsters from Sideloading Apps During Calls

By: Ravie Lakshmanan β€” February 15th 2025 at 10:26
Google is working on a new security feature for Android that blocks device owners from changing sensitive settings when a phone call is in progress. Specifically, the in-call anti-scammer protections include preventing users from turning on settings to install apps from unknown sources and granting accessibility access. The development was first reported by Android Authority. Users who attempt
☐ β˜† βœ‡ The Hacker News

New β€œwhoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

By: Ravie Lakshmanan β€” February 14th 2025 at 18:42
Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that allows anyone who publishes an Amazon Machine Image (AMI) with a specific name to gain code execution within the Amazon Web Services (AWS) account. "If executed at scale, this attack could be used to gain access to thousands of accounts," Datadog Security Labs researcher Seth Art said in a report
☐ β˜† βœ‡ The Hacker News

Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks

By: Ravie Lakshmanan β€” February 14th 2025 at 18:28
The North Korean threat actor known as the Lazarus Group has been linked to a previously undocumented JavaScript implant named Marstech1 as part of limited targeted attacks against developers. The active operation has been dubbed Marstech Mayhem by SecurityScorecard, with the malware delivered by means of an open-source repository hosted on GitHub that's associated with a profile named "
☐ β˜† βœ‡ The Hacker News

Microsoft: Russian-Linked Hackers Using 'Device Code Phishing' to Hijack Accounts

By: Ravie Lakshmanan β€” February 14th 2025 at 10:27
Microsoft is calling attention to an emerging threat cluster it calls Storm-2372 that has been attributed to a new set of cyber attacks aimed at a variety of sectors since August 2024. The attacks have targeted government, non-governmental organizations (NGOs), information technology (IT) services and technology, defense, telecommunications, health, higher education, and energy/oil and gas
☐ β˜† βœ‡ The Hacker News

RansomHub Becomes 2024’s Top Ransomware Group, Hitting 600+ Organizations Globally

By: Ravie Lakshmanan β€” February 14th 2025 at 10:17
The threat actors behind the RansomHub ransomware-as-a-service (RaaS) scheme have been observed leveraging now-patched security flaws in Microsoft Active Directory and the Netlogon protocol to escalate privileges and gain unauthorized access to a victim network's domain controller as part of their post-compromise strategy. "RansomHub has targeted over 600 organizations globally, spanning sectors
☐ β˜† βœ‡ The Hacker News

PostgreSQL Vulnerability Exploited Alongside BeyondTrust Zero-Day in Targeted Attacks

By: Ravie Lakshmanan β€” February 14th 2025 at 05:03
Threat actors who were behind the exploitation of a zero-day vulnerability in BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) products in December 2024 likely also exploited a previously unknown SQL injection flaw in PostgreSQL, according to findings from Rapid7. The vulnerability, tracked as CVE-2025-1094 (CVSS score: 8.1), affects the PostgreSQL interactive tool psql. "An
☐ β˜† βœ‡ The Hacker News

Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass Security Scanners

By: Ravie Lakshmanan β€” February 13th 2025 at 15:13
A widespread phishing campaign has been observed leveraging bogus PDF documents hosted on the Webflow content delivery network (CDN) with an aim to steal credit card information and commit financial fraud. "The attacker targets victims searching for documents on search engines, resulting in access to malicious PDF that contains a CAPTCHA image embedded with a phishing link, leading them to
☐ β˜† βœ‡ The Hacker News

North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks

By: Ravie Lakshmanan β€” February 13th 2025 at 14:26
A nation-state threat actor with ties to North Korea has been linked to an ongoing campaign targeting South Korean business, government, and cryptocurrency sectors. The attack campaign, dubbed DEEP#DRIVE by Securonix, has been attributed to a hacking group known as Kimsuky, which is also tracked under the names APT43, Black Banshee, Emerald Sleet, Sparkling Pisces, Springtail, TA427, and Velvet
☐ β˜† βœ‡ The Hacker News

RA World Ransomware Attack in South Asia Links to Chinese Espionage Toolset

By: Ravie Lakshmanan β€” February 13th 2025 at 11:58
An RA World ransomware attack in November 2024 targeting an unnamed Asian software and services company involved the use of a malicious tool exclusively used by China-based cyber espionage groups, raising the possibility that the threat actor may be moonlighting as a ransomware player in an individual capacity. "During the attack in late 2024, the attacker deployed a distinct toolset that had
☐ β˜† βœ‡ The Hacker News

Palo Alto Networks Patches Authentication Bypass Exploit in PAN-OS Software

By: Ravie Lakshmanan β€” February 13th 2025 at 09:39
Palo Alto Networks has addressed a high-severity security flaw in its PAN-OS software that could result in an authentication bypass. The vulnerability, tracked as CVE-2025-0108, carries a CVSS score of 7.8 out of 10.0. The score, however, drops to 5.1 if access to the management interface is restricted to a jump box. "An authentication bypass in the Palo Alto Networks PAN-OS software enables an
☐ β˜† βœ‡ The Hacker News

FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux

By: Ravie Lakshmanan β€” February 13th 2025 at 09:11
Threat hunters have shed light on a new campaign targeting the foreign ministry of an unnamed South American nation with bespoke malware capable of granting remote access to infected hosts. The activity, detected in November 2024, has been attributed by Elastic Security Labs to a threat cluster it tracks as REF7707. Some of the other targets include a telecommunications entity and a university,
☐ β˜† βœ‡ The Hacker News

Microsoft Uncovers Sandworm Subgroup's Global Cyber Attacks Spanning 15+ Countries

By: Ravie Lakshmanan β€” February 12th 2025 at 17:02
A subgroup within the infamous Russian state-sponsored hacking group known as Sandworm has been attributed to a multi-year initial access operation dubbed BadPilot that stretched across the globe. "This subgroup has conducted globally diverse compromises of Internet-facing infrastructure to enable Seashell Blizzard to persist on high-value targets and support tailored network operations," the
☐ β˜† βœ‡ The Hacker News

Researchers Find New Exploit Bypassing Patched NVIDIA Container Toolkit Vulnerability

By: Ravie Lakshmanan β€” February 12th 2025 at 14:04
Cybersecurity researchers have discovered a bypass for a now-patched security vulnerability in the NVIDIA Container Toolkit that could be exploited to break out of a container's isolation protections and gain complete access to the underlying host. The new vulnerability is being tracked as CVE-2025-23359 (CVSS score: 8.3). It affects the following versions - NVIDIA Container Toolkit (All
☐ β˜† βœ‡ The Hacker News

North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack

By: Ravie Lakshmanan β€” February 12th 2025 at 10:43
The North Korea-linked threat actor known as Kimsuky has been observed using a new tactic that involves deceiving targets into running PowerShell as an administrator and then instructing them to paste and run malicious code provided by them. "To execute this tactic, the threat actor masquerades as a South Korean government official and over time builds rapport with a target before sending a
☐ β˜† βœ‡ The Hacker News

Microsoft’s Patch Tuesday Fixes 63 Flaws, Including Two Under Active Exploitation

By: Ravie Lakshmanan β€” February 12th 2025 at 09:38
Microsoft on Tuesday released fixes for 63 security flaws impacting its software products, including two vulnerabilities that it said has come under active exploitation in the wild. Of the 63 vulnerabilities, three are rated Critical, 57 are rated Important, one is rated Moderate, and two are rated Low in severity. This is aside from the 23 flaws Microsoft addressed in its Chromium-based Edge
☐ β˜† βœ‡ The Hacker News

Ivanti Patches Critical Flaws in Connect Secure and Policy Secure – Update Now

By: Ravie Lakshmanan β€” February 12th 2025 at 05:57
Ivanti has released security updates to address multiple security flaws impacting Connect Secure (ICS), Policy Secure (IPS), and Cloud Services Application (CSA) that could be exploited to achieve arbitrary code execution. The list of vulnerabilities is below - CVE-2024-38657 (CVSS score: 9.1) - External control of a file name in Ivanti Connect Secure before version 22.7R2.4 and Ivanti Policy
☐ β˜† βœ‡ The Hacker News

Google Confirms Android SafetyCore Enables AI-Powered On-Device Content Classification

By: Ravie Lakshmanan β€” February 11th 2025 at 15:13
Google has stepped in to clarify that a newly introduced Android System SafetyCore app does not perform any client-side scanning of content. "Android provides many on-device protections that safeguard users against threats like malware, messaging spam and abuse protections, and phone scam protections, while preserving user privacy and keeping users in control of their data," a spokesperson for
☐ β˜† βœ‡ The Hacker News

Progress Software Patches High-Severity LoadMaster Flaws Affecting Multiple Versions

By: Ravie Lakshmanan β€” February 11th 2025 at 11:52
Progress Software has addressed multiple high-severity security flaws in its LoadMaster software that could be exploited by malicious actors to execute arbitrary system commands or download any file from the system. Kemp LoadMaster is a high-performance application delivery controller (ADC) and load balancer that provides availability, scalability, performance, and security for business-critical
☐ β˜† βœ‡ The Hacker News

Threat Actors Exploit ClickFix to Deploy NetSupport RAT in Latest Cyber Attacks

By: Ravie Lakshmanan β€” February 11th 2025 at 09:55
Threat actors have observed the increasingly common ClickFix technique to deliver a remote access trojan named NetSupport RAT since early January 2025. NetSupport RAT, typically propagated via bogus websites and fake browser updates, grants attackers full control over the victim's host, allowing them to monitor the device's screen in real-time, control the keyboard and mouse, upload and download
☐ β˜† βœ‡ The Hacker News

FBI, Europol, and NCA Take Down 8Base Ransomware Data Leak and Negotiation Sites

By: Ravie Lakshmanan β€” February 11th 2025 at 07:03
Source: The Nation A coordinated law enforcement operation has taken down the dark web data leak and negotiation sites associated with the 8Base ransomware gang. Visitors to the data leak site are now greeted with a seizure banner that says: "This hidden site and the criminal content have been seized by the Bavarian State Criminal Police Office on behalf of the Office of the Public Prosecutor
☐ β˜† βœ‡ The Hacker News

Apple Patches Actively Exploited iOS Zero-Day CVE-2025-24200 in Emergency Update

By: Ravie Lakshmanan β€” February 11th 2025 at 11:16
Apple on Monday released out-of-band security updates to address a security flaw in iOS and iPadOS that it said has been exploited in the wild. Assigned the CVE identifier CVE-2025-24200 (CVSS score: 4.6), the vulnerabilityΒ has been described as an authorization issue that could make it possible for a malicious actor to disable USB Restricted Mode on a locked device as part of a cyber
☐ β˜† βœ‡ The Hacker News

Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores

By: Ravie Lakshmanan β€” February 10th 2025 at 15:16
Threat actors have been observed leveraging Google Tag Manager (GTM) to deliver credit card skimmer malware targeting Magento-based e-commerce websites. Website security company Sucuri said the code, while appearing to be a typical GTM and Google Analytics script used for website analytics and advertising purposes, contains an obfuscated backdoor capable of providing attackers with persistent
☐ β˜† βœ‡ The Hacker News

⚑ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [10 February]

By: Ravie Lakshmanan β€” February 10th 2025 at 12:13
In cybersecurity, the smallest crack can lead to the biggest breaches. A leaked encryption key, an unpatched software bug, or an abandoned cloud storage bucketβ€”each one seems minor until it becomes the entry point for an attack. This week, we’ve seen cybercriminals turn overlooked weaknesses into major security threats, proving once again that no system is too small to be targeted. The question
☐ β˜† βœ‡ The Hacker News

DragonRank Exploits IIS Servers with BadIIS Malware for SEO Fraud and Gambling Redirects

By: Ravie Lakshmanan β€” February 10th 2025 at 09:44
Threat actors have been observed targeting Internet Information Services (IIS) servers in Asia as part of a search engine optimization (SEO) manipulation campaign designed to install BadIIS malware. "It is likely that the campaign is financially motivated since redirecting users to illegal gambling websites shows that attackers deploy BadIIS for profit," Trend Micro researchers Ted Lee and
☐ β˜† βœ‡ The Hacker News

Zimbra Releases Security Updates for SQL Injection, Stored XSS, and SSRF Vulnerabilities

By: Ravie Lakshmanan β€” February 10th 2025 at 09:09
Zimbra has released software updates to address critical security flaws in its Collaboration software that, if successfully exploited, could result in information disclosure under certain conditions. The vulnerability, tracked as CVE-2025-25064, carries a CVSS score of 9.8 out of a maximum of 10.0. It has been described as an SQL injection bug in the ZimbraSync Service SOAP endpoint affecting
☐ β˜† βœ‡ The Hacker News

XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells

By: Ravie Lakshmanan β€” February 10th 2025 at 05:14
Threat actors have been observed exploiting multiple security flaws in various software products, including Progress Telerik UI for ASP.NET AJAX and Advantive VeraCore, to drop reverse shells and web shells, and maintain persistent remote access to compromised systems. The zero-day exploitation of security flaws in VeraCore has been attributed to a threat actor known as XE Group, a cybercrime
☐ β˜† βœ‡ The Hacker News

Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection

By: Ravie Lakshmanan β€” February 8th 2025 at 06:17
Cybersecurity researchers have uncovered two malicious machine learning (ML) models on Hugging Face that leveraged an unusual technique of "broken" pickle files to evade detection. "The pickle files extracted from the mentioned PyTorch archives revealed the malicious Python content at the beginning of the file," ReversingLabs researcher Karlo Zanki said in a report shared with The Hacker News. "
☐ β˜† βœ‡ The Hacker News

DeepSeek App Transmits Sensitive User and Device Data Without Encryption

By: Ravie Lakshmanan β€” February 7th 2025 at 14:58
A new audit of DeepSeek's mobile app for the Apple iOS operating system has found glaring security issues, the foremost being that it sends sensitive data over the internet sans any encryption, exposing it to interception and manipulation attacks. The assessment comes from NowSecure, which also found that the app fails to adhere to best security practices and that it collects extensive user and
☐ β˜† βœ‡ The Hacker News

Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling Code Injection Attacks

By: Ravie Lakshmanan β€” February 7th 2025 at 11:01
Microsoft is warning of an insecure practice wherein software developers are incorporating publicly disclosed ASP.NET machine keys from publicly accessible resources, thereby putting their applications in attackers' pathway. The tech giant's threat intelligence team said it observed limited activity in December 2024 that involved an unknown threat actor using a publicly available, static ASP.NET
☐ β˜† βœ‡ The Hacker News

India’s RBI Introduces Exclusive "bank.in" Domain to Combat Digital Banking Fraud

By: Ravie Lakshmanan β€” February 7th 2025 at 10:32
India's central bank, the Reserve Bank of India (RBI), said it's introducing an exclusive "bank.in" internet domain for banks in the country to combat digital financial fraud. "This initiative aims to reduce cyber security threats and malicious activities like phishing; and, streamline secure financial services, thereby enhancing trust in digital banking and payment services," the RBI said in a
☐ β˜† βœ‡ The Hacker News

Hackers Exploiting SimpleHelp RMM Flaws for Persistent Access and Ransomware

By: Ravie Lakshmanan β€” February 7th 2025 at 05:19
Threat actors have been observed exploiting recently disclosed security flaws in SimpleHelp's Remote Monitoring and Management (RMM) software as a precursor for what appears to be a ransomware attack. The intrusion leveraged the now-patched vulnerabilities to gain initial access and maintain persistent remote access to an unspecified target network, cybersecurity company Field Effect said in a
☐ β˜† βœ‡ The Hacker News

Fake Google Chrome Sites Distribute ValleyRAT Malware via DLL Hijacking

By: Ravie Lakshmanan β€” February 6th 2025 at 14:34
Bogus websites advertising Google Chrome have been used to distribute malicious installers for a remote access trojan called ValleyRAT. The malware, first detected in 2023, is attributed to a threat actor tracked as Silver Fox, with prior attack campaigns primarily targeting Chinese-speaking regions like Hong Kong, Taiwan, and Mainland China. "This actor has increasingly targeted key roles
☐ β˜† βœ‡ The Hacker News

Ransomware Extortion Drops to $813.5M in 2024, Down from $1.25B in 2023

By: Ravie Lakshmanan β€” February 6th 2025 at 14:03
Ransomware attacks netted cybercrime groups a total of $813.5 million in 2024, a decline from $1.25 billion in 2023. The total amount extorted during the first half of 2024 stood at $459.8 million, blockchain intelligence firm Chainalysis said, adding payment activity slumped after July 2024 by about 3.94%. "The number of ransomware events increased into H2, but on-chain payments declined,
☐ β˜† βœ‡ The Hacker News

SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery Phrases from Images

By: Ravie Lakshmanan β€” February 6th 2025 at 11:32
A new malware campaign dubbed SparkCat has leveraged a suit of bogus apps on both Apple's and Google's respective app stores to steal victims' mnemonic phrases associated with cryptocurrency wallets.Β  The attacks leverage an optical character recognition (OCR) model to exfiltrate select images containing wallet recovery phrases from photo libraries to a command-and-control (C2) server,
☐ β˜† βœ‡ The Hacker News

North Korean APT Kimsuky Uses forceCopy Malware to Steal Browser-Stored Credentials

By: Ravie Lakshmanan β€” February 6th 2025 at 11:05
The North Korea-linked nation-state hacking group known as Kimsuky has been observed conducting spear-phishing attacks to deliver an information stealer malware named forceCopy, according to new findings from the AhnLab Security Intelligence Center (ASEC). The attacks commence with phishing emails containing a Windows shortcut (LNK) file that's disguised as a Microsoft Office or PDF document.
☐ β˜† βœ‡ The Hacker News

Cisco Patches Critical ISE Vulnerabilities Enabling Root CmdExec and PrivEsc

By: Ravie Lakshmanan β€” February 6th 2025 at 07:40
Cisco has released updates to address two critical security flaws Identity Services Engine (ISE) that could allow remote attackers to execute arbitrary commands and elevate privileges on susceptible devices. The vulnerabilities are listed below - CVE-2025-20124 (CVSS score: 9.9) - An insecure Java deserialization vulnerability in an API of Cisco ISE that could permit an authenticated, remote
☐ β˜† βœ‡ The Hacker News

Cross-Platform JavaScript Stealer Targets Crypto Wallets in New Lazarus Group Campaign

By: Ravie Lakshmanan β€” February 5th 2025 at 14:55
The North Korea-linked Lazarus Group has been linked to an active campaign that leverages fake LinkedIn job offers in the cryptocurrency and travel sectors to deliver malware capable of infecting Windows, macOS, and Linux operating systems. According to cybersecurity company Bitdefender, the scam begins with a message sent on a professional social media network, enticing them with the promise of
❌