Cybersecurity & InfoSec
/cybersecurity283
Incentivize good Cybersecurity Hygiene - Come help build a Web3 Security DAO! /scam to report scams! Let's make web3 safer.
๐ Hacker Caught Mid-InterviewโLive on Zoom!
North Korean attackers are posing as job applicants using fake resumes, AI tools, and stealth malware to breach companies. Some have slipped through.
OtterCookie v4 reveals just how deep the campaign goesโstealing credentials, crypto wallets, even iCloud Keychain data.
๐ See the full story โ https://thehackernews.com/2025/05/ottercookie-v4-adds-vm-detection-and.html
North Korean attackers are posing as job applicants using fake resumes, AI tools, and stealth malware to breach companies. Some have slipped through.
OtterCookie v4 reveals just how deep the campaign goesโstealing credentials, crypto wallets, even iCloud Keychain data.
๐ See the full story โ https://thehackernews.com/2025/05/ottercookie-v4-adds-vm-detection-and.html
๐จ AI devs, you're the target.
Malicious npm packages disguised as โcheap Cursor AI toolsโ are stealing credentials, rewriting code, and disabling updates โ on macOS.
3,200+ installs โ still live.
Find out how it works: https://thehackernews.com/2025/05/malicious-npm-packages-infect-3200.html
Malicious npm packages disguised as โcheap Cursor AI toolsโ are stealing credentials, rewriting code, and disabling updates โ on macOS.
3,200+ installs โ still live.
Find out how it works: https://thehackernews.com/2025/05/malicious-npm-packages-infect-3200.html
Google identifies new malware linked to Russia-based hacking group
Source: Reuters
https://search.app/C7kj9
Source: Reuters
https://search.app/C7kj9
โ ๏ธ"Iโm not a robot" just became dangerous.
A Russia-linked group is using fake CAPTCHAs and PowerShell tricks to quietly deploy a new espionage toolโLOSTKEYS.
Targets? The usual... and some surprising ones.
Read full story โ https://thehackernews.com/2025/05/russian-hackers-using-clickfix-fake.html
A Russia-linked group is using fake CAPTCHAs and PowerShell tricks to quietly deploy a new espionage toolโLOSTKEYS.
Targets? The usual... and some surprising ones.
Read full story โ https://thehackernews.com/2025/05/russian-hackers-using-clickfix-fake.html
๐ช Europol just dismantled 6 major DDoS-for-hire services used to launch thousands of global attacksโfor as little as โฌ10 a hit.
๐น 4 arrested in Poland
๐น 9 domains seized by the U.S.
๐น Operation PowerOFF strikes again.
These slick platforms let anyone pay to flood schools, gov sites & gaming servers offline, no tech skills needed.
๐ Read โ https://thehackernews.com/2025/05/europol-shuts-down-six-ddos-for-hire.html
๐น 4 arrested in Poland
๐น 9 domains seized by the U.S.
๐น Operation PowerOFF strikes again.
These slick platforms let anyone pay to flood schools, gov sites & gaming servers offline, no tech skills needed.
๐ Read โ https://thehackernews.com/2025/05/europol-shuts-down-six-ddos-for-hire.html
๐จ 100K+ WordPress sites at risk!
A critical OttoKit flaw (CVSS 9.8) is under active attackโno login needed.
Two bugs. One exploit chain. Admin access in minutes.
Full story, attack IPs, and fix โ https://thehackernews.com/2025/05/ottokit-wordpress-plugin-with-100k.html
A critical OttoKit flaw (CVSS 9.8) is under active attackโno login needed.
Two bugs. One exploit chain. Admin access in minutes.
Full story, attack IPs, and fix โ https://thehackernews.com/2025/05/ottokit-wordpress-plugin-with-100k.html
๐จ Exploited in the wild. No user click needed.
Google patches 46 Android flaws, including CVE-2025-27363โa critical System bug tied to the FreeType font engine.
Discovered by Meta in March, it's now confirmed active.
๐ Learn more: https://thehackernews.com/2025/05/google-fixes-actively-exploited-android.html
Google patches 46 Android flaws, including CVE-2025-27363โa critical System bug tied to the FreeType font engine.
Discovered by Meta in March, it's now confirmed active.
๐ Learn more: https://thehackernews.com/2025/05/google-fixes-actively-exploited-android.html
๐จ New malware drop from Golden Chickens: TerraStealerV2 steals browser logins, crypto wallets, and extensions, while TerraLogger silently records keystrokes.
๐ฆ Spread via EXE, MSI, LNK, OCX
๐ค Sends data to Telegram + shady domain
๐ Read this report: https://thehackernews.com/2025/05/golden-chickens-deploy-terrastealerv2.html
๐ฆ Spread via EXE, MSI, LNK, OCX
๐ค Sends data to Telegram + shady domain
๐ Read this report: https://thehackernews.com/2025/05/golden-chickens-deploy-terrastealerv2.html
๐ฅ Two years inside. Nation-state footprints. Critical infrastructure targeted.
Fortinet links Iranian APT Lemon Sandstorm to a stealthy attack on a Middle East CNI (May '23โFeb '25).
Used VPN exploits, chained proxies, 7 custom backdoors across 4 phases.
Read this story โก๏ธ https://thehackernews.com/2025/05/iranian-hackers-maintain-2-year-access.html
Fortinet links Iranian APT Lemon Sandstorm to a stealthy attack on a Middle East CNI (May '23โFeb '25).
Used VPN exploits, chained proxies, 7 custom backdoors across 4 phases.
Read this story โก๏ธ https://thehackernews.com/2025/05/iranian-hackers-maintain-2-year-access.html
๐จ U.S. charges Yemeni national with deploying Black Kingdom ransomware on 1,500+ systemsโfrom hospitals to schoolsโvia Microsoft ProxyLogon.
๐ฅ Targets paid in Bitcoin.
๐ Read more: https://thehackernews.com/2025/05/us-charges-yemeni-hacker-behind-black.html
๐ฅ Targets paid in Bitcoin.
๐ Read more: https://thehackernews.com/2025/05/us-charges-yemeni-hacker-behind-black.html
Pro-Russian hacker group targets over 50 Dutch websites in coordinated attack
Source: NL Times
https://search.app/3kDyA
Source: NL Times
https://search.app/3kDyA
๐จ TikTok Fined โฌ530M for secretly storing EU user data in China, violating GDPR rules.
๐ช๐บ Irelandโs DPC says TikTok misled regulators, failed to ensure EU-level privacy, and ignored Chinaโs surveillance risks.
They now have 6 months to stop transfers.
๐ Read more: https://thehackernews.com/2025/05/tiktok-slammed-with-530-million-gdpr.html
๐ Second major GDPR fine after a โฌ345M penalty in 2023.
๐ช๐บ Irelandโs DPC says TikTok misled regulators, failed to ensure EU-level privacy, and ignored Chinaโs surveillance risks.
They now have 6 months to stop transfers.
๐ Read more: https://thehackernews.com/2025/05/tiktok-slammed-with-530-million-gdpr.html
๐ Second major GDPR fine after a โฌ345M penalty in 2023.
Malicious PyPI packages abuse Gmail, websockets to hijack systems
Source: BleepingComputer
https://search.app/krGLU
Source: BleepingComputer
https://search.app/krGLU
Chinese Hacking Competitions Fuel the Countryโs Broad Cyber Ambitions
Source: https://search.app/wu6fY
Source: https://search.app/wu6fY
๐จ New Espionage Alert!
A Russian-speaking APT group, Nebulous Mantis, is deploying the stealthy RomCom RAT to target NATO-linked entities, gov agencies, and critical infra โ using bulletproof hosting, IPFS, and over 40 remote commands.
๐ See how it works, whoโs behind it, and why it matters now: https://thehackernews.com/2025/04/nebulous-mantis-targets-nato-linked.html
A Russian-speaking APT group, Nebulous Mantis, is deploying the stealthy RomCom RAT to target NATO-linked entities, gov agencies, and critical infra โ using bulletproof hosting, IPFS, and over 40 remote commands.
๐ See how it works, whoโs behind it, and why it matters now: https://thehackernews.com/2025/04/nebulous-mantis-targets-nato-linked.html
France accuses Russian intelligence of repeated cyber attacks since 2021
Source: Reuters
https://search.app/aTifL
Source: Reuters
https://search.app/aTifL
Apple 'AirBorne' flaws can lead to zero-click AirPlay RCE attacks
Source: BleepingComputer
https://search.app/9ioHB
Source: BleepingComputer
https://search.app/9ioHB
Be Kim Yong UN's IT mule, earn $970,000
https://fortune.com/article/nail-salon-employee-pleads-guilty-remote-work-it-north-korea-china-kim-jong-un/
https://fortune.com/article/nail-salon-employee-pleads-guilty-remote-work-it-north-korea-china-kim-jong-un/
Google: 97 zero-days exploited in 2024, over 50% in spyware attacks
Source: BleepingComputer
https://search.app/nFpX4
Source: BleepingComputer
https://search.app/nFpX4
Samsung admits to security wormhole in some Galaxy devices
Source: The Register
https://search.app/Dphmq
Source: The Register
https://search.app/Dphmq
DragonForce expands ransomware model with white-label branding scheme
Source: BleepingComputer
https://search.app/PfMdU
Source: BleepingComputer
https://search.app/PfMdU
Baltimore City Public Schools data breach affects over 31,000 people
Source: BleepingComputer
https://search.app/d9sXC
Source: BleepingComputer
https://search.app/d9sXC
Craft CMS RCE exploit chain used in zero-day attacks to steal data
Source: BleepingComputer
https://search.app/1HZaT
Source: BleepingComputer
https://search.app/1HZaT
ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion
Source: The Hacker News
https://search.app/pvLmg
Source: The Hacker News
https://search.app/pvLmg
Lazarus hackers breach six companies in watering hole attacks
Source: BleepingComputer
https://search.app/NMg8D
Source: BleepingComputer
https://search.app/NMg8D
๐ฅ Fake jobs, real danger.
North Korean hackers are posing as crypto firms to lure devs into malware traps.
๐น3 fronts: BlockNovas, Angeloper, SoftGlide
๐น3 Malware: BeaverTail, InvisibleFerret, OtterCookie ๐น3 Target: Your wallet, data & trust.
Read: https://thehackernews.com/2025/04/north-korean-hackers-spread-malware-via.html
North Korean hackers are posing as crypto firms to lure devs into malware traps.
๐น3 fronts: BlockNovas, Angeloper, SoftGlide
๐น3 Malware: BeaverTail, InvisibleFerret, OtterCookie ๐น3 Target: Your wallet, data & trust.
Read: https://thehackernews.com/2025/04/north-korean-hackers-spread-malware-via.html
๐ New Linux Rootkit Exploits io_uring, Evades Detection
ARMOโs Curing rootkit uses io_uring to bypass system call monitoringโFalco, Tetragon, and even Microsoft Defender canโt see it.
Attackers can run commands without triggering system calls.
Read โ https://thehackernews.com/2025/04/linux-iouring-poc-rootkit-bypasses.html
ARMOโs Curing rootkit uses io_uring to bypass system call monitoringโFalco, Tetragon, and even Microsoft Defender canโt see it.
Attackers can run commands without triggering system calls.
Read โ https://thehackernews.com/2025/04/linux-iouring-poc-rootkit-bypasses.html
๐ WhatsApp rolls out Advanced Chat Privacy!
๐ธ Blocks chat exports, auto-downloads, & AI use in sensitive convos.
๐ธ Still allows screenshots & manual media saves.
๐ธ Available now for all users on the latest update.
Update to try it ๐ https://thehackernews.com/2025/04/whatsapp-adds-advanced-chat-privacy-to.html
๐ธ Blocks chat exports, auto-downloads, & AI use in sensitive convos.
๐ธ Still allows screenshots & manual media saves.
๐ธ Available now for all users on the latest update.
Update to try it ๐ https://thehackernews.com/2025/04/whatsapp-adds-advanced-chat-privacy-to.html
โ ๏ธ Target: Russian Military!
Android.Spy.1292.origin spyware steals data via fake Alpine Quest apps.
โ Spread via fake Telegram & Rus. app stores
โ Steals loc., contacts, files
โ Sends data to Telegram bot, runs hidden malware
Doctor Web says it mimics Alpine Quest Pro, widely used in military zones.
Read: https://thehackernews.com/2025/04/android-spyware-disguised-as-alpine.html
๐ Kaspersky found a Windows backdoor in fake ViPNet updates targeting Russian government, finance, and industry.
Android.Spy.1292.origin spyware steals data via fake Alpine Quest apps.
โ Spread via fake Telegram & Rus. app stores
โ Steals loc., contacts, files
โ Sends data to Telegram bot, runs hidden malware
Doctor Web says it mimics Alpine Quest Pro, widely used in military zones.
Read: https://thehackernews.com/2025/04/android-spyware-disguised-as-alpine.html
๐ Kaspersky found a Windows backdoor in fake ViPNet updates targeting Russian government, finance, and industry.
My weekend plan is to dive deeper into networking and get plenty of hands-on practice. I might even work on building a more complex network setup โ Iโm sure the results will be exciting to see.
I woke up feeling really tired, but Iโm determined to push through and get things done today. Iโve got a cybersecurity class in less than 3 hours, so I need to get myself prepped and mentally ready before it starts.
Incase you are wondering what a GUI is
A GUI stands for Graphical User Interface.
Itโs the visual part of a computer that you interact with โ like windows, icons, buttons, and menus โ instead of typing commands.
โธป
Example:
โข GUI: Clicking a folder to open it, dragging files, using apps with buttons and sliders.
โข Command Line (CLI): Typing cd Documents to go into a folder or ls to list files.
โธป
In Linux, some distros like Ubuntu come with a GUI by default, but you can also run it entirely through the terminal (CLI), which is what makes it feel more โhands-onโ and fun โ especially for tech-savvy folks like you.๐
A GUI stands for Graphical User Interface.
Itโs the visual part of a computer that you interact with โ like windows, icons, buttons, and menus โ instead of typing commands.
โธป
Example:
โข GUI: Clicking a folder to open it, dragging files, using apps with buttons and sliders.
โข Command Line (CLI): Typing cd Documents to go into a folder or ls to list files.
โธป
In Linux, some distros like Ubuntu come with a GUI by default, but you can also run it entirely through the terminal (CLI), which is what makes it feel more โhands-onโ and fun โ especially for tech-savvy folks like you.๐
Linux is actually pretty fun โ using all those commands makes it exciting. You donโt even need a GUI; just writing code to get things done is part of the thrill.
๐จ New Tactics from Russian Hackers!
Since March 2025, Russian threat groups UTA0352 & UTA0355 are targeting Ukraine-linked orgs via Microsoft 365 OAuth abuse.
No fake sitesโjust official Microsoft URLs, real Signal/WhatsApp invites, and compromised Ukrainian Gov accounts.
๐ Learn more: https://thehackernews.com/2025/04/russian-hackers-exploit-microsoft-oauth.html
Since March 2025, Russian threat groups UTA0352 & UTA0355 are targeting Ukraine-linked orgs via Microsoft 365 OAuth abuse.
No fake sitesโjust official Microsoft URLs, real Signal/WhatsApp invites, and compromised Ukrainian Gov accounts.
๐ Learn more: https://thehackernews.com/2025/04/russian-hackers-exploit-microsoft-oauth.html
๐ฅ Google pulls the plug on third-party cookie prompts in Chrome.
No more new pop-ups โ just Incognito upgrades & IP protection by Q3 2025.
While Firefox & Safari banned 3rd-party cookies in 2020, Google stallsโcaught between privacy & profit.
Read โ https://thehackernews.com/2025/04/google-drops-cookie-prompt-in-chrome.html
No more new pop-ups โ just Incognito upgrades & IP protection by Q3 2025.
While Firefox & Safari banned 3rd-party cookies in 2020, Google stallsโcaught between privacy & profit.
Read โ https://thehackernews.com/2025/04/google-drops-cookie-prompt-in-chrome.html
โThis year, Iโm focused on achieving a cybersecurity certification โ itโs my top priority. How about you? Whatโs your goal?โ
A few reminders for today:
โข Use MFA everywhere
โข Keep systems and software updated
โข Train your team โ humans are often the weakest link
โข Donโt trust, always verify
Stay sharp, stay secure.
#CyberSecurity #InfoSec #MFA #Phishing #ZeroTrust #TechTips #Warpcast
โข Use MFA everywhere
โข Keep systems and software updated
โข Train your team โ humans are often the weakest link
โข Donโt trust, always verify
Stay sharp, stay secure.
#CyberSecurity #InfoSec #MFA #Phishing #ZeroTrust #TechTips #Warpcast
๐ฃ Lotus Panda, a China-linked APT, breached key sectors across Southeast Asiaโgovt, telecom, air trafficโfrom Aug 2024 to Feb 2025.
New tools. Stolen Chrome data. Hijacked legit software.
Read full report ๐ https://thehackernews.com/2025/04/lotus-panda-hacks-se-asian-governments.html
New tools. Stolen Chrome data. Hijacked legit software.
Read full report ๐ https://thehackernews.com/2025/04/lotus-panda-hacks-se-asian-governments.html
๐ต๏ธโโ๏ธ Kimsuky is backโand digging deep.
A new Larva-24005 campaign is exploiting old RDP bugs (BlueKeep, CVE-2019-0708) to breach systems in South Korea, Japan & beyondโwith targets across energy, finance & tech.
Learn more: https://thehackernews.com/2025/04/kimsuky-exploits-bluekeep-rdp.html
A new Larva-24005 campaign is exploiting old RDP bugs (BlueKeep, CVE-2019-0708) to breach systems in South Korea, Japan & beyondโwith targets across energy, finance & tech.
Learn more: https://thehackernews.com/2025/04/kimsuky-exploits-bluekeep-rdp.html
๐จ Surge in cyberattacks tied to Russian bulletproof host Proton66 since Jan 8, 2025.
New research links it to brute-force, malware, ransomwareโeven traffic routed via Kaspersky Labโs network path.
Attackers exploit 2024โ25 zero-days, deploy SuperBlack & WeaXor ransomware, and run phishing via hacked WordPress sites.
Learn more: https://thehackernews.com/2025/04/hackers-abuse-russian-bulletproof-host.html
New research links it to brute-force, malware, ransomwareโeven traffic routed via Kaspersky Labโs network path.
Attackers exploit 2024โ25 zero-days, deploy SuperBlack & WeaXor ransomware, and run phishing via hacked WordPress sites.
Learn more: https://thehackernews.com/2025/04/hackers-abuse-russian-bulletproof-host.html
In a small organizational setup, incorporating network switches can offer significant advantages over relying solely on wireless connectivity. Switches provide a more stable and reliable connection by directly linking devices through Ethernet. This results in:
โข Consistent high-speed data transfer, ideal for file sharing and real-time applications
โข Reduced latency and interference, ensuring smooth performance even in high-traffic environments
โข Enhanced security, as wired connections are less susceptible to unauthorized access compared to Wi-Fi
โข Scalability and manageability, making it easier to expand and control the network as the business grows
While wireless access has its place for mobility, a switch-based infrastructure ensures efficiency, performance, and dependability โ all critical for day-to-day operations in a professional setting.
#Networking #ITInfrastructure #SmallBusiness #TechSolutions #WiredVsWireless #Cybersecurity
โข Consistent high-speed data transfer, ideal for file sharing and real-time applications
โข Reduced latency and interference, ensuring smooth performance even in high-traffic environments
โข Enhanced security, as wired connections are less susceptible to unauthorized access compared to Wi-Fi
โข Scalability and manageability, making it easier to expand and control the network as the business grows
While wireless access has its place for mobility, a switch-based infrastructure ensures efficiency, performance, and dependability โ all critical for day-to-day operations in a professional setting.
#Networking #ITInfrastructure #SmallBusiness #TechSolutions #WiredVsWireless #Cybersecurity
๐จ Russiaโs APT29 hits EU diplomats with new malware disguised as wine-tasting invites.
๐ท GRAPELOADER is a stealthy first-stage loader hidden in โwine-zipโ
๐ฏ Targets: European Ministries of Foreign Affairs
๐ Launches WINELOADER for deep system access
๐ Full report: https://thehackernews.com/2025/04/apt29-deploys-grapeloader-malware.html
๐ท GRAPELOADER is a stealthy first-stage loader hidden in โwine-zipโ
๐ฏ Targets: European Ministries of Foreign Affairs
๐ Launches WINELOADER for deep system access
๐ Full report: https://thehackernews.com/2025/04/apt29-deploys-grapeloader-malware.html
๐ Attackers are now using multi-stage payloads that slip past detectionโvia simple tricks, not complex code.
One phishing email = 3 malware strains:
โข Agent Tesla
โข Remcos RAT
โข XLoader
๐ Plus: a new MysterySnail variant is targeting Mongolia & Russiaโ40+ commands, remote access, and evasion built-in.
โก๏ธ See the full analysis: https://thehackernews.com/2025/04/multi-stage-malware-attack-uses-jse-and.html
One phishing email = 3 malware strains:
โข Agent Tesla
โข Remcos RAT
โข XLoader
๐ Plus: a new MysterySnail variant is targeting Mongolia & Russiaโ40+ commands, remote access, and evasion built-in.
โก๏ธ See the full analysis: https://thehackernews.com/2025/04/multi-stage-malware-attack-uses-jse-and.html
๐จ New XorDDoS Variant Targets U.S. Servers!
The malware is now hijacking Docker and Linux systems via SSH brute-force attacks.
A new โVIPโ controller spotted in 2024 suggests itโs being sold as a service, expanding botnet operations.
Full story โ https://thehackernews.com/2025/04/experts-uncover-new-xorddos-controller.html
The malware is now hijacking Docker and Linux systems via SSH brute-force attacks.
A new โVIPโ controller spotted in 2024 suggests itโs being sold as a service, expanding botnet operations.
Full story โ https://thehackernews.com/2025/04/experts-uncover-new-xorddos-controller.html