The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to admin@thehackernews.com
- Malicious PyPI Package Masquerades as Chimera Module to Steal AWS, CI/CD, and macOS Databy info@thehackernews.com (The Hacker News) on June 16, 2025 at 6:45 am
Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that’s capable of harvesting sensitive developer-related information, such as credentials, configuration data, and environment variables, among others. The package, named chimera-sandbox-extensions, attracted 143 downloads and likely targeted users of a service called Chimera Sandbox,
- Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Walletsby info@thehackernews.com (The Hacker News) on June 14, 2025 at 2:45 am
A new malware campaign is exploiting a weakness in Discord’s invitation system to deliver an information stealer called Skuld and the AsyncRAT remote access trojan. “Attackers hijacked the links through vanity link registration, allowing them to silently redirect users from trusted sources to malicious servers,” Check Point said in a technical report. “The attackers combined the ClickFix
- Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Monthby info@thehackernews.com (The Hacker News) on June 13, 2025 at 2:12 pm
Cybersecurity researchers are calling attention to a “large-scale campaign” that has been observed compromising legitimate websites with malicious JavaScript injections. According to Palo Alto Networks Unit 42, these malicious injects are obfuscated using JSFuck, which refers to an “esoteric and educational programming style” that uses only a limited set of characters to write and execute
- Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortionby info@thehackernews.com (The Hacker News) on June 13, 2025 at 11:02 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday disclosed that ransomware actors are targeting unpatched SimpleHelp Remote Monitoring and Management (RMM) instances to compromise customers of an unnamed utility billing software provider. “This incident reflects a broader pattern of ransomware actors targeting organizations through unpatched versions of SimpleHelp
- CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Riskby info@thehackernews.com (The Hacker News) on June 13, 2025 at 10:30 am
Introduction: Security at a Tipping Point Security Operations Centers (SOCs) were built for a different era, one defined by perimeter-based thinking, known threats, and manageable alert volumes. But today’s threat landscape doesn’t play by those rules. The sheer volume of telemetry, overlapping tools, and automated alerts has pushed traditional SOCs to the edge. Security teams are overwhelmed,
- Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spywareby info@thehackernews.com (The Hacker News) on June 13, 2025 at 7:03 am
Apple has disclosed that a now-patched security flaw present in its Messages app was actively exploited in the wild to target civil society members in sophisticated cyber attacks. The vulnerability, tracked as CVE-2025-43200, was addressed on February 10, 2025, as part of iOS 18.3.1, iPadOS 18.3.1, iPadOS 17.7.5, macOS Sequoia 15.3.1, macOS Sonoma 14.7.4, macOS Ventura 13.7.4, watchOS 11.3.1,
- WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Networkby info@thehackernews.com (The Hacker News) on June 12, 2025 at 5:47 pm
The threat actors behind the VexTrio Viper Traffic Distribution Service (TDS) have been linked to other TDS services like Help TDS and Disposable TDS, indicating that the sophisticated cybercriminal operation is a sprawling enterprise of its own that’s designed to distribute malicious content. “VexTrio is a group of malicious adtech companies that distribute scams and harmful software via
- New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changesby info@thehackernews.com (The Hacker News) on June 12, 2025 at 1:52 pm
Cybersecurity researchers have discovered a novel attack technique called TokenBreak that can be used to bypass a large language model’s (LLM) safety and content moderation guardrails with just a single character change. “The TokenBreak attack targets a text classification model’s tokenization strategy to induce false negatives, leaving end targets vulnerable to attacks that the implemented
- AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinarby info@thehackernews.com (The Hacker News) on June 12, 2025 at 1:06 pm
AI is changing everything — from how we code, to how we sell, to how we secure. But while most conversations focus on what AI can do, this one focuses on what AI can break — if you’re not paying attention. Behind every AI agent, chatbot, or automation script lies a growing number of non-human identities — API keys, service accounts, OAuth tokens — silently operating in the background. And here’s
- Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interactionby info@thehackernews.com (The Hacker News) on June 12, 2025 at 11:11 am
A novel attack technique named EchoLeak has been characterized as a “zero-click” artificial intelligence (AI) vulnerability that allows bad actors to exfiltrate sensitive data from Microsoft 365 (M365) Copilot’s context sans any user interaction. The critical-rated vulnerability has been assigned the CVE identifier CVE-2025-32711 (CVSS score: 9.3). It requires no customer action and has been
- Non-Human Identities: How to Address the Expanding Security Riskby info@thehackernews.com (The Hacker News) on June 12, 2025 at 11:00 am
Human identities management and control is pretty well done with its set of dedicated tools, frameworks, and best practices. This is a very different world when it comes to Non-human identities also referred to as machine identities. GitGuardian’s end-to-end NHI security platform is here to close the gap. Enterprises are Losing Track of Their Machine Identities Machine identities–service
- ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risksby info@thehackernews.com (The Hacker News) on June 12, 2025 at 7:42 am
ConnectWise has disclosed that it’s planning to rotate the digital code signing certificates used to sign ScreenConnect, ConnectWise Automate, and ConnectWise remote monitoring and management (RMM) executables due to security concerns. The company said it’s doing so “due to concerns raised by a third-party researcher about how ScreenConnect handled certain configuration data in earlier versions.
- Over 80,000 Microsoft Entra ID Accounts Targeted Using Open-Source TeamFiltration Toolby info@thehackernews.com (The Hacker News) on June 12, 2025 at 5:41 am
Cybersecurity researchers have uncovered a new account takeover (ATO) campaign that leverages an open-source penetration testing framework called TeamFiltration to breach Microsoft Entra ID (formerly Azure Active Directory) user accounts. The activity, codenamed UNK_SneakyStrike by Proofpoint, has targeted over 80,000 user accounts across hundreds of organizations’ cloud tenants since a surge in
- Former Black Basta Members Use Microsoft Teams and Python Scripts in 2025 Attacksby info@thehackernews.com (The Hacker News) on June 11, 2025 at 5:44 pm
Former members tied to the Black Basta ransomware operation have been observed sticking to their tried-and-tested approach of email bombing and Microsoft Teams phishing to establish persistent access to target networks. “Recently, attackers have introduced Python script execution alongside these techniques, using cURL requests to fetch and deploy malicious payloads,” ReliaQuest said in a report
- 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Managerby info@thehackernews.com (The Hacker News) on June 11, 2025 at 1:49 pm
Threat intelligence firm GreyNoise has warned of a “coordinated brute-force activity” targeting Apache Tomcat Manager interfaces. The company said it observed a surge in brute-force and login attempts on June 5, 2025, an indication that they could be deliberate efforts to “identify and access exposed Tomcat services at scale.” To that end, 295 unique IP addresses have been found to be engaged
- INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secureby info@thehackernews.com (The Hacker News) on June 11, 2025 at 11:32 am
INTERPOL on Wednesday announced the dismantling of more than 20,000 malicious IP addresses or domains that have been linked to 69 information-stealing malware variants. The joint action, codenamed Operation Secure, took place between January and April 2025, and involved law enforcement agencies from 26 countries to identify servers, map physical networks, and execute targeted takedowns. “These
- Why DNS Security Is Your First Defense Against Cyber Attacks?by info@thehackernews.com (The Hacker News) on June 11, 2025 at 11:25 am
In today’s cybersecurity landscape, much of the focus is placed on firewalls, antivirus software, and endpoint detection. While these tools are essential, one critical layer often goes overlooked: the Domain Name System (DNS). As the starting point of nearly every online interaction, DNS is not only foundational – it’s increasingly a target. When left unsecured, it becomes a single point of
- SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwordsby info@thehackernews.com (The Hacker News) on June 11, 2025 at 10:28 am
Two security vulnerabilities have been disclosed in SinoTrack GPS devices that could be exploited to control certain remote functions on connected vehicles and even track their locations. “Successful exploitation of these vulnerabilities could allow an attacker to access device profiles without authorization through the common web management interface,” the U.S. Cybersecurity and Infrastructure
- How to Build a Lean Security Model: 5 Lessons from River Islandby info@thehackernews.com (The Hacker News) on June 11, 2025 at 10:00 am
In today’s security landscape, budgets are tight, attack surfaces are sprawling, and new threats emerge daily. Maintaining a strong security posture under these circumstances without a large team or budget can be a real challenge. Yet lean security models are not only possible – they can be highly effective. River Island, one of the UK’s leading fashion retailers, offers a powerful
- Microsoft Patches 67 Vulnerabilities Including WEBDAV Zero-Day Exploited in the Wildby info@thehackernews.com (The Hacker News) on June 11, 2025 at 7:46 am
Microsoft has released patches to fix 67 security flaws, including one zero-day bug in Web Distributed Authoring and Versioning (WebDAV) that it said has come under active exploitation in the wild. Of the 67 vulnerabilities, 11 are rated Critical and 56 are rated Important in severity. This includes 26 remote code execution flaws, 17 information disclosure flaws, and 14 privilege escalation
- Adobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security Gapsby info@thehackernews.com (The Hacker News) on June 10, 2025 at 6:29 pm
Adobe on Tuesday pushed security updates to address a total of 254 security flaws impacting its software products, a majority of which affect Experience Manager (AEM). Of the 254 flaws, 225 reside in AEM, impacting AEM Cloud Service (CS) as well as all versions prior to and including 6.5.22. The issues have been resolved in AEM Cloud Service Release 2025.5 and version 6.5.23. “Successful
- Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloudby info@thehackernews.com (The Hacker News) on June 10, 2025 at 6:04 pm
Cybersecurity researchers have uncovered over 20 configuration-related risks affecting Salesforce Industry Cloud (aka Salesforce Industries), exposing sensitive data to unauthorized internal and external parties. The weaknesses affect various components like FlexCards, Data Mappers, Integration Procedures (IProcs), Data Packs, OmniOut, and OmniScript Saved Sessions. “Low-code platforms such as
- FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malwareby info@thehackernews.com (The Hacker News) on June 10, 2025 at 4:46 pm
The financially motivated threat actor known as FIN6 has been observed leveraging fake resumes hosted on Amazon Web Services (AWS) infrastructure to deliver a malware family called More_eggs. “By posing as job seekers and initiating conversations through platforms like LinkedIn and Indeed, the group builds rapport with recruiters before delivering phishing messages that lead to malware,” the
- Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Usersby info@thehackernews.com (The Hacker News) on June 10, 2025 at 2:20 pm
Cybersecurity researchers have shed light on a previously undocumented Rust-based information stealer called Myth Stealer that’s being propagated via fraudulent gaming websites. “Upon execution, the malware displays a fake window to appear legitimate while simultaneously decrypting and executing malicious code in the background,” Trellix security researchers Niranjan Hegde, Vasantha Lakshmanan
- The Hidden Threat in Your Stack: Why Non-Human Identity Management is the Next Cybersecurity Frontierby info@thehackernews.com (The Hacker News) on June 10, 2025 at 11:00 am
Modern enterprise networks are highly complex environments that rely on hundreds of apps and infrastructure services. These systems need to interact securely and efficiently without constant human oversight, which is where non-human identities (NHIs) come in. NHIs — including application secrets, API keys, service accounts, and OAuth tokens — have exploded in recent years, thanks to an