The Hacker News
- North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware February 20, 2025Freelance software developers are the target of an ongoing campaign that leverages job interview-themed lures to deliver cross-platform malware families known as BeaverTail and InvisibleFerret. The activity, linked to North Korea, has been codenamed DeceptiveDevelopment, which overlaps with clusters tracked under the names Contagious Interview (aka CL-STA-0240), DEV#POPPER, Famous Chollima,
- PCI DSS 4.0 Mandates DMARC By 31st March 2025 February 20, 2025The payment card industry has set a critical deadline for businesses handling cardholder data or processing payments- by March 31, 2025, DMARC implementation will be mandatory! This requirement highlights the importance of preventative measures against email fraud, domain spoofing, and phishing in the financial space. This is not an optional requirement as non-compliance may result […]
- China-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware February 20, 2025A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare sector, to deploy PlugX and its successor, ShadowPad, with the intrusions ultimately leading to deployment of a ransomware called NailaoLocker in some cases. The campaign, codenamed Green Nailao by Orange Cyberdefense CERT, involved the exploitation of a new-patched security flaw
- Cybercriminals Use Eclipse Jarsigner to Deploy XLoader Malware via ZIP Archives February 20, 2025A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a legitimate application associated with the Eclipse Foundation. "The legitimate application used in the attack, jarsigner, is a file created during the installation of the IDE package distributed by the Eclipse Foundation," the AhnLab SEcurity Intelligence […]
- Microsoft's End of Support for Exchange 2016 and 2019: What IT Teams Must Do Now February 20, 2025For decades, Microsoft Exchange has been the backbone of business communications, powering emailing, scheduling and collaboration for organizations worldwide. Whether deployed on-premises or in hybrid environments, companies of all sizes rely on Exchange for seamless internal and external communication, often integrating it deeply with their workflows, compliance policies and security frameworks
GBHackers Security | #1 Globally Trusted Cyber Security News Platform
- Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India February 20, 2025Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research and Development (R&D) Centre in Bengaluru, India. This initiative, unveiled during the CPX Bangkok 2025 conference, aims to drive innovation in cybersecurity solutions while strengthening global product development and talent acquisition. The Bengaluru centre underscores Check Point’s commitment to leveraging India’s […]
- PoC Exploit Released for Ivanti EPM Vulnerabilities February 20, 2025A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that could allow unauthenticated attackers to exploit machine account credentials for relay attacks, potentially leading to server compromise. These vulnerabilities, identified in the C:\Program Files\LANDesk\ManagementSuite\WSVulnerabilityCore.dll, were patched in January 2025 following their discovery in October 2024. The vulnerabilities are categorized as follows: […]
- Ransomware Trends 2025 – What’s new February 20, 2025As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and scale. The ransomware ecosystem has adapted to previous law enforcement disruptions, showcasing a resilient business model that continues to attract financially motivated cybercriminals. The proliferation of Ransomware-as-a-Service (RaaS) has significantly contributed to the volume of attacks, allowing less experienced affiliates to […]
- Hackers Delivering Malware Bundled with Fake Job Interview Challenges February 20, 2025ESET researchers have uncovered a series of malicious activities orchestrated by a North Korea-aligned group known as DeceptiveDevelopment, active since early 20241. The cybercriminals pose as company recruiters, enticing freelance software developers with fake employment offers. As part of the elaborate ruse, targets are asked to complete coding tests, such as adding features to existing […]
- New Bookworm Malware Using SLL Sideloading Technique To Windows February 20, 2025Cybersecurity researchers from Palo Alto Networks’ Unit 42 disclosed the resurgence of the Bookworm malware, which has been linked to the Stately Taurus threat actor group. This malware employs a sophisticated DLL sideloading technique that enables it to infiltrate Windows systems effectively. The research highlights overlaps between the infrastructure used by Stately Taurus and the […]