The Hacker News
βœ”
152K subscribers
1.87K photos
10 videos
3 files
7.79K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
Researchers detail a recently reported vulnerability, dubbed β€œSiriSpy,” in Apple's iOS and macOS devices that could have allowed apps to eavesdrop on users' conversations with Siri.

Read: https://thehackernews.com/2022/10/apple-ios-and-macos-flaw-couldve-let.html
πŸ‘37🀯7😱6⚑4😁3πŸ”₯1πŸ€”1
Researchers have uncovered over 80 command-and-control (C2) servers associated with the ShadowPad malware.

Read: https://thehackernews.com/2022/10/researchers-expose-over-80-shadowpad.html
πŸ”₯28πŸ‘12😁2🀯2⚑1
U.S. government has charged a 34-year-old British hacker with running a dark web marketplace called "The Real Deal" that sold hacking tools and stolen credentials.

Read: https://thehackernews.com/2022/10/british-hacker-charged-for-operating.html
🀯37πŸ‘17😁15😱8πŸ‘7⚑3πŸ€”3πŸ”₯2
Raspberry Robin worm infected nearly 3,000 devices in nearly 1,000 organizations, allowing other cybercriminals to deploy malware such as IcedID, Bumblebee, TrueBot, and Clop ransomware.

Read: https://thehackernews.com/2022/10/raspberry-robin-operators-selling.html
🀯18πŸ‘8πŸ”₯5⚑2
⚑ Google is rolling out an emergency update for the Chrome browser to patch an actively exploited zero-day vulnerability (CVE-2022-3723).

Read: https://thehackernews.com/2022/10/google-issues-urgent-chrome-update-to.html
πŸ‘50😁9🀯8⚑4😱4πŸ”₯1
Cyber espionage group Cranefly uses stealthy tactics to target employees dealing with corporate transactions.

Read: https://thehackernews.com/2022/10/researchers-uncover-stealthy-techniques.html
πŸ”₯17πŸ‘7🀯6😁4⚑1
5 malicious Android dropper apps with over 130,000 cumulative installs have been discovered in the Google Play Store, spreading banking trojans like SharkBot and Vultur to steal users' financial data and perform on-device fraud.

Read: https://thehackernews.com/2022/10/these-dropper-apps-on-play-store.html
πŸ”₯19πŸ‘14😱6πŸ‘3⚑2
Researchers have uncovered several serious vulnerabilities in Juniper Networks devices, some of which could be exploited for code execution.

Read: https://thehackernews.com/2022/10/high-severity-flaws-in-juniper-junos-os.html
⚑22πŸ‘21😁4πŸ”₯3
Communication services provider Twilio disclosed another security incident involving the same threat actor behind the August hack.

Read: https://thehackernews.com/2022/10/twilio-reveals-another-breach-from-same.html
🀯34πŸ‘9πŸ”₯8πŸ‘8😱7⚑6😁4
Researchers describe a recently reported vulnerability in Samsung's Galaxy Store app that could have enabled attackers to install and/or launch malicious apps and potentially carry out remote attacks.

Read: https://thehackernews.com/2022/10/samsung-galaxy-store-bug-couldve-let.html
🀯34πŸ‘11πŸ”₯5😱4⚑3πŸ‘2
An unofficial patch has been made available for an actively exploited vulnerability in Microsoft Windows that allows files signed with malformed signatures to bypass Mark-of-the-Web (MotW) protection.

Read: https://thehackernews.com/2022/10/unofficial-patch-released-for-new.html
πŸ‘32πŸ‘4πŸ”₯3🀯3😱3😁2
GitHub patched a new high-severity repojacking bug that could have allowed attackers to access other users' repositories and perform supply chain attacks.

Read: https://thehackernews.com/2022/10/github-repojacking-bug-couldve-allowed.html
🀯44πŸ‘12⚑10πŸ‘6πŸ€”5πŸ”₯4😁4
Hackers behind the Fodcha distributed denial-of-service (DDoS) botnet has resurfaced with new capabilities.

Read: https://thehackernews.com/2022/10/fodcha-ddos-botnet-resurfaces-with-new.html
πŸ‘32πŸ”₯12🀯4πŸ€”3😱3😁1
A critical vulnerability (CVE-2022-36537) has been reported and patched in ConnectWise R1Soft Server Backup Manager software that could lead to remote code execution and supply chain attacks.

Read: https://thehackernews.com/2022/11/critical-rce-vulnerability-reported-in.html
πŸ”₯20πŸ‘11🀯4😱2
Chinese state-sponsored hackers have been observed employing a new stealthy infection chain in their LODEINFO malware attacks targeting Japanese entities.

Read: https://thehackernews.com/2022/11/chinese-hackers-using-new-stealthy.html
πŸ‘13🀯8πŸ”₯5πŸ‘3😁2⚑1
Researchers reveal details of a critical authentication bypass vulnerability in Jupyter Notebooks for Microsoft Azure Cosmos DB, which could have allowed attackers to achieve remote code execution on containers.

Read: https://thehackernews.com/2022/11/researchers-disclose-details-of.html
⚑12πŸ‘9πŸ”₯5🀯4😁1
Nothing CRITICAL this time!

OpenSSL has released patches for 2 new high-severity flaws (CVE-2022-3786 / CVE-2022-3602).

https://thehackernews.com/2022/11/just-in-openssl-releases-patch-for-2.html

CVE-2022-3602 has been downgraded from CRITICAL to HIGH as it cannot be exploited in most widely used architectures and platforms.
πŸ‘34πŸ‘24😁16πŸ€”10πŸ”₯7😱5
File hosting service Dropbox fell victim to a phishing campaign that allowed unknown hackers gained unauthorized access to 130 of its source code repositories on GitHub.

Read: https://thehackernews.com/2022/11/dropbox-breach-hackers-unauthorizedly.html
😱42πŸ”₯17🀯13😁11πŸ‘8⚑5
Researchers warn of booby-trapped VPN applications infecting Android devices with new SandStrike spyware.

Read: https://thehackernews.com/2022/11/experts-warn-of-sandstrike-android.html
πŸ‘17🀯11πŸ”₯4πŸ€”3
As part of an adware and information theft campaign, four Android apps from the same developer directed victims to malicious websites.

Read: https://thehackernews.com/2022/11/these-android-apps-with-million-play.html
πŸ‘27πŸ”₯12🀯10
πŸ”₯26πŸ‘9⚑8😱4🀯3