The Hacker News
βœ”
152K subscribers
1.86K photos
10 videos
3 files
7.78K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
Tired of being overwhelmed by security exposures?

Discover the power of Continuous Threat Exposure Management (CTEM). Identify critical assets, prioritize risks, and get actionable recommendations for improved security posture.

Get started πŸ‘‡ https://thehackernews.com/2024/03/ctem-101-go-beyond-vulnerability.html
πŸ”₯13πŸ‘9
🚨 Microsoft releases Patch Tuesday updates to patch 61 new vulnerabilities, including privilege escalation flaws in Azure, Windows, & Authenticator.

Update ASAP. Learn more: https://thehackernews.com/2024/03/microsofts-march-updates-fix-61.html
😁14πŸ‘7πŸ‘3πŸ”₯1
🚨 Alert: A new phishing campaign uses a Java-based downloader to distribute VCURMS & STRRAT RATs, leveraging public services like AWS & GitHub for malware hosting.

Learn more: https://thehackernews.com/2024/03/alert-cybercriminals-deploying-vcurms.html
😱11πŸ‘4😁1
Beware of adversary-in-the-middle attacks: Hackers create fake login pages to steal credentials and manipulate MFA prompts. Protect yourself by verifying websites and being cautious with links

Read: https://thehackernews.com/2024/02/4-ways-hackers-use-social-engineering.html
πŸ”₯12πŸ‘7😁1
Researchers reveal Google's Gemini AI is vulnerable to LLM attacks that could leak sensitive data, generate harmful content, and be used for malicious purposes.

Read: https://thehackernews.com/2024/03/researchers-highlight-googles-gemini-ai.html
😁27πŸ‘5
Cybercriminals are now targeting the latest weak spotβ€”identities within SaaS applications.

Join our webinar to learn how to secure both human and non-human identities against data breaches and financial losses.

Register now: https://thehackernews.com/2024/03/join-our-webinar-on-protecting-human.html
πŸ‘19😁2
Latest version of PixPirate Android banking trojan evades detection by removing the ability to launch the app from the home screen. The complex infection chain involves both a downloader and the main malicious app working in tandem.

Read: https://thehackernews.com/2024/03/pixpirate-android-banking-trojan-using.html
πŸ‘11πŸ”₯5
Tools of the Trade: Anti-malware scanning, WAFs, and sandboxing alone aren't sufficient for protecting against malicious uploads.

Learn why and discover what offers better protection in our detailed analysis: https://thehackernews.com/2024/03/demystifying-common-cybersecurity-myth.html
πŸ”₯9πŸ‘8🀯4😁2
⚠️ Vulnerability Alert: Fortinet warns of a severe SQL Injection vulnerability (CVE-2023-48788) in FortiClientEMS allowing unauthenticated attackers to execute code remotely.

Details: https://thehackernews.com/2024/03/fortinet-warns-of-severe-sqli.html

Check if your versions are affected and upgrade ASAP!
😁21🀯9πŸ‘6πŸ”₯4
πŸ›‘ A new DarkGate malware campaign uses a recently patched #Microsoft Windows flaw (CVE-2024-21412) to deploy malicious software via bogus installers.

Learn more: https://thehackernews.com/2024/03/darkgate-malware-exploits-recently.html
πŸ”₯16🀯6😁2πŸ‘1😱1
Researchers detail a high-severity flaw in Kubernetes, CVE-2023-5528, that allowed attackers remote code execution with SYSTEM privileges on Windows endpoints within a cluster.

Learn more: https://thehackernews.com/2024/03/researchers-detail-kubernetes.html
πŸ‘11πŸ”₯9😁1
RedCurl cybercrime group found exploiting Windows Program Compatibility Assistant for malicious activities. This sophisticated method allows attackers to bypass security and run malicious commands.

Read: https://thehackernews.com/2024/03/redcurl-cybercrime-group-abuses-windows.html
πŸ‘12πŸ”₯8😁1
Blind Eagle expands its cyber threats, now using Ande Loader malware to deliver RATs via phishing.

Targets? Spanish-speaking manufacturing industry in North America

Read: https://thehackernews.com/2024/03/ande-loader-malware-targets.html
πŸ‘13πŸ”₯7😁1
Russian-Canadian national Mikhail Vasiliev has been sentenced to nearly 4 years in prison for his role in the infamous LockBit ransomware operation and has been ordered to pay over $860,000 in restitution.

Read details here: https://thehackernews.com/2024/03/lockbit-ransomware-hacker-ordered-to.html
πŸ‘15😁13🀯12
πŸ”’ Balancing act for CISOs: Ensuring security without hindering productivity.

Discover how Cato SSE 360, part of the Cato SASE Cloud platform, nails this balance by optimizing cost, complexity, and user experience.

Read: https://thehackernews.com/2024/03/3-things-cisos-achieve-with-cato.html
πŸ‘8πŸ‘4😁2
🚨 Alert for Chinese software seekers! Bogus ads on search engines like Baidu lead to fake Notepad++ & VNote downloads, deploying the Geacon trojan. Double-check URLs!

Read: https://thehackernews.com/2024/03/malicious-ads-targeting-chinese-users.html
πŸ‘10πŸ”₯6😁1
πŸ›‘οΈ Google rolls out an enhanced Safe Browsing feature for Chrome on desktop & iOS.

Now with real-time URL checks against known malicious sites, aiming to block 25% more phishing attempts.

Learn more: https://thehackernews.com/2024/03/google-introduces-enhanced-real-time.html
πŸ‘17πŸ€”9πŸ‘6πŸ”₯5⚑2😁2
Researchers have uncovered new threat in third-party plugins for OpenAI's ChatGPT that could allow attackers to install malicious plugins without users' consent and hijack accounts on third-party websites such as GitHub.

Read: https://thehackernews.com/2024/03/third-party-chatgpt-plugins-could-lead.html
πŸ”₯20πŸ‘8😱5😁2
Researchers have uncovered "GhostRace" (CVE-2024-2193), a new variation of the Spectre v1 vulnerability affecting CPUs with speculative execution. This attack exploits race conditions to allow attackers to leak sensitive data.

Read: https://thehackernews.com/2024/03/ghostrace-new-data-leak-vulnerability.html
πŸ”₯22πŸ‘8😁3
Watch Out! Hackers are using fake cracked software on GitHub to spread the RisePro information-stealing malware.

Read: https://thehackernews.com/2024/03/hackers-using-cracked-software-on.html
πŸ‘18🀯9😁8πŸ”₯3πŸ‘2