The Hacker News
βœ”
152K subscribers
1.87K photos
10 videos
3 files
7.78K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
Outdated pen testing is expensive & leaves holes in your security. With automation and AI, companies can now affordably assess network security regularly, spotting vulnerabilities before attackers do.

πŸ’ͺ Find out how: https://thehackernews.com/2024/03/the-golden-age-of-automated-penetration.html
πŸ€”16πŸ”₯11πŸ‘9⚑3πŸ‘3🀯3
πŸ›‘URGENT SECURITY ALERT!

Secret backdoor found in XZ Utils compression library used by major Linux distros, like Fedora, Kali Linux, and openSUSE. Attackers could breach SSH and take control of systems.

https://thehackernews.com/2024/03/urgent-secret-backdoor-found-in-xz.html

Update and review your systems immediately.
🀯61πŸ”₯19πŸ‘12😱9😁7
⚠️ Mac users, beware! Malicious ads and fake websites are spreading dangerous malware like Atomic Stealer, which can steal your passwords, cryptocurrency, and other sensitive data.

Learn more: https://thehackernews.com/2024/03/hackers-target-macos-users-with.html
πŸ‘24😁17😱12πŸ€”5πŸ”₯4πŸ‘3🀯1
🚨 Android users beware! Vultur, the notorious banking trojan, is back with upgraded new remote control features, encrypted communication, and stealthy techniques.

Learn more: https://thehackernews.com/2024/04/vultur-android-banking-trojan-returns.html
πŸ‘23🀯11
πŸ“±βš οΈ Malicious Android apps found on the Google Play Store!

Experts uncover VPN apps hijacking users' devices, covertly turning them into proxy nodes for cybercriminals and fueling botnet operations.

Details here: https://thehackernews.com/2024/04/malicious-apps-caught-secretly-turning.html
πŸ‘17πŸ”₯9πŸ‘5😁2⚑1
πŸ” Logs are the foundation of monitoring efforts, especially on Windows.

"EventSentry" harnesses the power of detailed log monitoring & real-time validation to detect malware attacks early.

Read: https://thehackernews.com/2024/04/detecting-windows-based-malware-through.html

Don't let blind spots compromise your security.
πŸ‘20😱5πŸ€”3
Who’s using AI tools in your organization? Find out in minutes with Nudge Security. Start a free trial and discover every SaaS account ever created by anyone in your org, including generative AI tools.

The best part? You’ll have a full inventory in minutes and you don’t even have to know what apps you’re looking for. No agents, browser plug-ins or network proxies required.

https://thn.news/mitigate-ai-risks
πŸ‘19πŸ”₯6πŸ‘1😁1
πŸ›‘ TA558 threat actor launches massive phishing campaign targeting Latin American sectors, deploying Venom RAT. Hotels, finance, government among primary targets in Spain, Mexico, U.S., Colombia, Brazil, and more.

Learn more: https://thehackernews.com/2024/04/massive-phishing-campaign-strikes-latin.html
πŸ”₯14😁9🀯4πŸ‘2
Google agrees to delete BILLION of browsing records to settle class action lawsuit, alleging tracking without consent in Chrome's Incognito Mode.

Find details here: https://thehackernews.com/2024/04/google-to-delete-billions-of-browsing.html
🀯52😁17πŸ”₯12πŸ‘9πŸ‘4
China-linked hacker group Earth Freybug is now using a new malware named "UNAPIMON" to fly under the radar.

Learn more: https://thehackernews.com/2024/04/china-linked-hackers-deploy-new.html

Researchers shed light on their espionage and financially motivated activities.
πŸ‘19😁8πŸ”₯6πŸ‘2
πŸ›‘ Malicious code discovered in widely used Linux tool XZ Utils could lead to remote code execution. The incident underscores the dangers of open-source software reliance.

Read now: https://thehackernews.com/2024/04/malicious-code-in-xz-utils-for-linux.html

If you use Linux, take action NOW.
🀯35😁17πŸ€”9πŸ”₯7πŸ‘5⚑1
What makes Cloud Security tough? Lack of visibility, inconsistent permissions, blurred ownership...

Hybrid attack path analysis is crucial for complete security. Continuous Threat Exposure Management (CTEM) helps block critical attack vectors.

Learn: https://thehackernews.com/2024/04/harnessing-power-of-ctem-for-cloud.html
πŸ‘18πŸ‘6😁3πŸ€”2
🚨 Heads up, WordPress admins!

A critical SQL injection flaw in the LayerSlider plugin (CVE-2024-2879) could lead to sensitive data leaks. If you haven't updated, make sure to install version 7.10.1 or latest.

Find details: https://thehackernews.com/2024/04/critical-security-flaw-found-in-popular.html
πŸ”₯11πŸ‘8😱3😁1
⚠️ Banking trojan Mispadu expands to Italy, Poland, and Sweden, stealing thousands of credentials with sophisticated tactics like phishing emails and keystroke capture.

Read details: https://thehackernews.com/2024/04/mispadu-trojan-targets-europe-thousands.html
πŸ”₯11πŸ‘6
Google Chrome is testing a new feature called "Device Bound Session Credentials" to fight against session cookie theft by #malware.

DBSC links auth sessions directly to users' devices to stop cookie theft hacks.

Learn more about it: https://thehackernews.com/2024/04/google-chrome-beta-tests-new-dbsc.html
πŸ‘38😁9🀯5⚑1πŸ”₯1
Confused about vulnerability management (VM) vs. attack surface management (ASM)?

They're both important but different. But together, they form a robust defense against cyber threats.

Learn how: https://thehackernews.com/2024/04/attack-surface-management-vs.html
πŸ‘16😁6πŸ‘5
⚠️ U.S. Cyber Safety Review Board slams Microsoft for security failures that enabled a major data breach by China-backed hackers.

Read details: https://thehackernews.com/2024/04/us-cyber-safety-board-slams-microsoft.html
😁14πŸ”₯10πŸ‘7πŸ€”6
πŸ”₯ Google's Pixel smartphones under attack!

Two new Android security flaws - CVE-2024-29745 & CVE-2024-29748 - uncovered, exploited in the wild by forensic companies.

Learn more: https://thehackernews.com/2024/04/google-warns-android-zero-day-flaws-in.html
πŸ”₯29πŸ‘10😱8😁5⚑4πŸ€”4🀯4
⚠️ Ivanti releases security patches for 4 new flaws in Connect Secure/Policy Secure Gateways.

Flaws could allow attackers to execute arbitrary code or launch DoS attacks.

Learn more: https://thehackernews.com/2024/04/ivanti-rushes-patches-for-4-new-flaw-in.html
😁13πŸ‘9πŸ”₯1🀯1
Your data protection strategy can only be as good as the solutions you choose to implement. This makes being prepared and informed a crucial part of the buying process.

Check out the free Zerto Data Protection Buyers Guide for more buying decision info: https://thn.news/6DQjE1Pa
πŸ‘16⚑1🀯1
New HTTP/2 #ulnerability discovered.

"CONTINUATION Flood" attacks can lead to denial-of-service (DoS). This could cause crashes and serious website disruptions.

Find details here: https://thehackernews.com/2024/04/new-http2-vulnerability-exposes-web.html
🀯14😁9πŸ‘8πŸ€”6⚑1