The Hacker News
βœ”
151K subscribers
1.86K photos
10 videos
3 files
7.78K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
🚨 Alert - CISA has added a critical flaw in Oracle WebLogic Server to its KEV catalog due to active exploitation.

Details: https://thehackernews.com/2024/06/oracle-weblogic-server-os-command.html

This OS command injection vulnerability (CVE-2017-3506) could allow attackers to take control of affected servers.
πŸ‘14😱6πŸ”₯5⚑1
🚨 DarkGate shifts from AutoIt to AutoHotkey, highlighting its continuous evolution to evade detection.

Latest version packs new commands but drops some old ones. Learn more: https://thehackernews.com/2024/06/darkgate-malware-replaces-autoit-with.html
πŸ‘14πŸ”₯5⚑4
🚨 Red Alert: Snowflake customers must enable MFA now to prevent account compromise from stolen credentials πŸ”‘ obtained through information-stealing malware.

Learn more: https://thehackernews.com/2024/06/snowflake-warns-targeted-credential.html

Act immediately to protect your organization.
πŸ‘19⚑5πŸ‘4
A sophisticated cyber attack targeting Ukraine's endpoints has been discovered, aiming to deploy Cobalt Strike.

Learn how this multi-stage attack unfolds and the evasion techniques used by the attackers.

Read: https://thehackernews.com/2024/06/hackers-use-ms-excel-macro-to-launch.html
πŸ”₯18⚑4πŸ‘3πŸ‘1
πŸ•΅οΈβ€β™€οΈ Threat intelligence decay is real, and it's putting your organization at risk. Learn how AI is exacerbating this challenge and what you can do to stay ahead.

πŸ”— Read this article for more insights: https://thehackernews.com/expert-insights/2024/06/leveraging-ai-as-tool-in-threat.html
πŸ‘11⚑4πŸ‘4
Nudge Security has discovered over 500 unique GenAI apps in customer environments without the need for agents, browser plug-ins, or any prior knowledge of the apps in use.

See how you can discover, secure, and govern GenAI use with a free 14-day trial: https://thn.news/mitigate-genaI-risks
πŸ”₯8πŸ‘5πŸ€”5😱1
⚠️ Critical security flaw discovered in Progress Telerik Report Server (CVE-2024-4358, CVSS 9.8/10).

Remote attackers could bypass authentication and create rogue admin users.

Learn more: https://thehackernews.com/2024/06/telerik-report-server-flaw-could-let.html

Update to version 2024 Q2 (10.1.24.514) ASAP.
πŸ‘13🀯8😁3πŸ”₯2
The old way of protecting browsers is outdated. A new report reveals why Browser Isolation isn't enough anymore and how Secure Browser Extensions are stepping up to the challenge.

Learn more: https://thehackernews.com/2024/06/the-next-generation-of-rbi-remote.html
πŸ€”15🀯4πŸ‘3
Decoy Dog malware, previously targeting Linux, now has a confirmed Windows variant. APT group HellHounds is using this new version to compromise high-value targets in Russia and maintain persistent access for years.

Learn more: https://thehackernews.com/2024/06/russian-power-companies-it-firms-and.html
πŸ”₯14πŸ‘11πŸ‘6😱3⚑1
⚑ Attention, Zyxel NAS Users!

Critical updates released for NAS326 and NAS542 devices address severe vulnerabilities that could allow unauthenticated attackers to execute OS commands.

Learn more: https://thehackernews.com/2024/06/zyxel-releases-patches-for-firmware.html

Update now to secure your data!
⚑13πŸ‘6πŸ”₯5πŸ€”3
⚠️ TikTok admits a security issue where zero-click hashtag#malware in DMs allowed hackers to hijack high-profile accounts without user interaction.

Find details here: https://thehackernews.com/2024/06/celebrity-tiktok-accounts-compromised.html
πŸ”₯35😁20🀯10πŸ‘2
🚨 ALERT: RansomHub, a rebranded Knight #ransomware, targets healthcare and major entities.

Using legitimate remote desktop tools and recruiting from shutdown groups, it shows evolving cybercriminal tactics.

Learn more: https://thehackernews.com/2024/06/rebranded-knight-ransomware-targeting.html
πŸ‘16πŸ”₯6🀯1
πŸ›‘οΈ Chinese state-sponsored hackers target Southeast Asian government in cyber espionage campaign using new malware like PocoProxy and updated EAGERBEE, along with other known families.

Details here: https://thehackernews.com/2024/06/chinese-state-backed-cyber-espionage.html
πŸ”₯16πŸ‘5😁2😱2⚑1
🚨 Major communication platform faces backlash for using user data to train AI models without proper consent.

Is your organization's sensitive data at risk?

Learn about the growing threat of Shadow AI & how to combat it with automated SSPM solutions: https://thehackernews.com/2024/06/unpacking-2024s-saas-threat-predictions.html
πŸ€”16πŸ‘7πŸ”₯2😱2
🐍 Python developers beware! A malicious package named "crytic-compilers" was discovered on PyPI, designed to deliver the Lumma info stealer.

Learn more: https://thehackernews.com/2024/06/hackers-target-python-developers-with.html
😱21πŸ‘12😁4⚑2πŸ”₯1
Google Settles Location Tracking Allegations.

Starting Dec 1, 2024, Google Maps Timeline data will be stored locally on users' devices, boosting privacy.

Learn more: https://thehackernews.com/2024/06/google-maps-timeline-data-to-be-stored.html
πŸ”₯23πŸ‘8πŸ€”5⚑2
🚨 Alert: Hackers are exploiting legitimate packer software like "BoxedApp" to distribute malware undetected, targeting financial institutions and government agencies.

Read the full story here - https://thehackernews.com/2024/06/hackers-exploit-legitimate-packer.html
😁10😱5πŸ‘4πŸ”₯1
πŸ”’ Password reuse can lead to devastating account takeovers.

Tom's story shows how reusing a strong password across different sites can still expose you to hackers.

Discover the best practices for preventing account takeover attacks: https://thehackernews.com/2024/06/prevent-account-takeover-with-better.html
πŸ‘19πŸ”₯12
πŸ€– Muhstik botnet malware is now exploits CVE-2023-33246 in Apache RocketMQ, targeting IoT devices and Linux servers for DDoS attacks and cryptomining.

Find more details on this ongoing threat here: https://thehackernews.com/2024/06/muhstik-botnet-exploiting-apache.html
πŸ‘14πŸ”₯6😁1
🚨 61% of U.S. businesses were hit by software supply chain attacks last year, causing data breaches, financial losses, and reputational harm.

πŸ”’ Learn how to protect your organization from these critical threats: https://thehackernews.com/2024/06/third-party-cyber-attacks-threat-no-one.html
πŸ”₯17πŸ‘8😁1
New vulnerabilities are disclosed hourly, new exploits for old vulnerabilities are publicly released and threat actors are updating their techniques continuously.

Knowing where and how to prioritize your security resources to achieve the greatest impact with the least time invested is critical.

Join Intruder’s webinar on June 12, 2024, to learn how to get started: https://thn.news/exposure-management-lessons

Can’t make it? Register for the webinar and a copy will be sent.
πŸ‘10πŸ”₯8