The Hacker News
βœ”
151K subscribers
1.86K photos
10 videos
3 files
7.78K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
Researchers uncover a new malware campaign targeting exposed Docker API endpoints to deliver cryptocurrency miners and remote access tools.

Learn more: https://thehackernews.com/2024/06/new-malware-targets-exposed-docker-apis.html
πŸ‘20😱4⚑3
Cybercriminals exploit free software lures, SEO tricks and social engineering tactics to deploy Hijack Loader, Vidar Stealer, and other malware, targeting unsuspecting users.

Read: https://thehackernews.com/2024/06/cybercriminals-exploit-free-software.html
πŸ‘13πŸ”₯7⚑6
EU's controversial proposal to scan private messages for CSAM detection raises alarms for end-to-end encryption.

Signal Foundation president warns of severe risks. Learn more: https://thehackernews.com/2024/06/signal-foundation-warns-against-eus.html
🀯21πŸ‘6πŸ”₯6😱5😁2
Explore the latest trends in SaaS security investment and challenges. Discover how enterprises are enhancing their security strategies to protect critical data and operations.

Read: https://thehackernews.com/2024/06/the-annual-saas-security-report-2025.html
πŸ‘13😱8πŸ”₯5🀯3
🚨 Attention: Researchers uncover security flaws in the Mailcow mail server suite, affecting all versions prior to 2024-04.

These vulnerabilities allow for arbitrary code execution and admin account takeover.

Find details here: https://thehackernews.com/2024/06/mailcow-mail-server-flaws-expose.html
πŸ”₯8😱7😁5πŸ‘4
⚠️ Alert: A new large-scale scam by "markopolo" targets cryptocurrency users with malware-infected applications like Vortax to deliver information stealers such as Rhadamanthys, StealC, and Atomic #macOS Stealer.

πŸ”— Don't fall for itβ€”get details: https://thehackernews.com/2024/06/warning-markopolos-scam-targeting.html
😱10πŸ‘8πŸ”₯4
Void Arachne targets Chinese-speaking users with malicious VPN installers.

This sophisticated attack employs SEO poisoning and promotes compromised MSI files containing nudifiers, deepfake porno-generating software, and AI voice and facial technologies.

https://thehackernews.com/2024/06/void-arachne-uses-deepfakes-and-ai-to.html
😱15πŸ”₯9πŸ‘6😁3
Explore the dangers of Google Tag Manager misconfigurations with real-world examples.

Learn how to safeguard your data and comply with privacy laws.

Read: https://thehackernews.com/2024/06/new-case-study-unmanaged-gtm-tags.html
😁12πŸ‘9😱4πŸ€”3
China-linked cyber espionage group UNC3886 exploits zero-day vulnerabilities in Fortinet, Ivanti, and VMware devices and evading detection with advanced techniques.

Discover how they operate: https://thehackernews.com/2024/06/chinese-cyber-espionage-group-exploits.html
πŸ”₯17😁8πŸ‘6😱1
⚑ Kraken exchange hacked: $3 Million stolen due to zero-day flaw. Researcher exploits bug, extorts company, refuses to return funds.

Read: https://thehackernews.com/2024/06/kraken-crypto-exchange-hit-by-3-million.html

Kraken working with law enforcement, calls actions criminal.
😁37πŸ‘9😱9⚑3πŸ€”3
Discover the latest evasive malware loader, SquidLoader, targeting Chinese organizations via phishing emails. Learn about its advanced anti-analysis techniques and the ongoing threat of loader malware.

Details ➑️ https://thehackernews.com/2024/06/experts-uncover-new-evasive-squidloader.html
πŸ”₯9πŸ‘5😁2🀯2πŸ€”1😱1
πŸ”’ Fickle Stealer, a new Rust-based malware, and AZStealer, an open-source Python stealer, target sensitive data from crypto wallets, browsers, and more through multiple attack chains and exfiltration methods.

Learn more: https://thehackernews.com/2024/06/new-rust-based-fickle-malware-uses.html
πŸ”₯11😱5πŸ‘4😁2
Chinese-linked cyber espionage groups have been uncovered in a long-term infiltration of telecom operators in Asia since 2021, deploying custom malware and stealing credentials.

Read: https://thehackernews.com/2024/06/chinese-cyber-espionage-targets-telecom.html
πŸ”₯10πŸ‘8😱7😁2🀯2
Explore the challenges MSPs face with too many cybersecurity tools and discover how Guardz's unified platform simplifies operations and enhances security.

Read: https://thehackernews.com/2024/06/tool-overload-why-msps-are-still.html
πŸ‘13😁7😱3πŸ€”2πŸ‘1
Researchers uncover 'UEFIcanhazbufferoverflow' (CVE-2024-0762), a security flaw in Phoenix SecureCore UEFI firmware affecting multiple #Intel processor families.

Learn more: https://thehackernews.com/2024/06/researchers-uncover-uefi-vulnerability.html
😁16πŸ‘9😱8πŸ‘1
U.S. bans Kaspersky software over national security concerns, citing Russian government ties. The ban extends to Kaspersky's affiliates, subsidiaries, and parent companies.

Learn about the ban's impact and Kaspersky's response: https://thehackernews.com/2024/06/us-bans-kaspersky-software-citing.html
🀯38πŸ‘18😁10πŸ‘9πŸ€”9😱9πŸ”₯4
⚠️ Alert: SolarWinds Serv-U vulnerability (CVE-2024-28995) is under active exploitation. Urgent update required to protect sensitive data from unauthorized access.

Learn more: https://thehackernews.com/2024/06/solarwinds-serv-u-vulnerability-under.html
πŸ‘10😁7😱6πŸ‘1
🚨 Searching for Google Chrome or Microsoft Teams? Be cautious!

Cybercriminals are exploiting search engines to redirect users to fake websites & distribute trojanized versions of popular apps to spread the Oyster #malware.

Read: https://thehackernews.com/2024/06/oyster-backdoor-spreading-via.html
😁14πŸ‘11😱7πŸ‘2
πŸ“ Beware of ZIP files!

Discover how a new phishing campaign targets Pakistan using military-themed emails to spread PHANTOM#SPIKE, a custom backdoor granting remote system access.

Learn more: https://thehackernews.com/2024/06/military-themed-emails-used-to-spread.html
πŸ”₯11😱9πŸ‘6πŸ€”3🀯1
🚨 New Threat Alert!

Chinese-speaking SneakyChef hackers are targeting government entities worldwide and AI-focused organizations with sophisticated SugarGh0st and SpiceRAT malware.

Get the latest insights β€” https://thehackernews.com/2024/06/chinese-hackers-deploy-spicerat-and.html
πŸ‘14πŸ”₯5🀯5πŸ€”3
Discover the power of SOC Automation Capability Matrix for cybersecurity incident response and workflow automation. Perfect for enhancing your security operations.

Read: https://thehackernews.com/2024/02/how-to-use-tiness-soc-automation.html
πŸ‘18πŸ€”5😱1