The Hacker News
152K subscribers
1.87K photos
10 videos
3 files
7.78K links
Official THN Telegram Channel — A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

📨 Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
Twilio reports a data breach exposing 33 million Authy phone numbers, urges users to update apps and stay vigilant against phishing.

Details here > https://thehackernews.com/2024/07/twilios-authy-app-breach-exposes.html
😱22👍9🔥5😁51🤔1
Global police operation disrupts cybercrime networks, shuts down 600 servers linked to Cobalt Strike cyberattacks, and arrests 54 for elderly fraud schemes.

Learn more: https://thehackernews.com/2024/07/global-police-operation-shuts-down-600.html
🔥23👍14👏5😁31
⚠️ Attention IT Pros!

#Microsoft reveals critical vulnerabilities in Rockwell Automation PanelView Plus. Unauthenticated attackers could exploit these to execute code remotely or trigger DoS attacks.

Read: https://thehackernews.com/2024/07/microsoft-uncovers-critical-flaws-in.html
🔥11👍106👏2🤔2😁1
Discover the advanced Zergeca botnet capable of powerful DDoS attacks, proxying, scanning, and more, targeting major countries and using stealthy communication methods.

Read: https://thehackernews.com/2024/07/new-golang-based-zergeca-botnet-capable.html
🔥169👍8🤔2
Did you know? Polyfill supply chain attack impacts 380,000+ hosts, affecting major brands like WarnerBros, Hulu, and Mercedes-Benz. The Hetzner network is hit hardest, redirecting users to adult and gambling sites.

Learn more: https://thehackernews.com/2024/07/polyfillio-attack-impacts-over-380000.html
👍9😱9😁64🔥1
🚨 GootLoader malware evolves with new versions, using SEO poisoning and disguised payloads to compromise systems.

Learn about its latest threats and tactics: https://thehackernews.com/2024/07/gootloader-malware-delivers-new.html
😁104👍1🤔1
🛡️ Webinar Alert: Critical ITDR Capabilities Every Professional Must Know.

Join us to learn about the key features that ensure robust identity protection. Get real-life scenarios and actionable tips.

Register now: https://thehacker.news/securing-digital-identity

Don't miss this exclusive webinar.
👍13👏113
Learn about Continuous Threat Exposure Management (CTEM) and how it enhances cybersecurity by improving visibility, vulnerability management, and validation.

Learn more: https://thehackernews.com/2024/07/blueprint-for-success-implementing-ctem.html
👍12🔥104
⚠️ A recent DDoS attack reached a staggering 840 million packets per second, according to OVHcloud.

MikroTik routers played a significant role, with many compromised devices amplifying the attack.

Read: https://thehackernews.com/2024/07/ovhcloud-hit-with-record-840-million.html
🤯45😱13👍118😁5🔥2
Apple removes 25 VPN apps, incl. ProtonVPN, Red Shield, NordVPN, & Le VPN, from Russian App Store following government request, sparking concerns over digital freedom and escalating censorship.

Read details: https://thehackernews.com/2024/07/apple-removes-vpn-apps-from-russian-app.html
🤯52😱22👍8😁6🤔5🔥43👏3
Four unpatched Gogs Git flaws (CVE-2024-39930 to 39933) let attackers breach instances, steal/modify code, or plant backdoors.

Read more: https://thehackernews.com/2024/07/critical-vulnerabilities-disclosed-in.html

~7,300 exposed instances; 60% in China. Users urged to disable SSH and registration.
15🔥8👍7🤯2🤔1
Experts report a surge in Mekotio trojan attacks in Latin America. It installs via MSI files and AHK scripts, stealing banking information through fake pop-ups, keystroke logging, and screenshots.

Learn more: https://thehackernews.com/2024/07/experts-warn-of-mekotio-banking-trojan.html
🔥6😱6👍3
Cybersecurity Disconnect — Only 5% of CISOs report to CEOs; 2/3 are 2 levels down.

Learn key strategies for CISOs to bridge the communication gap with boards, justify cybersecurity budgets, and report risks effectively.

Read: https://thehackernews.com/2024/07/5-key-questions-cisos-must-ask.html
👍12🤯3
Eldorado, a new ransomware-as-a-service (RaaS), targets Windows and Linux systems using Golang, Chacha20, and RSA-OAEP for encryption.

Learn about its capabilities, victims, and the growing ransomware landscape: https://thehackernews.com/2024/07/new-ransomware-as-service-eldorado.html
🔥12👍7🤯1
🚨 Analysis of malware logs on the dark web uncovered 3,300+ users child abuse material consumers. Notably, 4.2% had multiple credentials, indicating persistent offenders.

Read: https://thehackernews.com/2024/07/dark-web-malware-logs-expose-3300-users.html
🤯11🤔8👍3
New APT group CloudSorcerer targets Russian govt entities using #Microsoft Graph, Yandex Cloud, & Dropbox for C2, with GitHub as an initial C2 server, adapting its behavior dynamically based on host processes like mspaint.exe.

Learn more: https://thehackernews.com/2024/07/new-apt-group-cloudsorcerer-targets.html
🔥15👍8😁4🤔4🤯4👏2
Unknown threat actors are spreading trojanized jQuery via npm, GitHub, and jsDelivr in a complex supply chain attack.

Malware hides in the seldom-used 'end' function of jQuery, used by 'fadeTo'.

Learn more: https://thehackernews.com/2024/07/trojanized-jquery-packages-found-on-npm.html
🤔12🤯7👍4
🌏 Global cybersecurity agencies warn about China-linked APT40's rapid exploit adaptation, targeting vulnerabilities in widely-used software across multiple countries.

Learn more: https://thehackernews.com/2024/07/cybersecurity-agencies-warn-of-china.html
😁10👍64🔥1
🚨 Ongoing GuardZoo surveillance targets Middle East military via Android malware. Initiated Oct '19 by Houthi-aligned group, over 450 victims in Yemen, Egypt, Oman, Qatar, Saudi Arabia, Turkey, UAE.

Learn more: https://thehackernews.com/2024/07/guardzoo-malware-targets-over-450.html
👍13🔥12😱4👏1
Researchers reveal Jenkins Script Console vulnerability exploited for crypto mining. Learn about the risks and how to protect your CI/CD infrastructure.

Learn more: https://thehackernews.com/2024/07/hackers-exploiting-jenkins-script.html
🔥10👍7
⚠️ New BlastRADIUS flaw in RADIUS protocol allows MitM attacks, bypassing integrity checks.

Attackers can modify Access-Request packets undetected, forcing user auth.

https://thehackernews.com/2024/07/radius-protocol-vulnerability-exposes.html

ISPs & orgs must update RADIUS servers, use TLS/IPSec, and avoid PAP/CHAP methods.
🤯13👍6🔥61😁1