The Hacker News
152K subscribers
1.87K photos
10 videos
3 files
7.79K links
Official THN Telegram Channel — A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

📨 Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
⚠️ Alert: DigiCert will revoke 83,267 SSL/TLS certificates within 24 hours due to a Domain Control Validation oversight.

This affects 6,807 customers & may cause temporary disruptions in secure communications.

Read: https://thehackernews.com/2024/07/digicert-to-revoke-83000-ssl.html

Ensure your certificates are up-to-date.
🤯27👍14🔥7😁4😱4
Facebook users targeted by scam e-commerce network using fake websites to steal personal and financial data.

The scam involves 608 fake sites, mainly accessed via mobile devices and ad lures on Facebook.

Read: https://thehackernews.com/2024/08/facebook-ads-lead-to-fake-websites.html

Stay vigilant and report suspicious ads.
👍16🤯10🔥5
Google Chrome introduces app-bound encryption for better cookie protection.

This new layer of security aims to prevent information-stealing malware from accessing cookies.

Learn more: https://thehackernews.com/2024/08/google-chrome-adds-app-bound-encryption.html
👍30🔥6😁5
Researchers discovered a new Android trojan, BingoMod, which steals money and wipes devices, complicating recovery and forensic analysis.

Read: https://thehackernews.com/2024/08/new-android-banking-trojan-bingomod.html
👍8🔥7😱6
⚠️ Developers beware: Stack Exchange exploited to push malware-laden Python packages targeting crypto wallets.

This attack steals sensitive data and cryptocurrency, risking individual and organizational security.

https://thehackernews.com/2024/08/hackers-distributing-malicious-python.html
👍6🔥5😱4
Cybersecurity experts emphasize the growing threat of obfuscation techniques used by malware authors.

Obfuscation complicates detection, allowing malware to evade traditional security measures and cause significant harm.

Learn more: https://thehackernews.com/2024/08/obfuscation-there-are-two-sides-to.html
👍10🔥5🤔2😁1
Over a million domains are at risk of being hijacked through the Sitting Ducks attack, a DNS #vulnerability.

The attack is being used by Russian-nexus cybercriminals to serve #malware and conduct spams, affecting over 35,000 domains since 2018.

Read: https://thehackernews.com/2024/08/over-1-million-domains-at-risk-of.html
🤯14👍7🔥7
Researchers report increased abuse of Cloudflare's TryCloudflare service for delivering malware like AsyncRAT and XWorm through phishing emails with deceptive PDFs, exposing businesses to sophisticated cyberattack.

Read: https://thehackernews.com/2024/08/cybercriminals-abusing-cloudflare.html
🤯13👍5🔥5😱4😁1🤔1
Two Russian cybercriminals involved in major financial fraud schemes have been released in a massive prisoner swap.

The exchange included 16 individuals from various countries, underscoring the global stakes.

Read about it here: https://thehackernews.com/2024/08/us-releases-high-profile-russian.html
🔥15👍10😱5🤯21
Researchers uncover new Windows backdoor, BITSLOTH, using BITS for C2 operations.


BITSLOTH can perform various malicious activities, including keylogging and screen capture.

Read: https://thehackernews.com/2024/08/new-windows-backdoor-bitsloth-exploits.html
10🤯6👍3😁3🔥1
A Russia-linked threat actor, APT28, is using a car-for-sale #phishing lure to deliver a new Windows backdoor called HeadLace.

APT28 repurposes tactics from other Russian groups, demonstrating evolving cyber threats.

Read: https://thehackernews.com/2024/08/apt28-targets-diplomats-with-headlace.html
🔥12👍9
A Taiwanese research institute specializing in computing was breached by nation-state hackers linked to China.

The attack involved sophisticated tools like ShadowPad and Cobalt Strike, exploiting outdated software vulnerabilities.

Read: https://thehackernews.com/2024/08/apt41-hackers-use-shadowpad-cobalt.html
👍13🔥8😁1
New Mirai botnet variant targets OFBiz ERP system vulnerability. Exploitation can lead to severe data breaches and business disruption.

Attackers are using directory traversal techniques, exploiting a flaw that was patched in May.

Read: https://thehackernews.com/2024/08/mirai-botnet-targeting-ofbiz-servers.html

Check your ERP systems now. Apply patches immediately.
👍124
New DDoS attack campaign targets Jupyter Notebooks.

Misconfigured Jupyter Notebooks are being exploited, highlighting vulnerabilities in common data science tools.

The attack, named Panamorfi, uses a Java-based tool called mineping to execute TCP flood DDoS attacks, consuming server resources.

Read: https://thehackernews.com/2024/08/hackers-exploit-misconfigured-jupyter.html

Ensure your Jupyter Notebooks are properly configured to prevent exploitation.
🔥16👍9
The U.S. Department of Justice and Federal Trade Commission have sued TikTok for violating children's privacy laws.

TikTok is accused of illegally collecting children's personal information without parental consent, violating COPPA and a prior consent order.

Read: https://thehackernews.com/2024/08/doj-and-ftc-sue-tiktok-for-violating.html
👍34😁9🤔7🔥4😱31🤯1
Evasive Panda compromises an ISP to push malicious software updates.

The group used DNS poisoning to alter update mechanisms, deploying malware on both macOS and Windows systems.

Read: https://thehackernews.com/2024/08/china-linked-hackers-compromise-isp-to.html
👍169🔥4
A new Android banking trojan, BlankBot, is targeting Turkish users to steal financial information.

It performs keylogging, screen recording, and intercepts SMS messages, posing a severe threat to user data.

Read: https://thehackernews.com/2024/08/new-android-trojan-blankbot-targets.html
👍19😁11🔥52
A high-severity vulnerability (CVE-2024-6242) has been found in Rockwell Automation ControlLogix 1756 devices.

Exploiting this vulnerability could lead to unauthorized CIP commands, affecting device configurations and user projects.

Read: https://thehackernews.com/2024/08/critical-flaw-in-rockwell-automation.html
👍13🔥51
Cybersecurity incident response faces major challenges: timely detection, data collection, and coordination.

Quick, effective responses minimize damage. Tools like Wazuh boost readiness through automation and third-party integration.

Learn more: https://thehackernews.com/2024/08/enhancing-incident-response-readiness.html
👍9🤯51🔥1🤔1
Organizations in Kazakhstan are targeted by a new threat cluster, Bloody Wolf, distributing STRRAT malware.

This #malware allows attackers to hijack corporate computers and steal restricted data for as little as $80.

Phishing emails impersonating government agencies trick victims into installing malicious Java files.

Read: https://thehackernews.com/2024/08/kazakh-organizations-targeted-by-bloody.html

Ensure your team is aware of these tactics and bolster email security measures.
👍153🔥1🤯1
Researchers uncover design flaws in Windows Smart App Control and SmartScreen, allowing hackers to bypass security measures and gain system access undetected.

Learn more: https://thehackernews.com/2024/08/researchers-uncover-flaws-in-windows.html
🔥13😁7👍64