The Hacker News
βœ”
152K subscribers
1.87K photos
10 videos
3 files
7.78K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
10 newly discovered flaws in Google’s Quick Share app could allow remote code execution on Windows devices.

These vulnerabilities affect both Android and Windows, potentially enabling attackers to take remote control of the systems.

Read: https://thehackernews.com/2024/08/researchers-uncover-10-flaws-in-googles.html
πŸ‘17😱7😁4πŸ‘3⚑2πŸ”₯2πŸ€”2
Developers, double-check your dependencies!

Researchers have uncovered a malicious Python package, β€œsolana-py,” on PyPI, designed to steal Solana blockchain wallet keys.

This deceptive package mimics the legitimate β€œsolana” API and has already been downloaded over 1,100 times, posing a serious threat to developers and end users.

The package injects malicious code into the "init .py" script, exfiltrating sensitive information to an external domain.

Read: https://thehackernews.com/2024/08/rogue-pypi-library-solana-users-steals.html
πŸ‘23😱12😁5⚑1πŸ€”1
Russian organizations face a new spear-phishing threat, EastWind, using PlugY malware for screen monitoring, keystroke logging, and data theft, endangering sensitive information and security.

Read: https://thehackernews.com/2024/08/russian-government-hit-by-eastwind.html
πŸ‘15⚑9πŸ€”7πŸ”₯1😱1
Major vulnerabilities found in Ewon Cosy+ remote access solution could allow attackers to gain root privileges and hijack VPN sessions.

Attackers can exploit these flaws to decrypt sensitive data and intercept critical network communications.

Read: https://thehackernews.com/2024/08/industrial-remote-access-tool-ewon-cosy.html
πŸ”₯10πŸ‘8⚑2😁1
A critical #vulnerability (CVE-2024-7589) in OpenSSH on FreeBSD could allow attackers to execute code remotely with root privileges.

Learn more: https://thehackernews.com/2024/08/freebsd-releases-urgent-patch-for-high.html

If you're using FreeBSD, update your systems immediately and restart sshd.
πŸ”₯32πŸ‘9🀯4⚑2
Researchers uncover critical flaws in the Chinese Solarman and Deye solar management platformsβ€”potentially allowing hackers to control solar inverters, risking power grid disruptions and compromising sensitive user data.

Learn more: https://thehackernews.com/2024/08/researchers-uncover-vulnerabilities-in.html
πŸ”₯10πŸ‘5🀯4⚑3
AI boom faces reality check: Generative AI still powerful in cybersecurity, enhancing defenses unpredictably. But high costs & expert handling needed. Not a silver bullet, yet reshaping industries.

Read it here: https://thehackernews.com/2024/08/the-ai-hangover-is-here-end-of-beginning.html
😁13πŸ‘8⚑5
🚨 Phishing attacks have surged by 40% in the last year, driven by AI. With AI and Phishing-as-a-Service (PhaaS), cybercriminals can craft targeted phishing campaigns almost instantly, exploiting current events.

Learn more: https://thehackernews.com/2024/08/how-phishing-attacks-adapt-quickly-to.html
😁12πŸ‘9🀯7😱5πŸ€”1
CERT-UA has uncovered a new phishing campaign that disguises itself as the Security Service of Ukraine, spreading malware capable of remote desktop access.

Read: https://thehackernews.com/2024/08/ukraine-warns-of-new-phishing-campaign.html
πŸ‘12😁8πŸ”₯3
πŸ”₯ FBI disrupted the infrastructure of emerging ransomware group Dispossessor. This malware group targeted small-to-mid-sized businesses globally, with 43 victims identified, highlighting the growing risk to less-secure organizations.

https://thehackernews.com/2024/08/fbi-shuts-down-dispossessor-ransomware.html
πŸ‘18😁12
How can organizations ensure their sensitive data is secure?

Data Security Posture Management (DSPM)

Check out Sentra_security's DSPM guide to learn:

πŸ”ΈWhy cloud-first enterprises are adopting DSPM
πŸ”ΈWhat to look for in DSPM tools
πŸ”ΈKey features of DSPM

πŸ‘‰ Read: https://thn.news/sentra-dspm-guide
πŸ‘5πŸ€”5😁2
🚨 Critical security flaws in Microsoft's Azure Health Bot Service could have exposed sensitive patient data across multiple tenants.

Hackers could exploit these to move laterally within customer environments, risking large-scale privacy breaches.

Read: https://thehackernews.com/2024/08/researchers-uncover-vulnerabilities-in_0471960302.html
😁7🀯6πŸ”₯5πŸ‘3
Researchers have uncovered a critical vulnerability, dubbed GhostWrite, in T-Head’s XuanTie C910 and C920 RISC-V CPUs that could allow attackers to gain full access to affected devices.

Read: https://thehackernews.com/2024/08/ghostwrite-new-t-head-cpu-bugs-expose.html
😁9πŸ‘5πŸ”₯5πŸ€”3
China-backed Earth Baku hacker group expands cyber attacks globally, using new #malware (StealthReacher and SneakCross) and tactics to target governments and tech sectors across Europe, Middle East, and Africa.

Learn more: https://thehackernews.com/2024/08/china-backed-earth-baku-expands-cyber.html
πŸ”₯12πŸ‘3πŸ‘3
Ivanti has released critical updates to patch a vulnerability (CVE-2024-7593) in its Virtual Traffic Manager (vTM) that allows authentication bypass and rogue admin creation.

Read: https://thehackernews.com/2024/08/critical-flaw-in-ivanti-virtual-traffic.html

Ensure your systems are secureβ€”apply the patches now.
πŸ‘11⚑3πŸ‘1
Microsoft’s latest Patch Tuesday addresses 90 security vulnerabilities, including 6 zero-days actively exploited in the wild.

Read: https://thehackernews.com/2024/08/microsoft-issues-patches-for-90-flaws.html

Don’t waitβ€”apply the patches now to protect your systems.
πŸ”₯16πŸ‘8πŸ‘4⚑1πŸ€”1
DDoS attacks have increased by 46% in H1 2024, with peak attacks now hitting 1.7 Tbps.

This surge underscores the growing threat landscape, where businesses across all sectors must bolster their defenses.

Read: https://thehackernews.com/2024/08/ddos-attacks-surge-46-in-first-half-of.html
πŸ‘18🀯3😱2
πŸ“’ AnyRun released a new guide on investigating emerging threats!

The service shares hands-on tips on collecting intelligence on the latest malware and phishing threats

πŸ”— Read now https://thn.news/anyrun-emerging-threats
πŸ‘14πŸ”₯2
Maksim Silnikau, the mastermind behind ransomware and exploit kits, including Angler, has been arrested and extradited to the U.S. His malicious software infected over 100,000 devices, causing millions in damages.

Learn more: https://thehackernews.com/2024/08/belarusian-ukrainian-hacker-extradited.html
πŸ‘15πŸ”₯11⚑4
A new social engineering campaign by the Black Basta ransomware group targets users with credential theft and malware attacks, using fake IT support calls via Microsoft Teams to trick them into downloading software like AnyDesk.

Read: https://thehackernews.com/2024/08/black-basta-linked-attackers-targets.html
😁14πŸ‘7πŸ”₯4😱4⚑2πŸ‘2
A new Gafgyt botnet variant is exploiting weak SSH passwords to mine cryptocurrency using compromised GPU power.

Read: https://thehackernews.com/2024/08/new-gafgyt-botnet-variant-targets-weak.html

Secure your servers nowβ€”implement strong SSH passwords and continuous monitoring.
πŸ”₯10⚑4πŸ‘2