The Hacker News
βœ”
151K subscribers
1.85K photos
10 videos
3 files
7.77K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
πŸ”₯ A SonicWall #vulnerability (CVE-2024-40766) is under active exploitation.

This critical flaw allows attackers to bypass access controls and potentially crash firewalls, compromising business operations. Don't wait.

https://thehackernews.com/2024/09/sonicwall-urges-users-to-patch-critical.html

Patch now or risk falling victim.
πŸ‘19πŸ‘7⚑2πŸ”₯2😱1
Two men were indicted for running WWH Club, a dark web marketplace with 350,000+ users selling stolen personal data and hacking services. Despite law enforcement, WWH Club remains active, underscoring the resilience of cybercrime.

Read: https://thehackernews.com/2024/09/fbi-cracks-down-on-dark-web-marketplace.html
πŸ‘12πŸ”₯7πŸ€”5😱4⚑2πŸ‘2
North Korean hackers are targeting developers on #LinkedIn with fake job offers, using coding tests to infect macOS. Once inside, they steal credentials, access code, and drain crypto funds. Social engineering remains a serious cyber threat

Read: https://thehackernews.com/2024/09/north-korean-threat-actors-deploy.html
🀯35πŸ”₯16😁14πŸ‘12πŸ‘7😱5πŸ€”3⚑2
U.S. and allies link Russian hacking group Cadet Blizzard to GRU’s 161st Center.

Targets: NATO, EU critical infrastructure, aiming to sabotage and steal data with WhisperGate malware.

Learn more: https://thehackernews.com/2024/09/us-offers-10-million-for-info-on.html
πŸ‘16πŸ€”10😁6πŸ”₯1
🚨 A new cyber espionage threat, TIDRONE, is targeting drone manufacturers in Taiwanβ€”potentially compromising military operations.

TIDRONE uses custom malware like CXCLNT and CLNTEND to exploit system vulnerabilities and steal sensitive data.

https://thehackernews.com/2024/09/tidrone-espionage-group-targets-taiwan.html
πŸ‘16πŸ‘3πŸ”₯1😁1πŸ€”1
⚠️ Progress Software has released security updates for a critical vulnerability (CVE-2024-7591) in LoadMaster & Multi-Tenant hypervisors, allowing unauthenticated attackers to execute system commands.

https://thehackernews.com/2024/09/progress-software-issues-patch-for.html

Don’t risk your infrastructure. Update systems now!
πŸ”₯12πŸ‘10⚑2
With businesses relying on SaaS tools like Microsoft 365, attackers are targeting platforms like Teams & SharePoint.

Implementing MFA and AI-driven detection is crucial for data resilience.

Ready to defend? Start here: https://thehackernews.com/expert-insights/2024/09/achieving-data-resilience-in-microsoft.html
😁10πŸ‘7πŸ€”2🀯2⚑1
Mustang Panda APT is exploiting VS Code to target Southeast Asian governments. It allows hackers to run commands, steal data, and spread malware via VS Code’s reverse shell.

Read for details: https://thehackernews.com/2024/09/chinese-hackers-exploit-visual-studio.html

Strengthen defenses nowβ€”monitor for these tactics!
πŸ€”5🀯4πŸ‘2
Blind Eagle APT targets Colombia’s insurance sector with custom Quasar RAT via phishing and Google Drive.

Learn more: https://thehackernews.com/2024/09/blind-eagle-targets-colombian-insurance.html

Sensitive data at riskβ€”secure your systems and train employees to spot threats.
😁6🀯3πŸ€”2πŸ‘1
Introducing Wing Security's SaaS Pulseβ€”a FREE tool for continuous SaaS risk management! Stay ahead of risks like leaked credentials & shadow IT with automated monitoring.

Learn more: https://thehackernews.com/2024/09/wing-security-saas-pulse-continuous.html

Start securing your SaaS stack today.
πŸ‘6πŸ€”3😁2πŸ”₯1
Adding more cybersecurity tools increases third-party risk and widens your attack surface. Each new tool can expose you to vendor vulnerabilities.

Rethink your strategyβ€”adopt smarter, holistic approaches for true security.

Learn more: https://thehackernews.com/2024/09/one-more-tool-will-do-it-reflecting-on.html
πŸ‘15😁4🀯4πŸ€”3⚑2πŸ‘1
πŸ”₯ New "RAMBO" attack uses radio signals from a device’s RAM to steal sensitive data, including keystrokes, encryption keys, & biometrics. Attackers can intercept this data with off-the-shelf radio gear.

Learn more: https://thehackernews.com/2024/09/new-rambo-attack-uses-ram-radio-signals.html
πŸ”₯21🀯11πŸ€”8πŸ‘2😱2⚑1
Become a leader in cybersecurity risk management with Georgetown. Learn more in our webinar on September 18.

Sign up: https://thn.news/cyber-risk-webinar-ig
πŸ‘10πŸ€”3⚑2πŸ‘1
FinTech, Healthcare & SaaS thrive on dataβ€”so do cybercriminals.

As digital ecosystems grow complex, non-human identities like API keys and bots are key targets. Secure them to protect sensitive data and build trust.

Learn more: https://thehackernews.com/expert-insights/2024/09/fintech-healthcare-saas-need-non-human.html
⚑7πŸ‘3
Mustang Panda upgrades its #malware arsenal with new tools like FDMTP & PTSOCKET, boosting data theft and espionage across APAC.

Learn how these advanced attacks may impact your organization: https://thehackernews.com/2024/09/mustang-panda-deploys-advanced-malware.html
😁8πŸ‘4
⚑ A new side-channel attack, PIXHELL, exploits audio gaps in air-gapped computers to steal data through LCD screen noises.

By manipulating pixel patterns on the screen, hackers can generate acoustic signals to exfiltrate sensitive data.

Read: https://thehackernews.com/2024/09/new-pixhell-attack-exploits-screen.html
🀯22πŸ‘4πŸ€”4⚑3😁3
🚨 China-linked hackers launch new attacks across SE Asia, codenamed "Crimson Palace."

Using C2 relay points to deliver malware, they exploit trusted networks. New malware like TattleTale is collecting sensitive browser & network data.

https://thehackernews.com/2024/09/experts-identify-3-chinese-linked.html
πŸ‘7🀯4
πŸ”₯ Shadow apps are silently expanding your organization’s attack surface, and most IT teams aren’t even aware.

Proactive measures, like using SSPM, can help security teams detect and mitigate shadow app risks.

Learn more: https://thehackernews.com/2024/09/shining-light-on-shadow-apps-invisible.html
πŸ‘7πŸ”₯6😁2
CosmicBeetle launches ScRansom, new #ransomware hitting SMBs globally. Linked to RansomHub, it targets manufacturing, healthcare, tech & more. Exploits vulnerabilities for sophisticated attacks.

Learn more: https://thehackernews.com/2024/09/cosmicbeetle-deploys-custom-scransom.html
πŸ‘9πŸ”₯3πŸ‘3πŸ€”1
Ivanti issued updates for 10 critical Endpoint Manager vulnerabilities, including CVE-2024-29847 (CVSS 10.0), which allows remote code execution.

Details: https://thehackernews.com/2024/09/ivanti-releases-urgent-security-updates.html

No known exploits yet, but updates are essential. Don't delay!
πŸ‘8πŸ€”6πŸ”₯2😁2
#Microsoft’s September Patch Tuesday addresses 79 vulnerabilities, including 7 critical ones, with 3 under active attack. CVE-2024-43491 (CVSS 9.8) is a major threat with remote code execution risk.

Details here: https://thehackernews.com/2024/09/microsoft-issues-patches-for-79-flaws.html

Patch your systems immediately!
πŸ‘10πŸ‘7πŸ”₯6⚑2😁2πŸ€”1