The Hacker News
βœ”
151K subscribers
1.84K photos
9 videos
3 files
7.75K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
⚠️ Singapore authorities arrest six individuals, including five Chinese nationals, linked to a global #cybercrime syndicate.

Laptops, phones, cash & over $850,000 in #cryptocurrency seizedβ€”showing the scale of the operation.

Learn more: https://thehackernews.com/2024/09/singapore-police-arrest-six-for-alleged.html
🀯11πŸ‘7πŸ‘4😱3
Passwords are riskyβ€”80% of breaches stem from weak or reused credentials. Passwordless isn’t a cure-all. Legacy systems & biometric privacy pose challenges.

Strengthen security with strong passwords + MFA.

Act now: https://thehackernews.com/2024/09/why-is-it-so-challenging-to-go.html
😱8πŸ‘3πŸ”₯2πŸ‘2😁2🀯1
πŸ”΄ A "Chinese-speaking actor" is behind DragonRank, targeting IIS servers with BadIIS malware for SEO fraud.

Multiple industries, from healthcare to IT, are affected through vulnerable web apps like WordPress and phpMyAdmin.

Learn more: https://thehackernews.com/2024/09/dragonrank-black-hat-seo-campaign.html
πŸ‘6πŸ€”5⚑4😁2
πŸš€ vPenTest is the G2 Leader for Network Penetration Testing! πŸš€

Trust isn’t given, it’s earnedβ€”and vPenTest from Vonahi Security has proven its worth! Thanks to outstanding reviews and high ratings from real users on G2, we’ve secured the top spot for Network Penetration Testing.

Want to see why? Experience the power of automated pentesting!

Schedule a free demo > https://thn.news/vpentest-network
πŸ€”10πŸ‘9⚑3
⚠️ Quad7 botnet is rapidly compromising SOHO routers and VPNs from TP-LINK, Zyxel, Asus, and NETGEAR. Its new stealthy backdoor increases risks for businesses, especially with remote work setups.

Learn more: https://thehackernews.com/2024/09/quad7-botnet-expands-to-target-soho.html
🀯11⚑3πŸ‘3πŸ€”3
Starting Oct 1, 2024, WordPress~org will mandate 2FA for accounts updating plugins/themes due to rising attacks on repositories. SVN passwords will add another layer of protection by securing commit access without exposing main credentials.

https://thehackernews.com/2024/09/wordpress-mandates-two-factor.html
πŸ‘17πŸ‘6⚑4πŸ”₯1
Ireland’s Data Protection Commission (DPC) has launched a cross-border inquiry into Google’s AI model (PaLM 2) to investigate compliance with data protection laws.

Learn more: https://thehackernews.com/2024/09/irelands-watchdog-launches-inquiry-into.html
πŸ‘6πŸ€”6⚑2😁2
⚠️ Iranian APT OilRig is targeting Iraqi government networks with new malware Veaty and Spearal, using DNS tunneling and email-based C2 channels to infiltrate systems.

Learn more: https://thehackernews.com/2024/09/iranian-cyber-group-oilrig-targets.html
πŸ‘7πŸ€”4πŸ‘3🀯3⚑2
SaaS adoption is skyrocketing, but so are blind spots and third-party risks.

πŸ”Ž Visibility is the key to identifying and mitigating these risks. Every layer of your SaaS ecosystem must be accounted forβ€”are you aware of every app in use?

Learn more: https://thehackernews.com/expert-insights/2024/09/how-confident-are-you-that-your.html
😁8⚑2πŸ‘1
πŸ”₯ Selenium Grid Targeted for Crypto Mining!

Default no-auth settings make it a prime target for attackers injecting crypto miners and proxyjacking scripts.

Learn more: https://thehackernews.com/2024/09/exposed-selenium-grid-servers-targeted.html
😁6πŸ”₯5πŸ‘4πŸ€”2
AI’s potential is limitless, but only if we can trust it.

Their unpredictability introduces significant concerns, mainly regarding data security and privacy.

How can developers ensure their AI products are not just innovative, but safe?

Find out in this blog by Sentra’s CTO and Co-Founder, Ron Reiter: https://thn.news/ai-data-privacy-tips
⚑11πŸ‘4😁3πŸ€”1
🚨 Alert: Over 1.3M Android TV Boxes Compromised by New 'Vo1d' Malware.

This backdoor installs harmful apps undetected, targeting vulnerable OS versions. Businesses with unmonitored devices may unknowingly be affected

Read: https://thehackernews.com/2024/09/beware-new-vo1d-malware-infects-13.html
πŸ€”12πŸ‘3🀯3
⚠️ New threat actor IntelBroker is selling data from Apple, Space-Eyes, & Facebook.

Cato CTRL's investigation reveals how deeply cybercriminals are embedded in hacking forums. If these giants can be compromised, so can anyone.

Read: https://thehackernews.com/2024/09/top-3-threat-report-insights-for-q2-2024.html
πŸ”₯8😁5πŸ‘2
GitLab has just released patches for 17 vulnerabilities, including a critical flaw (CVE-2024-6678) with a CVSS score of 9.9/10.

This flaw could allow attackers to execute pipeline jobs as arbitrary users, posing a severe risk to your development environments.

This is the fourth critical flaw GitLab has patched in the past year.

Learn more: https://thehackernews.com/2024/09/urgent-gitlab-patches-critical-flaw.html

Don’t wait for an exploitβ€”apply the update today!
πŸ‘10πŸ‘7🀯6😁2πŸ”₯1
πŸ” Researchers have uncovered Ajina.Banker, a new #Android malware that steals financial data and intercepts 2FA via #Telegram.



It spreads through fake apps, targeting users across Central Asia.



Find details here: https://thehackernews.com/2024/09/new-android-malware-ajinabanker-steals.html



Double-check app sources and educate clients on mobile security best practices.
πŸ‘16⚑7😁2
πŸ”’ Just-in-time access in Privileged Identity Management (PIM) faces scrutiny for security gaps. Attackers know how to exploit it, making "just-in-time" feel like "all-the-time" access.

Learn more: https://thehackernews.com/expert-insights/2024/09/privileged-identity-management-pim-for.html
πŸ€”10🀯4πŸ‘3
🚨 A new Linux malware, "Hadooken," is exploiting weak credentials and vulnerabilities in Oracle Weblogic to deploy cryptocurrency miners and DDoS botnets.

https://thehackernews.com/2024/09/new-linux-malware-campaign-exploits.html

The malware uses Python and shell scripts to spread laterally, creating a persistent threat.
πŸ‘16😁10πŸ€”9😱3πŸ‘2
⚠️ Cybercriminals are exploiting PoC exploits for two critical vulnerabilities (CVE-2024-6670, CVE-2024-6671) in WhatsUp Gold, with attacks starting just 5 hours after the PoC release.

Details here: https://thehackernews.com/2024/09/progress-whatsup-gold-exploited-just.html

Patch your systems NOW to avoid becoming a target!
🀯7😁6⚑3πŸ‘3πŸ€”3
New TrickMo variant uses advanced evasion to steal credentials & intercept 2FA codes.

It deploys fake login screens, keylogging, & screen recording to target banking users.

https://thehackernews.com/2024/09/trickmo-android-trojan-exploits.html

It also exploits #Android's Accessibility Services for full device control.
πŸ”₯12πŸ‘4πŸ€”4😁2⚑1
A 17-year-old was arrested after launching a #cyberattack on TfL, exposing the sensitive data of thousands.

This isn't an isolated eventβ€”groups like Scattered Spider are exploiting cloud infrastructures, especially in finance and insurance.

Read: https://thehackernews.com/2024/09/17-year-old-arrested-in-connection-with.html
😁15πŸ‘7πŸ”₯6⚑3πŸ‘2
Phishing causes over 80% of unauthorized access. Traditional defenses, like MFA, are vulnerable as attackers bypass them. Beyond Identity’s deterministic security eliminates phishable credentials like passwords and OTPs for stronger protection.

https://thehackernews.com/2024/09/say-goodbye-to-phishing-must-haves-to.html
😁10πŸ‘6πŸ€”3