The Hacker News
โœ”
151K subscribers
1.86K photos
10 videos
3 files
7.77K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: [email protected]

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐ŸŽญ North Korean actors are using fake identities and front companies to secure IT jobs globally. Their income is funneled back to fund DPRKโ€™s WMD and ballistic missile programs.

Learn more: https://thehackernews.com/2024/11/north-korean-front-companies.html
๐Ÿ˜15๐Ÿ‘8๐Ÿคฏ6๐Ÿ˜ฑ6โšก5๐Ÿ‘4
Do your employees keep getting phished with adversary-in-the-middle AitM kits like Evilginx, Nakedpages, and Tycoon? You arenโ€™t the only oneโ€ฆ

Find out why attackers are getting through your anti-phishing controls in the latest webinar from Push Security.

Register for your space here: https://thn.news/phish-kit-webinar-tg
๐Ÿ‘8โšก4๐Ÿ”ฅ2
PAM automates password management and rotation, a simple yet powerful way to prevent breaches.

It minimizes human error, helping you stay ahead of credential-based attacks.

Learn how PAM secures your systems with automated password management: https://thehackernews.com/2024/11/10-most-impactful-pam-use-cases-for.html
๐Ÿ‘9โšก3๐Ÿ‘3
๐Ÿšจ New China-linked APT Gelsemium targets #Linuxโ€”The notorious group has launched a new Linux backdoor, WolfsBane, alongside another malware tool called FireWood, raising cybersecurity alarms.

WolfsBane and FireWood are targeting East & Southeast Asia, exploiting unknown vulnerabilities to steal sensitive data.

Read: https://thehackernews.com/2024/11/chinese-apt-gelsemium-targets-linux.html
๐Ÿ˜ฑ10๐Ÿ‘6โšก4๐Ÿ˜3
Over 145,000 industrial control systems (ICS) are exposed to the internet across 175 countries, with the U.S. leading the pack.

New malware strains like FrostyGoop are leveraging vulnerabilities in Modbus TCP to target exposed ICS devices.

Read โ€” https://thehackernews.com/2024/11/over-145000-industrial-control-systems.html
๐Ÿ‘13๐Ÿ”ฅ5โšก1
๐Ÿšจ THREAT ALERT! Over 2,000 Palo Alto Networks devices have been compromised in an ongoing, widespread attack.

The vulnerabilities, CVE-2024-0012 and CVE-2024-9474, could allow attackers to execute arbitrary code and deploy malware on affected devices.

๐Ÿ”’ Donโ€™t wait for a breachโ€”learn more about this campaign and how to protect your devices: https://thehackernews.com/2024/11/warning-over-2000-palo-alto-networks.html
โšก14๐Ÿ‘4๐Ÿ˜4๐Ÿคฏ4๐Ÿ˜ฑ3
๐Ÿ›ก๏ธโšก Is Your Business Prepared for Certificate Revocations?

Donโ€™t wait for a crisis! Check out our latest webinar to learn how automation can quickly minimize disruptions when certificates are revoked.

Watch NOW and learn how to stay agile: https://thehacker.news/rapid-ssl-certificate
๐Ÿ‘10โšก6
๐Ÿ›‘ Malicious Python packages impersonating AI models like ChatGPT and Claude have been found on PyPI.

Theyโ€™ve been used to deploy a dangerous information stealer, JarkaStealer, which silently harvested sensitive data from victims before erasing all traces.

Discover the full extent of this attack โ€” https://thehackernews.com/2024/11/pypi-attack-chatgpt-claude.html
๐Ÿ‘15๐Ÿ‘8๐Ÿ”ฅ4โšก2๐Ÿ˜1
โœ… Microsoft seized 240 fraudulent websites linked to an Egypt-based cybercriminal behind the ONNX phishing kit.

โœ… The DoJ dismantled PopeyeTools, a marketplace for stolen financial data and fraud tools.

โœ… Meta took down over 2M accounts tied to Southeast Asian pig butchering scam centers.

Find all details here: https://thehackernews.com/2024/11/microsoft-meta-and-doj-disrupt-global.html
๐Ÿ‘17โšก6๐Ÿ”ฅ2๐Ÿ˜2๐Ÿค”2
Russian-linked cyber espionage group TAG-110 is targeting organizations in Central Asia, East Asia, and Europe using sophisticated custom malware tools, HATVIBE and CHERRYSPY.

Learn how to defend against these targeted cyberattacksโ€” https://thehackernews.com/2024/11/russian-hackers-deploy-hatvibe-and.html
๐Ÿ”ฅ18๐Ÿ‘11๐Ÿคฏ5๐Ÿ˜4โšก1๐Ÿ‘1
A China-linked nation-state group named TAG-112 targeted Tibetan media and university websites, using a cyber espionage campaign to deliver the Cobalt Strike post-exploitation toolkit.

Learn more โ€” https://thehackernews.com/2024/11/china-linked-tag-112-targets-tibetan.html
โšก10๐Ÿ‘9๐Ÿ”ฅ4๐Ÿคฏ1
๐Ÿ›‘ Watch out! The threat actor Mysterious Elephant (APT-K-47) is using a new trick: exploiting WinRARโ€™s security flaw to spread malware.

Their latest campaign uses Hajj-themed lures to deceive victims into executing a malicious payload disguised as a Microsoft CHM file.

Learn more about the tactics https://thehackernews.com/2024/11/apt-k-47-uses-hajj-themed-lures-to.html
๐Ÿ‘20โšก5๐Ÿ”ฅ5๐Ÿค”4
Sapphire Sleet, a North Korea-linked threat group, has stolen over $10 million in cryptocurrency through sophisticated social engineering schemes.

Curious how these attacks work? Learn more: https://thehackernews.com/2024/11/north-korean-hackers-steal-10m-with-ai.html
๐Ÿ‘18๐Ÿคฏ6โšก5๐Ÿ”ฅ2๐Ÿ˜ฑ1
Google blocks over 1,000 websites linked to Chinaโ€™s GLASSBRIDGE influence operation.

These fake news sites push pro-China narratives, disguising themselves as legitimate news outlets.

Learn more: https://thehackernews.com/2024/11/google-exposes-glassbridge-pro-china.html
๐Ÿ‘43๐Ÿ˜ฑ11๐Ÿ‘9โšก4๐Ÿ˜4๐Ÿค”4๐Ÿ”ฅ1
This media is not supported in your browser
VIEW IN TELEGRAM
Researchers have uncovered new attack techniques targeting infrastructure-as-code (IaC) and policy-as-code (PaC) tools like HashiCorp's Terraform and Open Policy Agent (OPA), posing a severe risk to cloud platforms.

Learn how this attack works: https://thehackernews.com/2024/11/cybersecurity-flaws-in-iac-and-pac.html
๐Ÿ‘19๐Ÿ”ฅ10โšก2๐Ÿคฏ1
Ever heard of attackers mimicking your device's profile to bypass security? Itโ€™s happening right now.

Modern phishing attacks gather detailed device info to impersonate victims, making detection harder than ever.

Learn more about these advanced techniques: https://thehackernews.com/2024/11/flying-under-radar-security-evasion.html
๐Ÿ‘11๐Ÿ”ฅ9๐Ÿ˜6โšก4๐Ÿคฏ1
Google has just rolled out a new feature called "Restore Credentials," making it easier than ever to securely access third-party apps when transferring data to a new #Android device.

Discover how this feature works. https://thehackernews.com/2024/11/googles-new-restore-credentials-tool.html
๐Ÿ‘21โšก4๐Ÿ‘4๐Ÿ˜4๐Ÿ”ฅ3
๐Ÿšจ A critical security flaw (CVE-2023-28461) impacting Array Networks AG and vxAG gateways has been added to the CISA's Known Exploited Vulnerabilities catalog after reports of active exploitation.

Read more about the flaw, its exploitation: https://thehackernews.com/2024/11/cisa-urges-agencies-to-patch-critical.html
๐Ÿ‘13๐Ÿ”ฅ7
A previously unknown China-linked hacking group, Earth Estries, has been discovered using custom backdoorsโ€”GHOSTSPIDER and MASOL RATโ€”to target Southeast Asian telecoms, #technology companies, and governments.

Read full details: https://thehackernews.com/2024/11/chinese-hackers-use-ghostspider-malware.html
๐Ÿ‘17๐Ÿ˜4
A Russia-aligned hacker group has used zero-day flaws in Firefox and Windows to deliver the RomCom backdoor malware.

The attack requires no user interactionโ€”just visiting a compromised site is enough to trigger the exploit.

Read the full article: https://thehackernews.com/2024/11/romcom-exploits-zero-day-firefox-and.html
๐Ÿ”ฅ30๐Ÿ˜ฑ21๐Ÿ‘5๐Ÿ˜3โšก2๐Ÿค”2๐Ÿคฏ1
Turn strategy into action step-by-step! ๐Ÿ‘‡

Master the 5 stages of the CTEM framework and take your cybersecurity to the next level:

1๏ธโƒฃ Scoping
2๏ธโƒฃ Discovery
3๏ธโƒฃ Prioritization
4๏ธโƒฃ Validation
5๏ธโƒฃ Mobilization

Donโ€™t just react to threatsโ€”stay ahead of them. Learn how XM Cyber can help you operationalize CTEM and secure your organization effectively.

๐Ÿ‘‰ Discover the Guide: https://thn.news/operationalizing-ctem

๐Ÿ’ก Swipe through the carousel to explore each stage in detail! ๐Ÿš€
๐Ÿ‘20๐Ÿ”ฅ4๐Ÿ‘1๐Ÿคฏ1