The Hacker News
βœ”
151K subscribers
1.85K photos
10 videos
3 files
7.77K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
Discover how Zero Trust, immutable backups, and encryption can secure Microsoft365β€”starting with Zero Trust, where every access request is verified.

Learn key strategies to protect your environment.

Read the full article now: https://thehackernews.com/expert-insights/2024/12/5-strategies-to-combat-ransomware-and.html
πŸ‘16
🚨 A new surveillance tool, EagleMsgSpy, has been exposed as a powerful spyware linked to Chinese police departments, secretly collecting vast data from mobile devices since 2017.

πŸ”— Read full details here: https://thehackernews.com/2024/12/chinese-eaglemsgspy-spyware-found.html
⚑16πŸ‘11🀯9πŸ€”4πŸ”₯1
⚑ WEBINAR ALERT: SaaS apps are transforming businessβ€”but are they secure?

Join KPMG Canada & AppOmni to learn how to protect your data from risks.

Register now: https://thehackernews.uk/saas-appsec-cyber-risk
πŸ‘12πŸ‘4πŸ€”2
πŸ”’ ZLoader #malware is backβ€”with a stealthy upgrade. The latest version employs DNS tunneling for encrypted communication, raising the stakes for detection efforts.

This isn’t just an update; ZLoader now includes an interactive shell capable of executing over a dozen commands, a game-changer for #ransomware attacks.

Dive into the details. https://thehackernews.com/2024/12/zloader-malware-returns-with-dns.html
πŸ”₯15πŸ‘8🀯2
🚨 A security flaw, dubbed AuthQuake, in Microsoft’s Multi-Factor Authentication (MFA) allowed attackers to bypass protection within an hour – no alerts, no interaction required.

Get the full story here: https://thehackernews.com/2024/12/microsoft-mfa-authquake-flaw-enabled.html
πŸ”₯18😱7πŸ‘6
This media is not supported in your browser
VIEW IN TELEGRAM
🚨 A trusted Windows feature, UI Automation, can be exploited by #malware to bypass EDR detection, execute stealthy commands, and steal data undetected.

πŸ”— Explore how this attack works: https://thehackernews.com/2024/12/new-malware-technique-could-exploit.html
πŸ‘20πŸ”₯5🀯4⚑3😁2
A Russian state-sponsored group, Secret Blizzard, is leveraging other hackers’ #malware to deploy its tools in Ukraine, raising the stakes in cyber warfare.

Read the full story: https://thehackernews.com/2024/12/secret-blizzard-deploys-kazuar-backdoor.html
πŸ‘14😁9πŸ”₯7🀯4😱3πŸ‘2⚑1
🚨 Operation PowerOFF β€” Global law enforcement just shut down 27 DDoS-for-hire platforms, dismantling major stresser services used by cybercriminals to disrupt websites.

Over 300 users and 3 admins are under investigation, with arrests made in France and Germany.

Read: https://thehackernews.com/2024/12/europol-dismantles-27-ddos-attack.html
πŸ”₯27πŸ‘4⚑3😱2
Did you know? Your team could be using dozens of SaaS tools you’re unaware ofβ€”right now!

Unapproved apps, duplicate tenants, and risky OAuth grants are just the tip of the iceberg. Discover how Nudge Security is revolutionizing SaaS visibility and governance.

Read more about the solution here: https://thehackernews.com/2024/01/what-is-nudge-security-and-how-does-it.html
πŸ‘23
Critical flaw in Hunk Companion plugin (CVE-2024-11972, CVSS: 9.8) allows attackers to install vulnerable plugins, potentially leading to Remote Code Execution (RCE), SQL Injection, and administrative backdoors.

Over 10,000 WordPress sites are at risk. Learn steps to secure your site now: https://thehackernews.com/2024/12/wordpress-hunk-companion-plugin-flaw.html
πŸ‘19πŸ”₯3
[Free] Cloud Risk Self-Assessment Checklist

Ready to secure your cloud? Easily evaluate and uncover cloud risk with this simple checklist to help strengthen your security posture.

Downlod Checklist: https://thn.news/cloud-risk-checklist
πŸ‘13πŸ”₯4🀯2⚑1πŸ‘1
🚨 Apple's TCC framework #vulnerability exposed!

A now-patched flaw (CVE-2024-44131) allowed unauthorized apps to access sensitive data like Health info, microphone, and #iCloud backupsβ€”without users knowing.

Learn more: https://thehackernews.com/2024/12/researchers-uncover-symlink-exploit.html
😁14😱10πŸ‘4⚑2πŸ”₯2πŸ€”1
Gamaredon, a Russian-linked hacking group, targets mobile devices with BoneSpy and PlainGnome, #spyware stealing SMS, call logs, location, and photos in former Soviet states.

Find details here: https://thehackernews.com/2024/12/gamaredon-deploys-android-spyware.html
😁14πŸ‘9⚑5πŸ”₯5
Over 296,000 Prometheus Node Exporter instances and 40,300 servers are publicly accessible, exposing sensitive credentials and API keys.

Read the full article: https://thehackernews.com/2024/12/296000-prometheus-instances-exposed.html
πŸ€”17⚑10πŸ‘5
U.S. DoJ dismantles Rydox marketplace, seizes $225K in cryptocurrency, arrests three Kosovo nationals for selling stolen data and cybercrime tools, impacting 18,000 users.

Read the story: https://thehackernews.com/2024/12/fbi-busts-rydox-marketplace-with-7600.html
😁16πŸ”₯8⚑5πŸ‘5
🚨 New Malware Alert: PUMAKIT, a #Linux rootkit, employs advanced stealth tactics to evade detection and escalate privileges.

It’s not just hiding filesβ€”it’s altering core system behavior while remaining invisible to system tools.

Learn how PUMAKIT operates πŸ‘‰ https://thehackernews.com/2024/12/new-linux-rootkit-pumakit-uses-advanced.html
πŸ”₯17πŸ‘8😱5⚑2😁2
πŸ”₯ Iranian-linked IOCONTROL malware exploits IoT and OT devices, targeting SCADA systems and fuel infrastructure with advanced evasion tactics like MQTT and DNS-over-HTTPS.

πŸ”— Learn how this sophisticated malware operates https://thehackernews.com/2024/12/iran-linked-iocontrol-malware-targets.html
⚑24😁6πŸ€”6πŸ‘4πŸ‘4😱4πŸ”₯2
🚨 U.S. DoJ indicts 14 North Koreans for a $88M IT fraud scheme involving identity theft, extortion, and data breaches. $2.26M seized and a $5M reward announced for tips.

Learn more: https://thehackernews.com/2024/12/doj-indicts-14-north-koreans-for-88m-it.html
πŸ‘21πŸ”₯7🀯4😁2⚑1
πŸ›‘οΈ Critical OpenWrt #vulnerability (CVE-2024-54143) discovered β€” With just a 12-character hash collision, attackers can replace legitimate firmware with a malicious alternative, all without authentication.

Discover the technical details: https://thehackernews.com/2024/12/critical-openwrt-vulnerability-exposes.html
🀯15πŸ‘12πŸ”₯7😱6😁2⚑1
🚨 Why Do Great Companies Still Get Breached? Advanced solutions don’t always mean advanced protection.

πŸŽ™οΈ Join Silverfort’s CISO, John Paul Cunningham, as he explores:
βœ“Common vulnerabilities often overlooked, even with advanced solutions
βœ“How attackers bypass traditional defenses
βœ“ Practical strategies to address hidden risks and blind spots

πŸ“… 16 December, 2024

πŸ‘‰ Don’t miss outβ€”Reserve your spot for this exclusive webinar: https://thehacker.news/ciso-perspective-data-breaches

πŸ’¬ β€œStrengthening defenses isn’t just about toolsβ€”it’s about strategy.”
πŸ‘19πŸ”₯5⚑3πŸ€”2
"United States Department of Justice.pdf" – Legit? Think Again!

New Backdoor Targeting Thai Officials. Hackers are deploying a stealthy backdoor, Yokai, by disguising malware as trusted documents.

🎯 What happened? DLL side-loading enables attackers to bypass defenses.

πŸ’‘ Backdoor connects to attacker-controlled servers for total system control. Without proactive measures, businesses risk breaches that cost millions.

Here’s what you can do NOW:
1️⃣ Train teams on spotting spear-phishing lures.
2️⃣ Audit systems for DLL side-loading vulnerabilities.
3️⃣ Strengthen your endpoint defenses.

Find details here: https://thehackernews.com/2024/12/thai-officials-targeted-in-yokai.html
πŸ‘22⚑5πŸ”₯4😁2