The Hacker News
โœ”
151K subscribers
1.86K photos
10 videos
3 files
7.78K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: [email protected]

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿ›‘ Fortinet's Wireless LAN Manager (FortiWLM) is vulnerable to a path traversal flaw (CVE-2023-34990) with a 9.6/10 CVSS score.

Why itโ€™s urgent: It allows attackers to...
1๏ธโƒฃ Access admin accounts using static session IDs.
2๏ธโƒฃ Execute unauthorized commands by chaining vulnerabilities.
3๏ธโƒฃ Gain root access to your network in minutes.

๐Ÿ› ๏ธ Patch now:
Affected versions: 8.5.0 to 8.6.5.
Fixed in 8.6.6โ€”update immediately.

Read: https://thehackernews.com/2024/12/fortinet-warns-of-critical-fortiwlm.html
๐Ÿ”ฅ15๐Ÿ‘6โšก2๐Ÿค”2
๐Ÿšจ What if your device unknowingly became a tool for cybercrime? Itโ€™s happening now.

Mirai malware strikes Juniper SSR devices, leveraging default passwords to turn them into DDoS attack machines. Over 90% of breached systems had unaltered factory settings.

๐Ÿ”‘ Donโ€™t leave the door open. Secure your systems today.

Read the full report: https://thehackernews.com/2024/12/juniper-warns-of-mirai-botnet-targeting.html
๐Ÿ”ฅ10๐Ÿ‘8๐Ÿ‘4โšก3๐Ÿ˜2๐Ÿค”2
Threat actors are tricking developers with fake npm packages like typescript-eslint lookalikes, amassing thousands of downloads.

Compromised tools = compromised enterprises. One wrong download could breach your entire development cycle.

๐Ÿ”’ Your move:
โœ… Review your dependencies.
โœ… Learn how these attacks work.
โœ… Build a resilient security strategy.

๐Ÿ‘‰ Read here: https://thehackernews.com/2024/12/thousands-download-malicious-npm.html
๐Ÿ‘17๐Ÿคฏ6๐Ÿ‘4โšก2
๐Ÿšจ CISA warns of an actively exploited critical flaw (CVE-2024-12356, CVSS: 9.8) in BeyondTrust's Privileged Remote Access (PRA) and Remote Support (RS) products.

Attackers can exploit this flaw to run arbitrary commandsโ€”no authentication required.

Read: https://thehackernews.com/2024/12/cisa-adds-critical-flaw-in-beyondtrust.html
๐Ÿ˜12๐Ÿ‘9โšก5๐Ÿค”1
๐Ÿ›‘ Attackers are exploiting Fortinet's CVE-2023-48788 (CVSS 9.3) to install remote desktop tools like AnyDesk and ScreenConnect.

Theyโ€™ve already targeted companies across 12 countries, leveraging:

ยป SQL injection for unauthorized access
ยป Password recovery tools like Mimikatz
ยป PowerShell scripts for persistence

Donโ€™t just patch vulnerabilitiesโ€”assume attackers are already inside.

Find details here: https://thehackernews.com/2024/12/hackers-exploiting-critical-fortinet.html
โšก10๐Ÿ‘8๐Ÿ”ฅ6๐Ÿ˜3
๐Ÿ”” Alert: Two critical vulnerabilities in Sophos Firewalls could grant attackers remote code execution and privileged access.

๐Ÿ”ง Action Plan:
โœ”๏ธ Update to v21 MR1 or newer.
โœ”๏ธ Restrict SSH access immediately.
โœ”๏ธ Ensure user portals are not WAN-exposed.

๐Ÿ”— Full advisory here: https://thehackernews.com/2024/12/sophos-fixes-3-critical-firewall-flaws.html
๐Ÿ‘17โšก7๐Ÿคฏ5
The notorious Lazarus Group is targeting nuclear engineers using trojanized VNC tools disguised as job assessments for aerospace roles.

Theyโ€™ve introduced a new modular malwareโ€”CookiePlusโ€”capable of evading top-tier detection systems.

๐Ÿ”— Explore the full story here: https://thehackernews.com/2024/12/lazarus-group-spotted-targeting-nuclear.html
๐Ÿ˜18โšก10๐Ÿ‘9
๐Ÿ”ฅ A dual Russian-Israeli national charged as the mastermind behind LockBit ransomwareโ€”a cyber weapon that caused chaos across 120+ countries and left $500M in illicit profits.

ยป Targeted hospitals, schools, and critical infrastructure.
ยป Gained access to systems using custom malware to disable antivirus.
ยป LockBit is now planning a comeback with version 4.0!

Explore the full story of LockBitโ€™s rise and fall: https://thehackernews.com/2024/12/lockbit-developer-rostislav-panev.html
๐Ÿ‘36๐Ÿ‘12๐Ÿค”8โšก7
๐Ÿ”’ Italy has fined OpenAI โ‚ฌ15 Million for violating GDPR.

Key issues:
ยป Processing user data without legal basis
ยป Failing to notify users about a 2023 security breach
ยป No age verification, exposing kids under 13 to risky content

๐Ÿ”— Full story here: https://thehackernews.com/2024/12/italy-fines-openai-15-million-for.html
๐Ÿ˜44๐Ÿ‘20๐Ÿ”ฅ7๐Ÿคฏ7๐Ÿค”6โšก3๐Ÿ‘3
๐Ÿ”’ A U.S. judge held NSO Group liable for breaching WhatsAppโ€™s terms of service and misusing its servers to silently deploy Pegasus spyware, targeting 1,400 users within a single month.

Learn more: https://thehackernews.com/2024/12/us-judge-rules-against-nso-group-in.html
โšก30๐Ÿ‘9๐Ÿ‘8๐Ÿ”ฅ5๐Ÿ˜3๐Ÿคฏ2๐Ÿ˜ฑ2๐Ÿค”1
๐Ÿšจ Rockstar2FA, a notorious phishing-as-a-service (PhaaS) toolkit, suffered a major collapse on November 11. In its place, FlowerStorm has emerged as the new threat. These tools exploit legitimate services like Cloudflare Turnstile to bypass detection effortlessly.

๐Ÿ“ Key Targets:
ยป Sectors: Engineering, real estate, consulting
ยป Countries: U.S., Canada, UK, Germany, India

If you operate in these industries, youโ€™re already in the crosshairs of attackers. Basic MFA protections are no longer sufficient.

๐Ÿ”— Full story here: https://thehackernews.com/2024/12/rockstar2fa-collapse-fuels-expansion-of.html
โšก14๐Ÿค”9๐Ÿ‘6
๐Ÿšจ Top 10 Cybersecurity Trends for 2025: From AI-powered attacks to zero-day threats & supply chain risks, the future of cyber defense is evolving fast. Are you ready?

๐Ÿ”— Read: https://thehackernews.com/2024/12/top-10-cybersecurity-trends-to-expect.html
๐Ÿ‘16๐Ÿคฏ7โšก2๐Ÿ”ฅ2
๐Ÿ‘จโ€๐Ÿ’ป Is AI rewriting cybersecurity rules? Criminals are using LLMs to create natural-looking malware that evades detection.

๐Ÿ›ก๏ธ Whatโ€™s happening:
ยป 10,000+ malware variants generated at scale.
ยป 88% trick tools like VirusTotal.
ยป Detection systems risk degradation over time.

๐Ÿ”— Learn more: https://thehackernews.com/2024/12/ai-could-generate-10000-malware.html
๐Ÿ˜ฑ12๐Ÿ”ฅ8๐Ÿ‘6๐Ÿ˜6๐Ÿคฏ5
โšก A new remote code execution flaw in Apache Tomcat (CVE-2024-56337) exposes organizations to serious risk.

An uploaded file could turn into malicious JSP codeโ€”resulting in remote code execution.

ยป Affected Versions: Tomcat 9.0.0-M1 to 11.0.1
ยป Java users: Incorrect configurations = higher risk.
ยป Severity? CVE-2024-50379 scored a 9.8 on CVSS!

Details here ๐Ÿ‘‰ https://thehackernews.com/2024/12/apache-tomcat-vulnerability-cve-2024.html
๐Ÿ‘27๐Ÿ˜19๐Ÿคฏ10โšก5๐Ÿ‘3๐Ÿ”ฅ1
๐Ÿšจ CISA has added a high-severity vulnerability in USAHERDS (CVE-2021-44207) to its Known Exploited Vulnerabilities (KEV) catalog. This flaw has an 8.1 CVSS score and allows attackers to execute arbitrary code on affected servers.

Learn more: https://thehackernews.com/2024/12/cisa-adds-acclaim-usaherds.html
๐Ÿ‘14โšก4๐Ÿ˜3๐Ÿ˜ฑ2๐Ÿ”ฅ1
๐Ÿ”’ $308M stolen in a daring crypto heist targeting DMM Bitcoin. North Korean hackers used social engineering and malware to exploit insider access.

๐Ÿ‘‰ Learn More: https://thehackernews.com/2024/12/north-korean-hackers-pull-off-308m.html
๐Ÿ˜ฑ23๐Ÿ”ฅ16๐Ÿ‘9๐Ÿคฏ6โšก4
๐Ÿšจ Charming Kitten strikes again! Iranian hackers deploy a new C++ variant of the infamous BellaCiao malware, targeting machines across Asia.

Learn how BellaCPP operates and prepare your team for emerging threats: https://thehackernews.com/2024/12/irans-charming-kitten-deploys-bellacpp.html
๐Ÿ˜26๐Ÿ‘16๐Ÿคฏ5๐Ÿ”ฅ3๐Ÿค”3
โš ๏ธ Apache Traffic Control usersโ€”an SQL injection flaw (CVE-2024-45387) has been found, enabling attackers to execute commands directly in your database.

This flaw is easily exploitable by sending a specially crafted PUT request.

๐Ÿ”ง How to act now:
ยป Update to version 8.0.2 ASAP.
ยป Audit access permissions for high-risk roles.
ยป Double-check database configurations for security loopholes.

Read: https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html
๐Ÿ‘30๐Ÿ˜9๐Ÿคฏ8โšก7๐Ÿ”ฅ7๐Ÿค”3๐Ÿ˜ฑ1
A Brazilian hacker faces U.S. charges for extorting $3.2M in Bitcoin after stealing confidential data from 300,000 customers.

Learn more: https://thehackernews.com/2024/12/brazilian-hacker-charged-for-extorting.html
๐Ÿ”ฅ56๐Ÿ‘19๐Ÿ‘10๐Ÿค”6โšก3๐Ÿคฏ2
๐Ÿšจ A critical CVE-2024-52046 vulnerability in Apache MINA, scoring a perfect CVSS 10.0, could enable remote code execution.

The flaw lies in Javaโ€™s deserialization protocol, leaving systems wide open to attack if improperly secured.

Read now: https://thehackernews.com/2024/12/apache-mina-cve-2024-52046-cvss-100.html
๐Ÿ”ฅ20๐Ÿ˜7๐Ÿ‘6๐Ÿ˜ฑ3โšก2
๐Ÿ”’ When Devices Turn Against You!

Two dangerous botnetsโ€”FICORA and CAPSAICINโ€”are hijacking vulnerable D-Link routers through known weaknesses.

โš ๏ธ Attack methods include brute force, shell execution, and 12+ DDoS variations.

See how to patch vulnerabilities and prevent attacks here: https://thehackernews.com/2024/12/ficora-and-kaiten-botnets-exploit-old-d.html
๐Ÿ‘18๐Ÿ”ฅ6๐Ÿ˜6โšก3๐Ÿ˜ฑ3