The Hacker News
βœ”
151K subscribers
1.86K photos
10 videos
3 files
7.77K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
⚠️ Apache Traffic Control usersβ€”an SQL injection flaw (CVE-2024-45387) has been found, enabling attackers to execute commands directly in your database.

This flaw is easily exploitable by sending a specially crafted PUT request.

πŸ”§ How to act now:
Β» Update to version 8.0.2 ASAP.
Β» Audit access permissions for high-risk roles.
Β» Double-check database configurations for security loopholes.

Read: https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html
πŸ‘30😁9🀯8⚑7πŸ”₯7πŸ€”3😱1
A Brazilian hacker faces U.S. charges for extorting $3.2M in Bitcoin after stealing confidential data from 300,000 customers.

Learn more: https://thehackernews.com/2024/12/brazilian-hacker-charged-for-extorting.html
πŸ”₯56πŸ‘19πŸ‘10πŸ€”6⚑3🀯2
🚨 A critical CVE-2024-52046 vulnerability in Apache MINA, scoring a perfect CVSS 10.0, could enable remote code execution.

The flaw lies in Java’s deserialization protocol, leaving systems wide open to attack if improperly secured.

Read now: https://thehackernews.com/2024/12/apache-mina-cve-2024-52046-cvss-100.html
πŸ”₯20😁7πŸ‘6😱3⚑2
πŸ”’ When Devices Turn Against You!

Two dangerous botnetsβ€”FICORA and CAPSAICINβ€”are hijacking vulnerable D-Link routers through known weaknesses.

⚠️ Attack methods include brute force, shell execution, and 12+ DDoS variations.

See how to patch vulnerabilities and prevent attacks here: https://thehackernews.com/2024/12/ficora-and-kaiten-botnets-exploit-old-d.html
πŸ‘18πŸ”₯6😁6⚑3😱3
πŸ”₯ CVE-2024-3393 Alert! A single malicious DNS packet can reboot your Palo Alto firewall and leave your network defenseless.

Important to Know:
Β» This flaw impacts PAN-OS 10.X & 11.X, including Prisma Access.
Β» Repeated attacks could force your firewall into maintenance mode.
Β» Legacy PAN-OS 11.0 users? No fixesβ€”it’s time to upgrade!

βš™οΈ How to Fix:
Β» Update to PAN-OS 10.1.14-h8 or later.
Β» Use workarounds to disable risky logging until upgrades are complete.

Read now: https://thehackernews.com/2024/12/palo-alto-releases-patch-for-pan-os-dos.html
🀯32πŸ”₯9😁7πŸ‘5⚑2πŸ€”1
πŸ›‘ Cloud Atlas is deploying VBShower and PowerShowerβ€”malware that operates in stages, infiltrating networks and harvesting credentials.

πŸ“‚ Quick Actions:
βœ”οΈ Patch outdated vulnerabilities like CVE-2018-0802 immediately
βœ”οΈ Monitor for unusual cloud storage activity
βœ”οΈ Deploy advanced monitoring tools for NTFS file changes.
βœ”οΈ Conduct phishing simulations to bolster employee awareness.

Find details here: https://thehackernews.com/2024/12/cloud-atlas-deploys-vbcloud-malware.html
πŸ€”16πŸ‘10⚑2πŸ”₯2
North Korean hackers are targeting job seekers with a deceptive campaign, deploying a new malware called OtterCookie through fake interview tools.

This new JavaScript malware, is:
Β» Stealing files and cryptocurrency wallets.
Β» Communicating directly with attackers via socket(.)io
Β» Constantly evolving to bypass detection.

πŸ”— Full Report: https://thehackernews.com/2024/12/north-korean-hackers-deploy-ottercookie.html
πŸ”₯26πŸ‘16😁6😱6πŸ‘5⚑1
⚠️ 15,000+ Four-Faith routers are exposed, with attackers actively exploiting a command injection flaw (CVE-2024-12856).

1️⃣ Attackers execute commands remotely via the adj_time_year parameter.
2️⃣ Reverse shells enable hackers to stay hidden and in control.

Read: https://thehackernews.com/2024/12/15000-four-faith-routers-exposed-to-new.html
😱28πŸ‘17πŸ€”5⚑3πŸ”₯2
πŸ›‘ 600,000+ users impacted! A widespread campaign compromised 16+ extensions, including tools for AI and VPNs, using phishing and malicious code injection.

Learn more: https://thehackernews.com/2024/12/16-chrome-extensions-hacked-exposing.html
🀯29πŸ‘15😁11πŸ€”7⚑4πŸ”₯1
What if your password manager or note-taking tool became a hacker’s entry point? Recent attacks on Chrome Store extensions reveal just how exposed your organization might be.

❓ Why It Matters:
Β» Browser extensions are a silent threatβ€”granted access to sensitive data like cookies and identities.
Β» Credential theft can lead to organizational data breaches and compliance nightmares.

πŸ’‘Key Takeaways:
Β» Limit user-installed extensions.
Β» Implement risk-based policies to block risky permissions.
Β» Stay updated on the latest threats.

πŸ”— Check out this guide to learn how: https://thehackernews.com/2024/12/when-good-extensions-go-bad-takeaways.html
πŸ‘21😁11πŸ‘3⚑2πŸ”₯2πŸ€”1😱1
🚨 Are hospitals prepared for the next big cyber attack? The HHS proposes new HIPAA updates to safeguard patient data and critical systems.

πŸ‘‰Proposed Solutions:
πŸ’Ύ Encrypt sensitive data everywhere
πŸ“Š Map assets and identify vulnerabilities
⏱ Set recovery protocols within 72 hours

Read more: https://thehackernews.com/2024/12/new-hipaa-rules-mandate-72-hour-data.html
πŸ‘25⚑7🀯5πŸ”₯2😁1
πŸ›‘ Three flaws in Microsoft Azure's Apache Airflow integration could have let attackers:

🚩 Gain shadow admin access to Kubernetes clusters
πŸ•΅οΈβ€β™‚οΈ Exfiltrate sensitive data
🎯 Deploy undetected malware

πŸ”’ These misconfigurations allow attackers to tamper with logs, deploy privileged pods, and burrow deeper into cloud environmentsβ€”all under the radar.

πŸ“– Learn more: https://thehackernews.com/2024/12/misconfigured-kubernetes-rbac-in-azure.html
😱12πŸ”₯5πŸ‘4⚑2😁2πŸ€”2
🚨 Suspected Chinese state-sponsored hackers breached the U.S. Treasury via a compromised API key from BeyondTrust, a third-party vendor.

πŸ’‘ Here’s what happened:
Β» Attackers gained access to a key securing BeyondTrust’s cloud-based remote support service.
Β» They bypassed security to remotely access Treasury workstations and unclassified documents.
Β» CVE-2024-12356, a critical vulnerability (CVSS 9.8), was actively exploited.

➑️ Read More: https://thehackernews.com/2024/12/chinese-apt-exploits-beyondtrust-api.html
πŸ”₯31🀯9⚑5😁4πŸ‘2πŸ€”2
πŸ”’ Department of Justice has finalized a rule blocking bulk transfers of Americans’ sensitive personal data to adversarial nations like China, Russia, and North Korea.

Β» Data like Social Security numbers, geolocation, biometrics, and health information is now protected.
Β» These countries have used such data for espionage, AI development, and suppressing freedoms.

Read full story here πŸ‘‰ https://thehackernews.com/2024/12/new-us-doj-rule-halts-bulk-data.html
πŸ‘24😁10πŸ”₯7πŸ‘3
The U.S. Treasury just sanctioned two major entitiesβ€”one Iranian and one Russianβ€”for meddling in the 2024 presidential election through AI-powered disinformation campaigns.

Here’s what they did:
πŸ› οΈ Created deepfakes and synthetic content using AI.
🌐 Built a network of 100+ fake news sites to spread misinformation.
πŸ’° Backed by intelligence agencies like Iran's IRGC and Russia's GRU.

Learn the latest tactics πŸ‘‰ https://thehackernews.com/2025/01/iranian-and-russian-entities-sanctioned.html
😁22πŸ‘10😱8πŸ€”3🀯1
⚠️ Click. Click. Hacked?

DoubleClickjacking: A new clickjacking variant that stealthily exploits timing gaps between clicks to hijack accounts.

This attack bypasses protections like X-Frame-Options and SameSite cookies.

Read the article: https://thehackernews.com/2025/01/new-doubleclickjacking-exploit-bypasses.html
🀯42πŸ”₯16πŸ‘6πŸ‘3
🚨 Three Russian-German nationals charged with espionage and sabotage by German prosecutors.

One suspect, Dieter S., allegedly scouted military sites and planned attacks to disrupt Germany's support for Ukraine.

Learn more: https://thehackernews.com/2025/01/three-russian-german-nationals-charged.html
πŸ‘16😁4πŸ”₯3
πŸ”’ A new npm package poses as a vulnerability detector for Ethereum smart contracts but silently installs Quasar RATβ€”a remote access trojan that gives attackers:

πŸ–₯️ Full control over your system
πŸ›‘οΈ Persistence via Windows Registry tweaks
πŸ“‘ Command-and-Control connections to steal data

πŸ”— Read the full analysis: https://thehackernews.com/2025/01/malicious-obfuscated-npm-package.html
πŸ‘30😱8
⚑ Did you know? Cross-domain attackers often stay hidden for weeks before escalating privileges.

Why do attackers thrive? Because fragmented security tools leave gapsβ€”and adversaries like FAMOUS CHOLLIMA are exploiting every one of them.

πŸ’¬ Question: Are your identity systems truly secure, or just compliant?

πŸ’‘ Expert Take: A unified platform transforms identity systems into secure perimeters by:
Β» Closing blind spots with end-to-end visibility.
Β» Integrating seamlessly across cloud, SaaS, and on-prem environments.
Β» Accelerating threat detection for proactive defense.

πŸ‘‰ Learn how to level up your defenses: https://thehackernews.com/2025/01/cross-domain-attacks-growing-threat-to.html

Attackers move fastβ€”your defenses need to be faster.
πŸ‘17πŸ”₯15
⚠️ Researchers have uncovered details of now-patched vulnerabilities in Dynamics 365 and Power Apps Web API that exposed sensitive user data, including emails, financial information, and password hashes.

πŸ”— Learn more: https://thehackernews.com/2025/01/severe-security-flaws-patched-in.html
πŸ‘18πŸ‘7πŸ”₯6😁5⚑3
πŸ”’ Apple will pay $95M to settle claims that Siri accidentally recorded and shared private conversations with third parties.

πŸ“Š Key Details:
Β» Covers Siri-enabled devices from 2014 to 2024.
Β» Claim up to $20 per device (max 5).
Β» Apple introduced new privacy settings, but is it enough?

πŸ”— Get the full story: https://thehackernews.com/2025/01/apple-to-pay-siri-users-20-per-device.html
πŸ”₯29😁13πŸ‘9⚑2πŸ€”1