The Hacker News
βœ”
151K subscribers
1.86K photos
10 videos
3 files
7.78K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
⚠️ Researchers have uncovered details of now-patched vulnerabilities in Dynamics 365 and Power Apps Web API that exposed sensitive user data, including emails, financial information, and password hashes.

πŸ”— Learn more: https://thehackernews.com/2025/01/severe-security-flaws-patched-in.html
πŸ‘18πŸ‘7πŸ”₯6😁5⚑3
πŸ”’ Apple will pay $95M to settle claims that Siri accidentally recorded and shared private conversations with third parties.

πŸ“Š Key Details:
Β» Covers Siri-enabled devices from 2014 to 2024.
Β» Claim up to $20 per device (max 5).
Β» Apple introduced new privacy settings, but is it enough?

πŸ”— Get the full story: https://thehackernews.com/2025/01/apple-to-pay-siri-users-20-per-device.html
πŸ”₯29😁13πŸ‘9⚑2πŸ€”1
🚨 Critical Update: With Edgio services shutting down, Microsoft is migrating all .NET workloads to Azure Front Door CDNs.

πŸ’‘ Deadline: January 7, 2025.

πŸ‘‰ Scan your codebase and update references today to avoid downtime.

Learn more: https://thehackernews.com/2025/01/critical-deadline-update-old-net.html
πŸ‘18😁6
🚨 Critical Flaws in LDAP Exploited!

A new proof-of-concept exploit, LDAPNightmare, crashes unpatched Windows Servers with one crafted request.

Even worse? RCE attacks are possible with minor tweaks.

Β» CVE-2024-49113 causes DoS attacks.
Β» CVE-2024-49112 allows remote code execution.

What can you do?
βœ… Patch ASAP with Microsoft’s December 2024 updates.
βœ… Monitor RPC calls and suspicious LDAP activity.

πŸ‘‰ Read more: https://thehackernews.com/2025/01/ldapnightmare-poc-exploit-crashes-lsass.html
πŸ”₯27🀯10πŸ‘8😁3
🚨 ALERT: New multi-turn jailbreaking attack, Bad Likert Judge, cleverly bypasses AI safety measures across six major platforms, including AWS, Google, and NVIDIA.

Β» Attack success rates spike by 60% using this technique.
Β» Tested across major platformsβ€”OpenAI, Google, and more.
Β» Categories impacted: hate speech, malware, even weapons.

πŸ‘‰ Explore expert findings: https://thehackernews.com/2025/01/new-ai-jailbreak-method-bad-likert.html
πŸ”₯32πŸ‘5πŸ€”3
🚨 The U.S. Treasury just sanctioned Integrity Technology Group, a Beijing-based cybersecurity firm, for enabling state-sponsored cyberattacks on U.S. entities.

β†ͺ Linked to Flax Typhoon (aka RedJuliett)
β†ͺ Exploited IoT vulnerabilities.
β†ͺ Targeted government agencies, telecoms, and universities.

πŸ”— Read the details: https://thehackernews.com/2025/01/us-treasury-sanctions-beijing.html
😁18πŸ‘9🀯1
shrinked-malware-execution-ezgif.com-optimize.gif
16.2 MB
⚠️ ALERT: PLAYFULGHOST Targets VPN Users!

This powerful backdoor malware deceives users by trojanizing legitimate VPN apps, enabling keylogging, screen/audio capture, and remote shell access.

Learn more: https://thehackernews.com/2025/01/playfulghost-delivered-via-phishing-and.html
πŸ‘24⚑5πŸ€”4😱3
This media is not supported in your browser
VIEW IN TELEGRAM
🚨 A severe flaw in Nuclei (CVE-2024-43405) could let attackers bypass signature checks and inject malicious code. This impacts all versions after 3.0.0β€”scoring a 7.4 CVSS.

Read the analysis and secure your systems πŸ‘‰https://thehackernews.com/2025/01/researchers-uncover-nuclei.html
⚑16😱9πŸ”₯5πŸ‘4
FireScam malware is targeting Android devices by disguising itself as a fake β€œTelegram Premium” app. Once installed, it:

β†ͺ Steals sensitive data (messages, notifications, call logs, credentials)
β†ͺ Blocks legitimate app updates to remain undetected

This malware uses advanced techniques to spy on users and maintain control over devicesβ€”posing a major threat to personal and organizational data.

Get all the details πŸ‘‰ https://thehackernews.com/2025/01/firescam-android-malware-poses-as.html
πŸ‘20πŸ”₯10😱4πŸ€”3😁2
πŸ”’ Critical Alert: Malicious npm packages are impersonating Hardhat tools to steal private keys and mnemonics.

β†ͺ Over 1,000 downloads of a single fake package, active for over a year.
β†ͺ Data is exfiltrated using hardcoded Ethereum addresses.

Open-source dependency complexity is a hacker’s dreamβ€”manual reviews are becoming impossible.

πŸ”§ What You Can Do:
βœ… Double-check every dependency.
βœ… Use tools to audit npm packages.
βœ… Build robust supply chain defenses.

πŸ”— Read the details: https://thehackernews.com/2025/01/russian-speaking-attackers-target.html
πŸ”₯13πŸ‘7🀯4πŸ‘3😱1
🚨 Every second in 2024, cybercriminals attempted 7,000 password attacksβ€”up 75% from last year! Phishing surged 58%, leading to $3.5 billion in losses.

Learn the top strategies to protect your SaaS environment from these relentless threats.

Read here: https://thehackernews.com/2025/01/from-22m-in-ransom-to-100m-stolen.html
πŸ”₯15πŸ‘6⚑3πŸ€”2
India proposes draft Digital Personal Data Protection (DPDP) Rules to empower citizens with data erasure rights, enforce strict security mandates for companies, and impose penalties for non-compliance.

πŸ”’ Your Rights:
➜ Erase data on demand πŸ—‘οΈ
➜ Consent control for how your data is used πŸ“œ
➜ Parental consent for minors’ data πŸ‘Ά

βš™οΈ Business Compliance:
➜ 72-hour breach reporting ⏱️
➜ Annual audits & impact assessments πŸ“‹
➜ Data security: encryption, backups, and access control πŸ”

πŸ’Έ Penalties ➜ Up to β‚Ή250 crore (~$30M) for non-compliance or misuse ⚠️

Explore the details: https://thehackernews.com/2025/01/india-proposes-digital-data-rules-with.html
πŸ‘38πŸ‘13πŸ”₯8πŸ€”8😁7
🚨 Two vulnerabilities (CVE-2024-9138, CVE-2024-9140) impact Moxa's routers, with CVSS scores of 8.6 and 9.3β€”allowing root access and unauthorized command execution.

πŸ”‘ Patch to version 3.14+ immediately.

You can protect your network by:
πŸ›‘ Isolating devices from the internet.
πŸ”— Limiting SSH access to trusted IPs.
πŸ›‘ Enabling strict firewall rules.

➑️ Find out now: https://thehackernews.com/2025/01/moxa-alerts-users-to-high-severity.html
πŸ‘10😁5πŸ‘3
⚠️ CISA says there’s no evidence other federal systems were impacted in the Treasury cyberattackβ€”but the investigation is ongoing.

Attackers exploited BeyondTrust’s Remote Support SaaS API key to access Treasury systems.

πŸ”— Learn More: https://thehackernews.com/2025/01/cisa-no-wider-federal-impact-from.html
😁11πŸ”₯5πŸ‘3
A newly upgraded version of the EAGERBEE malware is actively targeting internet service providers (ISPs) and government entities in the Middle East.

➜ Allows load, unload, or swap plugins in memory on demand.
➜ Linked to state-aligned groups like Cluster Alpha and TA428.
➜ Targets military and political secrets in Southeast Asia.
Harvest network and system data with precision tools.

πŸ”— Read the full report here: https://thehackernews.com/2025/01/new-eagerbee-variant-targets-isps-and.html
πŸ€”12πŸ‘5
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ•―οΈ Legacy MFA, VPNs, and antivirus have all fallen. Why? Attackers outpaced outdated tech.

Key takeaways for decision-makers: Evolve or risk critical vulnerabilities.

➀ Integrated, AI-driven, phishing-resistant tools are non-negotiable.
➀ Zero Trust and passwordless solutions are the path forward.

Cybersecurity tools must outthink attackersβ€”not just block them.

Are your defenses ready for 2025? Find out what’s driving the next wave of innovation: https://thehackernews.com/2025/01/farewell-to-fallen-cybersecurity-stars.html
πŸ”₯14πŸ‘5😁4⚑3🀯1
Researchers reveal Illumina’s iSeq 100 lacks modern security measures, making it vulnerable to privilege escalation and firmware tampering.

Explore the insights here: https://thehackernews.com/2025/01/researchers-uncover-major-security-flaw.html
😁17⚑3
Can you spot hidden threats in encrypted traffic? Most organizations can’tβ€”and that’s exactly how attackers are winning.

In this webinar, Zscaler's Emily Laufer reveals:
πŸ›‘οΈ Advanced tactics to uncover hidden threats
πŸ“ˆ Predictions for ransomware’s 2025 playbook

➑️ Watch the webinar: https://thehacker.news/ransomware-encrypted-attacks
πŸ‘17πŸ€”2
CISA has flagged 3 actively exploited vulnerabilitiesβ€”two in Mitel MiCollab and one in Oracle WebLogic Server.

β€· CVE-2024-41713: Remote access via path traversal.
β€· CVE-2024-55550: Exploited by attackers with admin privileges.
β€· CVE-2020-2883: A high-severity vulnerability in Oracle WebLogic with known exploits.

πŸ‘‰ Don’t waitβ€”secure your systems now: https://thehackernews.com/2025/01/cisa-flags-critical-flaws-in-mitel-and.html
πŸ‘12⚑6
πŸ”₯ The U.S. government has launched the U.S. Cyber Trust Mark, a label for IoT devices that meet rigorous cybersecurity standards.

How it works:
βœ… Devices tested by accredited labs
βœ… QR codes reveal security practices like updates and default password tips

πŸ”— Read: https://thehackernews.com/2025/01/fcc-launches-cyber-trust-mark-for-iot.html

Share your thoughts!
πŸ‘17πŸ”₯8😁4⚑2πŸ‘1
🚨 Over 15,000 infected devices are targeting businesses daily with 100 Gbps DDoS attacks!

A new Mirai botnet variant, dubbed "gayfemboy," is exploiting a critical OS command injection flaw in Four-Faith routers.

βœ… Countries hit hardest: China, Iran, Russia, Turkey, USA
βœ… Vulnerabilities used: over 20 CVEs, including a zero-day.

πŸ”— Full story: https://thehackernews.com/2025/01/mirai-botnet-variant-exploits-four.html
😁19⚑7πŸ‘4