The Hacker News
βœ”
151K subscribers
1.86K photos
10 videos
3 files
7.77K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
πŸ˜„πŸ˜„ For the first time ever, the European Commission has been fined (Just €400) for violating its own data privacy laws.

The breach involved sending an EU citizen's dataβ€”including IP address and browser metadataβ€”to Meta's servers in the U.S. via "Sign in with Facebook."

Learn more: https://thehackernews.com/2025/01/eu-commission-fined-for-transferring.html
😁67😱8πŸ‘7πŸ‘6⚑5
⚠️ Warning: Over 23,800 GFI KerioControl firewalls are vulnerable to a 1-click RCE flaw (CVE-2024-52875) that gives attackers root access.

πŸ›‘οΈ Update to v9.4.5 Patch 1 and audit your firewall access points immediately.

πŸ‘‰ Full details here: https://thehackernews.com/2025/01/critical-rce-flaw-in-gfi-keriocontrol.html
⚑10πŸ‘5😁4
πŸ›‘ China-linked MirrorFace has targeted Japan’s security and tech sectors in over 4 years of persistent attacks, says NPA & NCSC.

These attackers use spear-phishing, exploit device vulnerabilities, and evade antivirus detection by operating in Windows Sandboxβ€”leaving no trace behind.

πŸ”— Learn the tactics attackers use and how to counter them: https://thehackernews.com/2025/01/mirrorface-leverages-anel-and-noopdoor.html
πŸ”₯10😁5⚑4πŸ‘2πŸ‘2
Advance your skills in strategic security design with Georgetown’s Online Certificate in Cybersecurity Strategy.

Learn more: https://thn.news/cybersecurity-strategy-ig
πŸ”₯16πŸ‘5😁1
🚨 New Threat Alert: Banshee Stealer!

The latest variant targets macOS users and hides its tracks using Apple-inspired encryption.

πŸ’» Targets victims via phishing websites disguised as Google Chrome & Telegram
πŸ’Έ Offered to hackers for $3,000/month under a Malware-as-a-Service model

πŸ”— Read more: https://thehackernews.com/2025/01/new-banshee-stealer-variant-bypasses.html
πŸ‘16⚑4😁4
🚨 Critical flaws found in major platforms:

β€· SonicWall: SSLVPN bypass (CVSS 8.2) & privilege escalation.
β€· Palo Alto Networks: SQL injection exposes passwords & API keys (CVSS 7.8).
β€· Aviatrix: Max severity flaw (CVSS 10.0) allows remote code execution.

πŸ‘‰ Full details: https://thehackernews.com/2025/01/major-vulnerabilities-patched-in.html

Patch systems to secure your organization.
πŸ‘22⚑4πŸ”₯4πŸ€”2🀯2
⚠️ Hackers are impersonating cybersecurity giant CrowdStrike, tricking victims into downloading a cryptominer disguised as a recruitment tool.

πŸ›‘ In a separate campaign, cybercriminals are targeting researchers with a fake PoC for the LDAPNightmare vulnerability (CVE-2024-49113).

πŸ”— Stay informed and learn more: https://thehackernews.com/2025/01/crowdstrike-warns-of-phishing-scam.html
⚑8😁5πŸ‘4
🚨 China-linked RedDelta hackers are targeting Southeast Asia, Mongolia & Taiwan with custom PlugX backdoors in a series of espionage attacks.

β€· New tactic: Using Cloudflare CDN to mask malicious traffic
β€· Spyware deployed: Custom PlugX backdoor

Read: https://thehackernews.com/2025/01/reddelta-deploys-plugx-malware-to.html
πŸ‘15⚑5😁3πŸ€”2
⚠️ A high-severity vulnerability in Samsung's Monkey's Audio decoder (CVE-2024-49415) is putting millions of devices at risk.

πŸ”΄ No user interaction needed – attackers can exploit this flaw remotely, allowing them to execute arbitrary code on your phone.

Update your Samsung device immediately to patch this flaw.

Read details here: https://thehackernews.com/2025/01/google-project-zero-researcher-uncovers.html
πŸ”₯14πŸ‘6⚑5🀯3😱2
This media is not supported in your browser
VIEW IN TELEGRAM
🚨 Shadow AI is hereβ€”and it’s putting your company at risk as employees secretly use AI tools like ChatGPT, transcription apps, and customer support bots.

Identify which apps and AI tools are in use across your organization with Reco’s detection solutionβ€”before they lead to a security incident.

Start securing your apps now: https://thehackernews.com/2025/01/product-review-how-reco-discovers.html
πŸ‘12⚑5
⚑ FunkSec, a rising ransomware group, has already hit 85+ victims, demanding ransoms as low as $10,000. What’s worse? They’re leveraging AI to rapidly evolve their attacks.

With targets like the U.S. and India, FunkSec's motives go beyond moneyβ€”they are blurring the lines between hacktivism and cybercrime.

πŸ‘‰ Learn more: https://thehackernews.com/2025/01/ai-driven-ransomware-funksec-targets-85.html
⚑11πŸ‘8πŸ”₯5
Kick off 2025 with a game plan to grow your MSP’s revenue and deliver outstanding value to your clients.

Join us on January 15 to "10x Your MSP Profits in 2025 with Automated Network Pentesting" and discover how vPenTest can help you set the tone for a successful year.

Save your spot: https://thn.news/webinar-automated-pentesting-2025
πŸ‘6πŸ”₯5⚑3πŸ‘2😁1
πŸ“Š Reporting is broken! Is YOUR cybersecurity reporting still a β€œcheck the box” task?

Clients don’t want to hear about firewall logsβ€”they want to understand how YOU are safeguarding their business.

Find out how to improve it here: https://thehackernews.com/2025/01/taking-pain-out-of-cybersecurity.html
⚑7πŸ”₯4😱3😁2πŸ‘1
πŸ’° How One U.S. Health System Cut Security Costs by 76% ...

πŸ‘‰ The system deployed Elisity with just 2 staff members per site, compared to 14 for traditional segmentation.

⚑ Elisity is a seamless, lightweight solution that integrates with existing switches and works with Cisco, Juniper, and Arista devices, taking less than 30 minutes to deploy without any network downtime.

Get the full details here: https://thehackernews.com/2025/01/hands-on-walkthrough-microsegmentation.html
⚑11πŸ‘7πŸ”₯5😁5πŸ€”5
πŸ›‘ U.S. Justice Department indicts 3 Russian nationals involved in laundering millions through cryptocurrency mixers Blender`io and Sinbad`io.

Full details inside: https://thehackernews.com/2025/01/doj-indicts-three-russians-for.html
⚑19πŸ‘10😱6πŸ”₯3
πŸ”₯ Microsoft has taken legal action against hackers using stolen Azure credentials to exploit AI services like OpenAI and DALL-E for malicious purposes.

Read the full story: https://thehackernews.com/2025/01/microsoft-sues-hacking-group-exploiting.html
😁44πŸ‘25πŸ”₯13πŸ€”7⚑1🀯1
πŸ‘€ Over 4,000 web backdoors hijackedβ€”by registering abandoned domains for as little as $20.

πŸ”‘ Researchers gained control of backdoors targeting government & academic networks in Bangladesh, China, Nigeria, South Korea, and more!

Read now: https://thehackernews.com/2025/01/expired-domains-allowed-control-over.html
😁24πŸ‘12⚑8πŸ”₯8
🚨 New Vulnerability Alert!

CISA has added another critical BeyondTrust flaw to its "Known Exploited Vulnerabilities" catalogβ€”this time, impacting Privileged Remote Access (PRA) and Remote Support (RS).

Attackers are actively exploiting it β€” CVE-2024-12686.

Read more: https://thehackernews.com/2025/01/cisa-adds-new-beyondtrust-flaw-to-kev.html
πŸ‘15πŸ‘4
⚠️ VMware vCenter = Goldmine for Attackers.

Attackers are exploiting root-level access with the β€œvpxuser” account to control ESXi infrastructure. If it’s breached, everything is at risk.

πŸ‘‡ Discover expert tips on strengthening your defenses and preventing catastrophic breaches: https://thehackernews.com/2025/01/ransomware-on-esxi-mechanization-of.html
πŸ‘17πŸ‘3🀯1
A new credit card skimmer targeting WordPress e-commerce sites has been discovered.

β€· Malicious JavaScript code is injected into WordPress databases.
β€· It activates ONLY on checkout pages to steal sensitive payment info.
β€· This stealthy malware evades traditional detection tools, making it a serious threat.

This attack is incredibly difficult to spot, putting your customers' data and your reputation at risk.

πŸ”— Read more: https://thehackernews.com/2025/01/wordpress-skimmers-evade-detection-by.html
πŸ”₯20πŸ‘11🀯8
⚠️ WARNING: Zero-Day Exploit Likely Behind Fortinet Attack.

Attackers created super admin accounts, hijacked SSL VPNs, and moved laterally through networks to extract credentials.

Learn more in the full article: https://thehackernews.com/2025/01/zero-day-vulnerability-suspected-in.html
🀯23πŸ‘8πŸ”₯8πŸ€”3