The Hacker News
βœ”
151K subscribers
1.84K photos
9 videos
3 files
7.76K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
Global law enforcement cracked down on LabHost phishing service!

"Operation Nebulae" arrested 32 individuals, including UK masterminds. LabHost ran 40,000 domains, victimizing over 94,000 in Australia.

Details here: https://thehackernews.com/2024/04/global-police-operation-disrupts.html
πŸ‘16😁8
🚨 New #Android malware "SoumniBot" targets users in South Korea by exploiting unique evasion tactics.

Find out how it slips through security cracks πŸ‘‡
https://thehackernews.com/2024/04/new-android-trojan-soumnibot-evades.html
😁8πŸ‘3πŸ”₯2πŸ€”2
πŸ’€ Concerned about malware in PDFs or Office docs?

Sandbox analysis reveals threats (macros, suspicious images, & more) before you click.

πŸ”₯ Discover the power of static analysis: https://thehackernews.com/2024/04/how-to-conduct-advanced-static-analysis.html
πŸ”₯13πŸ‘10😁6
πŸ›‘ Beware: Cybercrime group FIN7 targets U.S. automotive industry with phishing scams to deploy Carbanak #malware.

Read details: https://thehackernews.com/2024/04/fin7-cybercrime-group-targeting-us-auto.html
πŸ‘9🀯5
OfflRouter malware has flown under the radar since 2015, infecting .DOC files within Ukrainian gov networks and leading to potentially confidential documents being exposed.

Details: https://thehackernews.com/2024/04/offlrouter-malware-evades-detection-in.html
πŸ‘17⚑3
πŸ› οΈ Ransomware won't wait, and neither should you.

Discover how Zerto’s Continuous Data Protection can dial back to seconds before an attack, ensuring minimal data loss.

Interested in how it works? Click to learn more: https://thehackernews.com/2024/04/recover-from-ransomware-in-5-minuteswe.html
πŸ‘12πŸ”₯5⚑3
A new threat, 'DuneQuixote', targets Middle Eastern governments with sophisticated evasion tactics and uses a sneaky cross-platform backdoor called CR4T.

πŸ”— Details here: https://thehackernews.com/2024/04/hackers-target-middle-east-governments.html
πŸ”₯10πŸ‘8⚑2😱1
Akira ransomware group has extorted approximately $42 MILLION from over 250 global victims. It is now expanding its reach to target Linux, and VMware ESXi systems.

Read: https://thehackernews.com/2024/04/akira-ransomware-gang-extorts-42.html
πŸ‘15😱10πŸ”₯6πŸ‘4⚑2
Thought your firewall was enough?

Guess again... AiTM phishing, OAuth exploits, SSO attacks...hackers are getting creative targeting cloud identities.

Understand the next wave of cyberattacks – read this article: https://thehackernews.com/2024/04/showcasing-networkless-identity-attacks.html
πŸ‘14⚑1πŸ”₯1
China-linked hacking group Earth Hundun is targeting Asia-Pacific tech, research, and government sectors with advanced malware, including "Waterbear" and its upgraded successor, "Deuterbear."

Details: https://thehackernews.com/2024/04/blacktech-targets-tech-research-and-gov.html
πŸ‘13⚑4😁4
🚨 Urgent: If you use CrushFTP for file transfers, update to the latest version immediately!

A critical flaw is being actively exploited, letting attackers escape Virtual File System (VFS) to access system files.

Click to learn more: https://thehackernews.com/2024/04/critical-update-crushftp-zero-day-flaw.html
πŸ‘15⚑4
Palo Alto Networks reveals more on exploited flaw. Attackers DON'T need device telemetry enabled. This is serious! Update your firewalls ASAP.

Details πŸ‘‰ https://thehackernews.com/2024/04/palo-alto-networks-discloses-more.html
😁18πŸ‘9πŸ”₯3⚑2🀯2
A new variant of RedLine Stealer, an information-stealing malware, has emerged using Lua bytecode to enhance its ability to evade detection. It is being distributed via repositories on GitHub disguised as game cheats.

Details: https://thehackernews.com/2024/04/new-redline-stealer-variant-disguised.html
πŸ‘16πŸ‘8πŸ”₯4⚑2
North Korea-linked hackers, like Emerald Sleet, are using AI, particularly large language models (LLMs), for cyber operations, including spear-phishing, vulnerability research, reconnaissance and creating malicious content.

Details: https://thehackernews.com/2024/04/microsoft-warns-north-korean-hackers.html
πŸ‘17πŸ‘6⚑4😁2
⚠️Windows users, watch out!

Researchers detail a vulnerability in the Windows DOS-to-NT path conversion process which can be exploited by threat actors to gain rootkit-like capabilities, hiding files and processes without admin permissions.

https://thehackernews.com/2024/04/researchers-uncover-windows-flaws.html
😁21πŸ‘7⚑6🀯3😱2
MITRE Corporation hit by nation-state attack exploiting zero-day flaws in Ivanti Connect Secure.

Read: https://thehackernews.com/2024/04/mitre-corporation-breached-by-nation.html
😁24🀯11πŸ‘6πŸ€”2
Companies use 53 (🀯) security solutions on average... yet still get breached. How can we bridge this gap?

Read the latest report: https://thehackernews.com/2024/04/penteras-2024-report-reveals-hundreds.html
πŸ‘10🀯9😁6πŸ€”4⚑2
Ransomware victims, beware of re-victimization!

Orange Cyberdefense finds some organizations are hit multiple times. Reasons include affiliate crossovers and data misuse. Learn how to protect your organization.

Read: https://thehackernews.com/2024/04/ransomware-double-dip-re-victimization.html
πŸ”₯7πŸ‘3
Kaspersky has uncovered a concerning threat actor, ToddyCat, targeting government and military entities.

This group employs a wide range of tools to maintain persistent access and steal data on an "industrial scale."

https://thehackernews.com/2024/04/russian-hacker-group-toddycat-uses.html
πŸ‘18πŸ”₯4
πŸ” Software supply chain breaches are a ticking time bomb. Forget playing defense - it's time to take the offensive against supply chain attackers.

⚑ Join our next cybersecurity webinar to learn battle-tested strategies from the experts.

Register now: https://thehacker.news/supply-chain-threats
πŸ‘20πŸ‘4