The Hacker News
152K subscribers
1.87K photos
10 videos
3 files
7.79K links
Official THN Telegram Channel — A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

📨 Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
Gartner predicts that by 2025, lack of talent or human failure will cause more than 50% of significant cyber incidents.

The solution? Workflow automation.

Get the Essential Guide to Workflow Automation from Tines for an in-depth look into:

💡 The evolution of workflow automation and AI
💡 Common misconceptions about automation (and debunking them)
💡 Best practices for finding success with automation - including insights from Mars and Elastic

Get the guide today to learn how your security team can use AI-powered workflow automation to its full potential, to improve incident readiness and operate more efficiently.

Read the guide now: https://thn.news/workflow-sec-guide
👍10🤔7😱6👏2🤯1
🔎 If you're looking for a malware sandbox with free unlimited access to Windows 10 x64 VM, try ANYRUN

It not only detects threat in <40s, but also lets you interact with your samples and the VM

Sign up and launch your analysis ➡️ https://thn.news/malware-analysis-sandbox
🔥20👍121👏1🤔1
Critical Alert! Pro-Houthi hackers are targeting humanitarian organizations in Yemen with sophisticated Android spyware, posing severe risks to aid efforts and security.

Get the full report and stay protected: https://thehackernews.com/2024/07/pro-houthi-group-targets-yemen-aid.html
👍9🔥6👏5🤔4
🚀 🔒 SaaS tools boost productivity but also expand the attack surface. Nudge Security offers a solution: discover app usage, compare security profiles, and manage costs effectively.

Details here: https://thehackernews.com/2024/07/how-to-reduce-saas-spend-and-risk.html

Empower your team with better insights and governance.
👍9🔥3😁3
🔐 New Threat! Play ransomware has evolved to target Linux-based VMware ESXi environments, potentially broadening its attack range and victim count.

Secure your systems against this new variant: https://thehackernews.com/2024/07/new-linux-variant-of-play-ransomware.html
🤯8🔥4👍3
Stay Alert! The LATAM-based FLUXROOT group is exploiting Google Cloud for phishing attacks targeting Mercado Pago users.

Protect your accounts now: https://thehackernews.com/2024/07/pineapple-and-fluxroot-hacker-groups.html

Always double-check links and use strong, unique passwords.
🤯11👍4👏2
🔔 Tired of Endless Security Questionnaires?

There's a Solution!

SafeBase's Trust Center transforms this process by automating responses and eliminating unnecessary back-and-forth, reducing your workload significantly.

Learn more: https://thehackernews.com/2024/07/how-trust-center-solves-your-security.html
👍11👏3🤔3
🔔 Google Chrome introduces new security warnings for suspicious downloads.

Users can now send encrypted files with passwords for deep scans, ensuring comprehensive threat detection.

Update Chrome and activate Enhanced Protection: https://thehackernews.com/2024/07/new-chrome-feature-scans-password.html
👍26🤔2🔥1
Critical flaw found in Docker Engine allows attackers to bypass authorization plugins (AuthZ) - CVE-2024-41110, CVSS score 10.0.

This vulnerability can lead to severe privilege escalation, affecting numerous Docker versions.

Find details here: https://thehackernews.com/2024/07/critical-docker-engine-flaw-allows.html
🔥12🤯9😱5👍3😁1
ISC has released patches for multiple vulnerabilities in BIND 9 DNS software.

These flaws could be exploited to cause a DoS condition, impacting server performance and availability.

Read: https://thehackernews.com/2024/07/cisa-warns-of-exploitable.html
👍16🔥3🤯31
Researchers have disclosed a critical vulnerability, ConfusedFunction, impacting Google Cloud Functions.

This vulnerability could allow attackers to access and manipulate other services and sensitive data without authorization.

Learn more: https://thehackernews.com/2024/07/experts-expose-confusedfunction.html
9👍6🔥4
Meta Platforms shuts down 63,000 Instagram accounts in Nigeria linked to financial sextortion scams.

These scams primarily targeted adult men in the U.S., posing significant financial risks.

Share this news to raise awareness and protect others: https://thehackernews.com/2024/07/meta-removes-63000-instagram-accounts.html
🔥16👏11👍8😱2
Browser is a critical yet under-protected element in enterprise security. Traditional security tools don't sufficiently shield browser-based threats, exposing organizations to significant risks.

Discover how to secure your modern workspace: https://thehackernews.com/2024/07/webinar-securing-modern-workspace-what.html
👍18🔥3
North Korean cyber espionage group APT45 is now deploying ransomware.

This marks a significant shift from traditional espionage to financially-motivated attacks, affecting critical infrastructure.

Read more: https://thehackernews.com/2024/07/north-korean-hackers-shift-from-cyber.html
👍17🤯7👏53😁1
Progress Software urges users to update Telerik Report Server due to a critical security flaw (CVE-2024-6327) with a CVSS score of 9.9.

This vulnerability can lead to RCE, posing a significant risk to your data and systems.

Read details: https://thehackernews.com/2024/07/critical-flaw-in-telerik-report-server.html
👍115
⚠️ Cyber Alert: CrowdStrike warns of a new phishing campaign exploiting the Falcon Sensor update mishap.

This sophisticated attack targets German customers with fake installers, aiming to steal sensitive data.

Read here: https://thehackernews.com/2024/07/crowdstrike-warns-of-new-phishing-scam.html
👍11😁7🤔7🤯42😱1
Researchers warn of a campaign exploiting Selenium Grid services for cryptocurency mining.

Over 30,000 instances are exposed to remote command execution, necessitating immediate security measures.

Learn more: https://thehackernews.com/2024/07/ongoing-cyberattack-targets-exposed.html
👍13😱53
🔐 U.S. DoJ charges North Korean hacker Rim Jong Hyok for ransomware attacks on U.S. hospitals.

The attacks disrupted essential services & posed serious risks to patient care.

💰 $10M reward announced for tips leading to the arrest of Hyok.

https://thehackernews.com/2024/07/us-doj-indicts-north-korean-hacker-for.html
😁106👍6😱5🔥3🤔1
New insights on application security testing highlight 6 essential methods.

These methods, including DAST & SAST, help identify vulnerabilities early and throughout the application lifecycle.

Learn more: https://thehackernews.com/2024/07/6-types-of-applications-security.html
👍20👏1
Cybersecurity expert Foster Nethercott highlights offensive AI’s potential as a major threat. Offensive AI can create novel malware capable of evading traditional security measures, posing significant risks.

His paper outlines key points: https://thehackernews.com/2024/07/offensive-ai-sine-qua-non-of.html
👍10🔥5🤔5