The Hacker News
โœ”
152K subscribers
1.87K photos
10 videos
3 files
7.78K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: [email protected]

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿ›‘ The rise of cloaking and deepfakes is shaking up cybersecurity.

Google warns that fraudsters are using cloaking tactics to impersonate legitimate sites, leading to scams and malware installs.

Read: https://thehackernews.com/2024/11/google-warns-of-rising-cloaking-scams.html

Stay alert to these evolving threats!
๐Ÿ”ฅ13๐Ÿ‘4๐Ÿ‘2โšก1
Researchers reveal over 70,000 domains have been hijacked by cybercriminals using a stealthy technique called Sitting Ducks.

This attack targets DNS misconfigurations, making it nearly impossible to detect.

Read: https://thehackernews.com/2024/11/experts-uncover-70000-hijacked-domains.html
๐Ÿ‘12๐Ÿ”ฅ5โšก3๐Ÿ˜3
๐Ÿšจ Urgent : CISA warns of active exploitation of critical flaws in Palo Alto Networks Expedition OS and SQL services (CVEs 9463 & 9465).

Read: https://thehackernews.com/2024/11/cisa-flags-critical-palo-alto-network.html

These vulnerabilities could lead to severe breaches if not addressed promptly.
๐Ÿ˜9๐Ÿ‘8โšก4๐Ÿ‘3
Ilya Lichtenstein sentenced to 5 years for masterminding the 2016 Bitfinex hack, stealing $10.5B in #Bitcoin.

His laundering tactics included crypto mixers and fake identities, highlighting the evolving threat in crypto security.

Read: https://thehackernews.com/2024/11/bitfinex-hacker-sentenced-to-5-years.html
๐Ÿ‘19โšก6๐Ÿ˜4๐Ÿ”ฅ1๐Ÿคฏ1
โš ๏ธ Researchers have identified a high-severity #vulnerability (CVE-2024-10979) in PostgreSQL, allowing unprivileged users to alter environment variables, leading to potential code execution or information leaks.

Read: https://thehackernews.com/2024/11/high-severity-flaw-in-postgresql-allows.html
โšก13๐Ÿ”ฅ8๐Ÿ‘5๐Ÿคฏ4
Warning -- PXA Stealer, a new Python-based #malware, is targeting European & Asian gov and education sectors, stealing sensitive data like credentials & financial info.

Learn more: https://thehackernews.com/2024/11/vietnamese-hacker-group-deploys-new-pxa.html
โšก14๐Ÿคฏ3๐Ÿ‘2
AI in IAM = smarter security!

Machine learning analyzes behavior patterns to detect anomalies, enabling quicker & precise threat responses.

Learn how it reduces false positives, boosts efficiency & strengthens defenses: https://thehackernews.com/2024/11/how-ai-is-transforming-iam-and-identity.html
๐Ÿ‘7โšก6๐Ÿค”2๐Ÿคฏ2
๐Ÿ” Trust is the foundation of your businessโ€”how solid is your certificate management?

Join our exclusive webinar to gain actionable insights into crypto agility and post-quantum cryptography from industry experts.

Donโ€™t miss outโ€”secure your spot now: https://thehackernews.com/2024/11/master-certificate-management-join-this.html
๐Ÿ‘7โšก5๐Ÿ”ฅ3
Researchers found vulnerabilities in Googleโ€™s Vertex AI, allowing attackers to escalate privileges and exfiltrate models through manipulated custom job permissions and AI Pipelines, gaining backdoor access to Google Cloud and Kubernetes.

https://thehackernews.com/2024/11/researchers-warn-of-privilege.html
๐Ÿคฏ13โšก6๐Ÿ‘6๐Ÿ˜5๐Ÿ˜ฑ4
๐Ÿ”ด Alert: Iranian state-backed group, Cotton Sandstorm, has unleashed a new cyber espionage toolโ€”WezRat.

This remote access trojan can execute malicious commands, steal sensitive data, and even take screenshots.

Read: https://thehackernews.com/2024/11/iranian-hackers-deploy-wezrat-malware.html
๐Ÿ˜8๐Ÿค”5โšก4๐Ÿ”ฅ3
๐Ÿ”ด New Threat Alert: BrazenBamboo, a well-resourced group, is exploiting an UNPATCHED zero-day #vulnerability in Fortinet's FortiClient for Windows to extract VPN credentials.

Learn more: https://thehackernews.com/2024/11/warning-deepdata-malware-exploiting.html
๐Ÿ˜9๐Ÿค”5โšก2
โšก New Zero-Day Alert: Unauthenticated RCE in PAN-OS!

With a CVSS score of 9.3, hackers are exploiting it to deploy web shells, allowing persistent remote access.

๐Ÿšจ No patches yetโ€”secure your firewall management interface now.

Details: https://thehackernews.com/2024/11/pan-os-firewall-vulnerability-under.html
๐Ÿ‘19๐Ÿ˜11โšก4๐Ÿค”4๐Ÿคฏ2
A critical vulnerability (CVE-2024-10924) in the Really Simple SSL plugin affects 4 Million+ WordPress sites, allowing attackers to bypass 2FA and gain admin access remotely.

Details here: https://thehackernews.com/2024/11/urgent-critical-wordpress-plugin.html

Patch availableโ€”update now!
๐Ÿ”ฅ19๐Ÿ˜7๐Ÿ‘1
Legal battle exposes NSO Group's continued exploitation of WhatsApp flaws to deploy Pegasus spywareโ€”even after being sued by Meta.

Court docs reveal sophisticated zero-click attacks & ongoing adaptations to bypass WhatsApp's defenses.

Read: https://thehackernews.com/2024/11/nso-group-exploited-whatsapp-to-install.html
๐Ÿ”ฅ12๐Ÿ‘7๐Ÿ˜6๐Ÿ˜ฑ3๐Ÿ‘1
A new phishing campaign targets e-commerce shoppers in Europe and the U.S. with fake discounts, using SEO poisoning and typosquatting to steal payment details via fake sites.

Learn more: https://thehackernews.com/2024/11/fake-discount-sites-exploit-black.html
โšก8๐Ÿ”ฅ3๐Ÿ‘1
Google is developing a Shielded Email feature, allowing users to create email aliases for signing up online, keeping their real addresses private.

Details: https://thehackernews.com/2024/11/shielded-email-googles-latest-tool-for.html
๐Ÿ‘32๐Ÿ˜8๐Ÿ”ฅ6๐Ÿค”5๐Ÿ‘4๐Ÿคฏ3
Compliance-driven pen tests may not keep up with evolving threats. Automated testing slashes costs by 60%, making frequent tests feasible.

Want real-time testing? Learn more about automated solutions: https://thehackernews.com/2024/11/beyond-compliance-advantage-of-year.html
โšก7๐Ÿ”ฅ6๐Ÿ‘1
Every day, new tactics and threats emerge, from exploiting hidden tech flaws to tricking people with clever scams. In this weekโ€™s Cybersecurity Recap, we break down the trends shaping the threat landscape and share insights to help you strengthen your defenses.

Dive into this weekโ€™s must-know updates: https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_18.html
โšก10๐Ÿ‘3๐Ÿค”3
๐Ÿšจ SaaS Security is Facing New Threats โ€“ With a growing number of unauthorized apps and the surge of Generative AI tools, businesses are under increased risk.

One in four SaaS apps used by organizations is unauthorizedโ€”this โ€œShadow SaaSโ€ creates a massive blind spot, expanding attack surfaces.

Failure to secure these apps exposes businesses to data breaches, compliance violations, and even total system compromise

Learn how to safeguard your organizationโ€™s SaaS environment and stay ahead of emerging risks in the State of SaaS Security 2024 report.

Donโ€™t miss these critical insights. Read Now: https://thehackernews.com/expert-insights/2024/11/state-of-saas-security-report-bold.html
๐Ÿ‘13โšก3๐Ÿ˜2
๐Ÿšจ New stealth #malware "BabbleLoader" is bypassing AI detection with a slew of evasive tricks, making it one of the most sophisticated threats in the wild.

Learn how BabbleLoader works and how to defend against it: https://thehackernews.com/2024/11/new-stealthy-babbleloader-malware.html
๐Ÿ‘13โšก5๐Ÿ˜3