The Hacker News
βœ”
151K subscribers
1.85K photos
10 videos
3 files
7.77K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
Netflix has been fined €4.75M for violating GDPR by failing to explain how it used customer data like email addresses and payment details between 2018–2020.

Read more: https://thehackernews.com/2024/12/dutch-dpa-fines-netflix-475-million-for.html
⚑19πŸ‘7πŸ”₯7😁6πŸ‘3πŸ€”1
πŸ”₯ Critical Alert: CISA’s new directive, BOD 25-01, sets a new benchmark in cloud security for federal agencies.

Why? Misconfigurations and weak controls are opening doors to attackers.

Key Deadlines:
Β» By Feb 2025: Identify all cloud tenants
Β» By Apr 2025: Deploy SCuBA assessment tools
Β» By Jun 2025: Implement mandatory policies

πŸ”— Learn how to protect your communications effectively: https://thehackernews.com/2024/12/cisa-mandates-cloud-security-for.html

πŸ›‘οΈ Regularly update security configurations to reduce your attack surface.
πŸ‘11⚑4😁2
πŸ›‘ Fortinet's Wireless LAN Manager (FortiWLM) is vulnerable to a path traversal flaw (CVE-2023-34990) with a 9.6/10 CVSS score.

Why it’s urgent: It allows attackers to...
1️⃣ Access admin accounts using static session IDs.
2️⃣ Execute unauthorized commands by chaining vulnerabilities.
3️⃣ Gain root access to your network in minutes.

πŸ› οΈ Patch now:
Affected versions: 8.5.0 to 8.6.5.
Fixed in 8.6.6β€”update immediately.

Read: https://thehackernews.com/2024/12/fortinet-warns-of-critical-fortiwlm.html
πŸ”₯15πŸ‘6⚑2πŸ€”2
🚨 What if your device unknowingly became a tool for cybercrime? It’s happening now.

Mirai malware strikes Juniper SSR devices, leveraging default passwords to turn them into DDoS attack machines. Over 90% of breached systems had unaltered factory settings.

πŸ”‘ Don’t leave the door open. Secure your systems today.

Read the full report: https://thehackernews.com/2024/12/juniper-warns-of-mirai-botnet-targeting.html
πŸ”₯10πŸ‘8πŸ‘4⚑3😁2πŸ€”2
Threat actors are tricking developers with fake npm packages like typescript-eslint lookalikes, amassing thousands of downloads.

Compromised tools = compromised enterprises. One wrong download could breach your entire development cycle.

πŸ”’ Your move:
βœ… Review your dependencies.
βœ… Learn how these attacks work.
βœ… Build a resilient security strategy.

πŸ‘‰ Read here: https://thehackernews.com/2024/12/thousands-download-malicious-npm.html
πŸ‘17🀯6πŸ‘4⚑2
🚨 CISA warns of an actively exploited critical flaw (CVE-2024-12356, CVSS: 9.8) in BeyondTrust's Privileged Remote Access (PRA) and Remote Support (RS) products.

Attackers can exploit this flaw to run arbitrary commandsβ€”no authentication required.

Read: https://thehackernews.com/2024/12/cisa-adds-critical-flaw-in-beyondtrust.html
😁12πŸ‘9⚑5πŸ€”1
πŸ›‘ Attackers are exploiting Fortinet's CVE-2023-48788 (CVSS 9.3) to install remote desktop tools like AnyDesk and ScreenConnect.

They’ve already targeted companies across 12 countries, leveraging:

Β» SQL injection for unauthorized access
Β» Password recovery tools like Mimikatz
Β» PowerShell scripts for persistence

Don’t just patch vulnerabilitiesβ€”assume attackers are already inside.

Find details here: https://thehackernews.com/2024/12/hackers-exploiting-critical-fortinet.html
⚑10πŸ‘8πŸ”₯6😁3
πŸ”” Alert: Two critical vulnerabilities in Sophos Firewalls could grant attackers remote code execution and privileged access.

πŸ”§ Action Plan:
βœ”οΈ Update to v21 MR1 or newer.
βœ”οΈ Restrict SSH access immediately.
βœ”οΈ Ensure user portals are not WAN-exposed.

πŸ”— Full advisory here: https://thehackernews.com/2024/12/sophos-fixes-3-critical-firewall-flaws.html
πŸ‘17⚑7🀯5
The notorious Lazarus Group is targeting nuclear engineers using trojanized VNC tools disguised as job assessments for aerospace roles.

They’ve introduced a new modular malwareβ€”CookiePlusβ€”capable of evading top-tier detection systems.

πŸ”— Explore the full story here: https://thehackernews.com/2024/12/lazarus-group-spotted-targeting-nuclear.html
😁18⚑10πŸ‘9
πŸ”₯ A dual Russian-Israeli national charged as the mastermind behind LockBit ransomwareβ€”a cyber weapon that caused chaos across 120+ countries and left $500M in illicit profits.

Β» Targeted hospitals, schools, and critical infrastructure.
Β» Gained access to systems using custom malware to disable antivirus.
Β» LockBit is now planning a comeback with version 4.0!

Explore the full story of LockBit’s rise and fall: https://thehackernews.com/2024/12/lockbit-developer-rostislav-panev.html
πŸ‘36πŸ‘12πŸ€”8⚑7
πŸ”’ Italy has fined OpenAI €15 Million for violating GDPR.

Key issues:
Β» Processing user data without legal basis
Β» Failing to notify users about a 2023 security breach
Β» No age verification, exposing kids under 13 to risky content

πŸ”— Full story here: https://thehackernews.com/2024/12/italy-fines-openai-15-million-for.html
😁44πŸ‘20πŸ”₯7🀯7πŸ€”6⚑3πŸ‘3
πŸ”’ A U.S. judge held NSO Group liable for breaching WhatsApp’s terms of service and misusing its servers to silently deploy Pegasus spyware, targeting 1,400 users within a single month.

Learn more: https://thehackernews.com/2024/12/us-judge-rules-against-nso-group-in.html
⚑30πŸ‘9πŸ‘8πŸ”₯5😁3🀯2😱2πŸ€”1
🚨 Rockstar2FA, a notorious phishing-as-a-service (PhaaS) toolkit, suffered a major collapse on November 11. In its place, FlowerStorm has emerged as the new threat. These tools exploit legitimate services like Cloudflare Turnstile to bypass detection effortlessly.

πŸ“ Key Targets:
Β» Sectors: Engineering, real estate, consulting
Β» Countries: U.S., Canada, UK, Germany, India

If you operate in these industries, you’re already in the crosshairs of attackers. Basic MFA protections are no longer sufficient.

πŸ”— Full story here: https://thehackernews.com/2024/12/rockstar2fa-collapse-fuels-expansion-of.html
⚑14πŸ€”9πŸ‘6
🚨 Top 10 Cybersecurity Trends for 2025: From AI-powered attacks to zero-day threats & supply chain risks, the future of cyber defense is evolving fast. Are you ready?

πŸ”— Read: https://thehackernews.com/2024/12/top-10-cybersecurity-trends-to-expect.html
πŸ‘16🀯7⚑2πŸ”₯2
πŸ‘¨β€πŸ’» Is AI rewriting cybersecurity rules? Criminals are using LLMs to create natural-looking malware that evades detection.

πŸ›‘οΈ What’s happening:
Β» 10,000+ malware variants generated at scale.
Β» 88% trick tools like VirusTotal.
Β» Detection systems risk degradation over time.

πŸ”— Learn more: https://thehackernews.com/2024/12/ai-could-generate-10000-malware.html
😱12πŸ”₯8πŸ‘6😁6🀯5
⚑ A new remote code execution flaw in Apache Tomcat (CVE-2024-56337) exposes organizations to serious risk.

An uploaded file could turn into malicious JSP codeβ€”resulting in remote code execution.

Β» Affected Versions: Tomcat 9.0.0-M1 to 11.0.1
Β» Java users: Incorrect configurations = higher risk.
Β» Severity? CVE-2024-50379 scored a 9.8 on CVSS!

Details here πŸ‘‰ https://thehackernews.com/2024/12/apache-tomcat-vulnerability-cve-2024.html
πŸ‘27😁19🀯10⚑5πŸ‘3πŸ”₯1
🚨 CISA has added a high-severity vulnerability in USAHERDS (CVE-2021-44207) to its Known Exploited Vulnerabilities (KEV) catalog. This flaw has an 8.1 CVSS score and allows attackers to execute arbitrary code on affected servers.

Learn more: https://thehackernews.com/2024/12/cisa-adds-acclaim-usaherds.html
πŸ‘14⚑4😁3😱2πŸ”₯1
πŸ”’ $308M stolen in a daring crypto heist targeting DMM Bitcoin. North Korean hackers used social engineering and malware to exploit insider access.

πŸ‘‰ Learn More: https://thehackernews.com/2024/12/north-korean-hackers-pull-off-308m.html
😱23πŸ”₯16πŸ‘9🀯6⚑4
🚨 Charming Kitten strikes again! Iranian hackers deploy a new C++ variant of the infamous BellaCiao malware, targeting machines across Asia.

Learn how BellaCPP operates and prepare your team for emerging threats: https://thehackernews.com/2024/12/irans-charming-kitten-deploys-bellacpp.html
😁26πŸ‘16🀯5πŸ”₯3πŸ€”3
⚠️ Apache Traffic Control usersβ€”an SQL injection flaw (CVE-2024-45387) has been found, enabling attackers to execute commands directly in your database.

This flaw is easily exploitable by sending a specially crafted PUT request.

πŸ”§ How to act now:
Β» Update to version 8.0.2 ASAP.
Β» Audit access permissions for high-risk roles.
Β» Double-check database configurations for security loopholes.

Read: https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html
πŸ‘30😁9🀯8⚑7πŸ”₯7πŸ€”3😱1