The Hacker News
βœ”
151K subscribers
1.86K photos
10 videos
3 files
7.77K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
The U.S. Treasury just sanctioned two major entitiesβ€”one Iranian and one Russianβ€”for meddling in the 2024 presidential election through AI-powered disinformation campaigns.

Here’s what they did:
πŸ› οΈ Created deepfakes and synthetic content using AI.
🌐 Built a network of 100+ fake news sites to spread misinformation.
πŸ’° Backed by intelligence agencies like Iran's IRGC and Russia's GRU.

Learn the latest tactics πŸ‘‰ https://thehackernews.com/2025/01/iranian-and-russian-entities-sanctioned.html
😁22πŸ‘10😱8πŸ€”3🀯1
⚠️ Click. Click. Hacked?

DoubleClickjacking: A new clickjacking variant that stealthily exploits timing gaps between clicks to hijack accounts.

This attack bypasses protections like X-Frame-Options and SameSite cookies.

Read the article: https://thehackernews.com/2025/01/new-doubleclickjacking-exploit-bypasses.html
🀯42πŸ”₯16πŸ‘6πŸ‘3
🚨 Three Russian-German nationals charged with espionage and sabotage by German prosecutors.

One suspect, Dieter S., allegedly scouted military sites and planned attacks to disrupt Germany's support for Ukraine.

Learn more: https://thehackernews.com/2025/01/three-russian-german-nationals-charged.html
πŸ‘16😁4πŸ”₯3
πŸ”’ A new npm package poses as a vulnerability detector for Ethereum smart contracts but silently installs Quasar RATβ€”a remote access trojan that gives attackers:

πŸ–₯️ Full control over your system
πŸ›‘οΈ Persistence via Windows Registry tweaks
πŸ“‘ Command-and-Control connections to steal data

πŸ”— Read the full analysis: https://thehackernews.com/2025/01/malicious-obfuscated-npm-package.html
πŸ‘30😱8
⚑ Did you know? Cross-domain attackers often stay hidden for weeks before escalating privileges.

Why do attackers thrive? Because fragmented security tools leave gapsβ€”and adversaries like FAMOUS CHOLLIMA are exploiting every one of them.

πŸ’¬ Question: Are your identity systems truly secure, or just compliant?

πŸ’‘ Expert Take: A unified platform transforms identity systems into secure perimeters by:
Β» Closing blind spots with end-to-end visibility.
Β» Integrating seamlessly across cloud, SaaS, and on-prem environments.
Β» Accelerating threat detection for proactive defense.

πŸ‘‰ Learn how to level up your defenses: https://thehackernews.com/2025/01/cross-domain-attacks-growing-threat-to.html

Attackers move fastβ€”your defenses need to be faster.
πŸ‘17πŸ”₯15
⚠️ Researchers have uncovered details of now-patched vulnerabilities in Dynamics 365 and Power Apps Web API that exposed sensitive user data, including emails, financial information, and password hashes.

πŸ”— Learn more: https://thehackernews.com/2025/01/severe-security-flaws-patched-in.html
πŸ‘18πŸ‘7πŸ”₯6😁5⚑3
πŸ”’ Apple will pay $95M to settle claims that Siri accidentally recorded and shared private conversations with third parties.

πŸ“Š Key Details:
Β» Covers Siri-enabled devices from 2014 to 2024.
Β» Claim up to $20 per device (max 5).
Β» Apple introduced new privacy settings, but is it enough?

πŸ”— Get the full story: https://thehackernews.com/2025/01/apple-to-pay-siri-users-20-per-device.html
πŸ”₯29😁13πŸ‘9⚑2πŸ€”1
🚨 Critical Update: With Edgio services shutting down, Microsoft is migrating all .NET workloads to Azure Front Door CDNs.

πŸ’‘ Deadline: January 7, 2025.

πŸ‘‰ Scan your codebase and update references today to avoid downtime.

Learn more: https://thehackernews.com/2025/01/critical-deadline-update-old-net.html
πŸ‘18😁6
🚨 Critical Flaws in LDAP Exploited!

A new proof-of-concept exploit, LDAPNightmare, crashes unpatched Windows Servers with one crafted request.

Even worse? RCE attacks are possible with minor tweaks.

Β» CVE-2024-49113 causes DoS attacks.
Β» CVE-2024-49112 allows remote code execution.

What can you do?
βœ… Patch ASAP with Microsoft’s December 2024 updates.
βœ… Monitor RPC calls and suspicious LDAP activity.

πŸ‘‰ Read more: https://thehackernews.com/2025/01/ldapnightmare-poc-exploit-crashes-lsass.html
πŸ”₯27🀯10πŸ‘8😁3
🚨 ALERT: New multi-turn jailbreaking attack, Bad Likert Judge, cleverly bypasses AI safety measures across six major platforms, including AWS, Google, and NVIDIA.

Β» Attack success rates spike by 60% using this technique.
Β» Tested across major platformsβ€”OpenAI, Google, and more.
Β» Categories impacted: hate speech, malware, even weapons.

πŸ‘‰ Explore expert findings: https://thehackernews.com/2025/01/new-ai-jailbreak-method-bad-likert.html
πŸ”₯32πŸ‘5πŸ€”3
🚨 The U.S. Treasury just sanctioned Integrity Technology Group, a Beijing-based cybersecurity firm, for enabling state-sponsored cyberattacks on U.S. entities.

β†ͺ Linked to Flax Typhoon (aka RedJuliett)
β†ͺ Exploited IoT vulnerabilities.
β†ͺ Targeted government agencies, telecoms, and universities.

πŸ”— Read the details: https://thehackernews.com/2025/01/us-treasury-sanctions-beijing.html
😁18πŸ‘9🀯1
shrinked-malware-execution-ezgif.com-optimize.gif
16.2 MB
⚠️ ALERT: PLAYFULGHOST Targets VPN Users!

This powerful backdoor malware deceives users by trojanizing legitimate VPN apps, enabling keylogging, screen/audio capture, and remote shell access.

Learn more: https://thehackernews.com/2025/01/playfulghost-delivered-via-phishing-and.html
πŸ‘24⚑5πŸ€”4😱3
This media is not supported in your browser
VIEW IN TELEGRAM
🚨 A severe flaw in Nuclei (CVE-2024-43405) could let attackers bypass signature checks and inject malicious code. This impacts all versions after 3.0.0β€”scoring a 7.4 CVSS.

Read the analysis and secure your systems πŸ‘‰https://thehackernews.com/2025/01/researchers-uncover-nuclei.html
⚑16😱9πŸ”₯5πŸ‘4
FireScam malware is targeting Android devices by disguising itself as a fake β€œTelegram Premium” app. Once installed, it:

β†ͺ Steals sensitive data (messages, notifications, call logs, credentials)
β†ͺ Blocks legitimate app updates to remain undetected

This malware uses advanced techniques to spy on users and maintain control over devicesβ€”posing a major threat to personal and organizational data.

Get all the details πŸ‘‰ https://thehackernews.com/2025/01/firescam-android-malware-poses-as.html
πŸ‘20πŸ”₯10😱4πŸ€”3😁2
πŸ”’ Critical Alert: Malicious npm packages are impersonating Hardhat tools to steal private keys and mnemonics.

β†ͺ Over 1,000 downloads of a single fake package, active for over a year.
β†ͺ Data is exfiltrated using hardcoded Ethereum addresses.

Open-source dependency complexity is a hacker’s dreamβ€”manual reviews are becoming impossible.

πŸ”§ What You Can Do:
βœ… Double-check every dependency.
βœ… Use tools to audit npm packages.
βœ… Build robust supply chain defenses.

πŸ”— Read the details: https://thehackernews.com/2025/01/russian-speaking-attackers-target.html
πŸ”₯13πŸ‘7🀯4πŸ‘3😱1
🚨 Every second in 2024, cybercriminals attempted 7,000 password attacksβ€”up 75% from last year! Phishing surged 58%, leading to $3.5 billion in losses.

Learn the top strategies to protect your SaaS environment from these relentless threats.

Read here: https://thehackernews.com/2025/01/from-22m-in-ransom-to-100m-stolen.html
πŸ”₯15πŸ‘6⚑3πŸ€”2
India proposes draft Digital Personal Data Protection (DPDP) Rules to empower citizens with data erasure rights, enforce strict security mandates for companies, and impose penalties for non-compliance.

πŸ”’ Your Rights:
➜ Erase data on demand πŸ—‘οΈ
➜ Consent control for how your data is used πŸ“œ
➜ Parental consent for minors’ data πŸ‘Ά

βš™οΈ Business Compliance:
➜ 72-hour breach reporting ⏱️
➜ Annual audits & impact assessments πŸ“‹
➜ Data security: encryption, backups, and access control πŸ”

πŸ’Έ Penalties ➜ Up to β‚Ή250 crore (~$30M) for non-compliance or misuse ⚠️

Explore the details: https://thehackernews.com/2025/01/india-proposes-digital-data-rules-with.html
πŸ‘38πŸ‘13πŸ”₯8πŸ€”8😁7
🚨 Two vulnerabilities (CVE-2024-9138, CVE-2024-9140) impact Moxa's routers, with CVSS scores of 8.6 and 9.3β€”allowing root access and unauthorized command execution.

πŸ”‘ Patch to version 3.14+ immediately.

You can protect your network by:
πŸ›‘ Isolating devices from the internet.
πŸ”— Limiting SSH access to trusted IPs.
πŸ›‘ Enabling strict firewall rules.

➑️ Find out now: https://thehackernews.com/2025/01/moxa-alerts-users-to-high-severity.html
πŸ‘10😁5πŸ‘3
⚠️ CISA says there’s no evidence other federal systems were impacted in the Treasury cyberattackβ€”but the investigation is ongoing.

Attackers exploited BeyondTrust’s Remote Support SaaS API key to access Treasury systems.

πŸ”— Learn More: https://thehackernews.com/2025/01/cisa-no-wider-federal-impact-from.html
😁11πŸ”₯5πŸ‘3
A newly upgraded version of the EAGERBEE malware is actively targeting internet service providers (ISPs) and government entities in the Middle East.

➜ Allows load, unload, or swap plugins in memory on demand.
➜ Linked to state-aligned groups like Cluster Alpha and TA428.
➜ Targets military and political secrets in Southeast Asia.
Harvest network and system data with precision tools.

πŸ”— Read the full report here: https://thehackernews.com/2025/01/new-eagerbee-variant-targets-isps-and.html
πŸ€”12πŸ‘5