The Hacker News
โœ”
151K subscribers
1.86K photos
10 videos
3 files
7.77K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: [email protected]

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿšจ Every second in 2024, cybercriminals attempted 7,000 password attacksโ€”up 75% from last year! Phishing surged 58%, leading to $3.5 billion in losses.

Learn the top strategies to protect your SaaS environment from these relentless threats.

Read here: https://thehackernews.com/2025/01/from-22m-in-ransom-to-100m-stolen.html
๐Ÿ”ฅ15๐Ÿ‘6โšก3๐Ÿค”2
India proposes draft Digital Personal Data Protection (DPDP) Rules to empower citizens with data erasure rights, enforce strict security mandates for companies, and impose penalties for non-compliance.

๐Ÿ”’ Your Rights:
โžœ Erase data on demand ๐Ÿ—‘๏ธ
โžœ Consent control for how your data is used ๐Ÿ“œ
โžœ Parental consent for minorsโ€™ data ๐Ÿ‘ถ

โš™๏ธ Business Compliance:
โžœ 72-hour breach reporting โฑ๏ธ
โžœ Annual audits & impact assessments ๐Ÿ“‹
โžœ Data security: encryption, backups, and access control ๐Ÿ”

๐Ÿ’ธ Penalties โžœ Up to โ‚น250 crore (~$30M) for non-compliance or misuse โš ๏ธ

Explore the details: https://thehackernews.com/2025/01/india-proposes-digital-data-rules-with.html
๐Ÿ‘38๐Ÿ‘13๐Ÿ”ฅ8๐Ÿค”8๐Ÿ˜7
๐Ÿšจ Two vulnerabilities (CVE-2024-9138, CVE-2024-9140) impact Moxa's routers, with CVSS scores of 8.6 and 9.3โ€”allowing root access and unauthorized command execution.

๐Ÿ”‘ Patch to version 3.14+ immediately.

You can protect your network by:
๐Ÿ›‘ Isolating devices from the internet.
๐Ÿ”— Limiting SSH access to trusted IPs.
๐Ÿ›ก Enabling strict firewall rules.

โžก๏ธ Find out now: https://thehackernews.com/2025/01/moxa-alerts-users-to-high-severity.html
๐Ÿ‘10๐Ÿ˜5๐Ÿ‘3
โš ๏ธ CISA says thereโ€™s no evidence other federal systems were impacted in the Treasury cyberattackโ€”but the investigation is ongoing.

Attackers exploited BeyondTrustโ€™s Remote Support SaaS API key to access Treasury systems.

๐Ÿ”— Learn More: https://thehackernews.com/2025/01/cisa-no-wider-federal-impact-from.html
๐Ÿ˜11๐Ÿ”ฅ5๐Ÿ‘3
A newly upgraded version of the EAGERBEE malware is actively targeting internet service providers (ISPs) and government entities in the Middle East.

โžœ Allows load, unload, or swap plugins in memory on demand.
โžœ Linked to state-aligned groups like Cluster Alpha and TA428.
โžœ Targets military and political secrets in Southeast Asia.
Harvest network and system data with precision tools.

๐Ÿ”— Read the full report here: https://thehackernews.com/2025/01/new-eagerbee-variant-targets-isps-and.html
๐Ÿค”12๐Ÿ‘5
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ•ฏ๏ธ Legacy MFA, VPNs, and antivirus have all fallen. Why? Attackers outpaced outdated tech.

Key takeaways for decision-makers: Evolve or risk critical vulnerabilities.

โžค Integrated, AI-driven, phishing-resistant tools are non-negotiable.
โžค Zero Trust and passwordless solutions are the path forward.

Cybersecurity tools must outthink attackersโ€”not just block them.

Are your defenses ready for 2025? Find out whatโ€™s driving the next wave of innovation: https://thehackernews.com/2025/01/farewell-to-fallen-cybersecurity-stars.html
๐Ÿ”ฅ14๐Ÿ‘5๐Ÿ˜4โšก3๐Ÿคฏ1
Researchers reveal Illuminaโ€™s iSeq 100 lacks modern security measures, making it vulnerable to privilege escalation and firmware tampering.

Explore the insights here: https://thehackernews.com/2025/01/researchers-uncover-major-security-flaw.html
๐Ÿ˜17โšก3
Can you spot hidden threats in encrypted traffic? Most organizations canโ€™tโ€”and thatโ€™s exactly how attackers are winning.

In this webinar, Zscaler's Emily Laufer reveals:
๐Ÿ›ก๏ธ Advanced tactics to uncover hidden threats
๐Ÿ“ˆ Predictions for ransomwareโ€™s 2025 playbook

โžก๏ธ Watch the webinar: https://thehacker.news/ransomware-encrypted-attacks
๐Ÿ‘17๐Ÿค”2
CISA has flagged 3 actively exploited vulnerabilitiesโ€”two in Mitel MiCollab and one in Oracle WebLogic Server.

โคท CVE-2024-41713: Remote access via path traversal.
โคท CVE-2024-55550: Exploited by attackers with admin privileges.
โคท CVE-2020-2883: A high-severity vulnerability in Oracle WebLogic with known exploits.

๐Ÿ‘‰ Donโ€™t waitโ€”secure your systems now: https://thehackernews.com/2025/01/cisa-flags-critical-flaws-in-mitel-and.html
๐Ÿ‘12โšก6
๐Ÿ”ฅ The U.S. government has launched the U.S. Cyber Trust Mark, a label for IoT devices that meet rigorous cybersecurity standards.

How it works:
โœ… Devices tested by accredited labs
โœ… QR codes reveal security practices like updates and default password tips

๐Ÿ”— Read: https://thehackernews.com/2025/01/fcc-launches-cyber-trust-mark-for-iot.html

Share your thoughts!
๐Ÿ‘17๐Ÿ”ฅ8๐Ÿ˜4โšก2๐Ÿ‘1
๐Ÿšจ Over 15,000 infected devices are targeting businesses daily with 100 Gbps DDoS attacks!

A new Mirai botnet variant, dubbed "gayfemboy," is exploiting a critical OS command injection flaw in Four-Faith routers.

โœ… Countries hit hardest: China, Iran, Russia, Turkey, USA
โœ… Vulnerabilities used: over 20 CVEs, including a zero-day.

๐Ÿ”— Full story: https://thehackernews.com/2025/01/mirai-botnet-variant-exploits-four.html
๐Ÿ˜19โšก7๐Ÿ‘4
๐Ÿšจ Lumma malware continues to wreak havoc in 2025, stealing sensitive information through fake CAPTCHA pages, torrents, and phishing emails.

Explore how to proactively analyze Lumma and stop it in its tracks using tools like @ANYRUN_app's sandbox. ๐Ÿ‘‰ https://thehackernews.com/2025/01/top-5-malware-threats-to-prepare.html
๐Ÿ”ฅ16โšก5๐Ÿ‘4
๐Ÿ”’ NonEuclid, a new Remote Access Trojan, combines stealth, evasion, and ransomware into a single devastating package. Itโ€™s being advertised as a crimeware solution.

โคท Dual Purpose: Acts as both a RAT and ransomware.
โคท Stealth Mode: Uses sandbox detection to avoid virtual environments.
โคท Persistence: Modifies Windows Registry and sets scheduled tasks for survival.

๐Ÿ‘‰ Read more: https://thehackernews.com/2025/01/researchers-expose-noneuclid-rat-using.html
๐Ÿ”ฅ10๐Ÿคฏ7๐Ÿ‘3
๐Ÿšจ What are the limitations of existing security tools in managing AI-related risks? Learn practical approaches to identify blind spots and protect against emerging threats across your AI lifecycleโ€”from development to production.

๐ŸŽ™๏ธ Join James Berthoty, Ron Bitton, PhD and Dor Sarig, as they explore:

โœ… Traditional application security Vs AI security
โœ… AI security use cases in the modern enterprise
โœ… Analysis of AI-related risks and vulnerabilities
โœ… Strategic recommendations for 2025

๐Ÿ“… January 15th, 11:30am ET

๐Ÿ‘‰ Donโ€™t miss outโ€”Reserve your spot for this exclusive webinar: https://thn.news/navigating-ai-security
๐Ÿ‘12๐Ÿ”ฅ4
๐Ÿšจ Forgotten domains are becoming cybercriminals' secret weapon to bypass email security!

Hackers are reviving decades-old domains that lack basic security measures to send phishing emails. These tactics fool even advanced systems like SPF and DMARC.

Learn more: https://thehackernews.com/2025/01/neglected-domains-used-in-malspam-to.html
๐Ÿ‘18๐Ÿ”ฅ3
๐Ÿ”ฎ What does the future hold for SaaS security in 2025?

Here are some predictions for the year ahead, including:

๐Ÿ“ˆ Increased SaaS-based attacks
โ˜๏ธ Zero Trust will be non-negotiable
โš”๏ธ Identity management as the key battleground

See what else is in store for the year ahead: https://thn.news/saas-security-predictions-li
โšก10๐Ÿ‘5
๐Ÿ”ฅ Critical Ivanti Flaw Under Attack!

Hackers are actively targeting CVE-2025-0282โ€”a buffer overflow flaw (CVSS 9.0)โ€”in Ivanti Connect Secure, Policy Secure, and ZTA Gateways.

Mandiant links this to China-linked actors (UNC5337) using novel tools like DRYHOOK for credential theft.

โคท Federal agencies must patch by January 15, 2025.
โคท Organizations worldwide are at risk of breaches.

๐Ÿ‘‰ Learn more here: https://thehackernews.com/2025/01/ivanti-flaw-cve-2025-0282-actively.html
๐Ÿ˜11๐Ÿ‘4๐Ÿคฏ1๐Ÿ˜ฑ1
๐Ÿ˜„๐Ÿ˜„ For the first time ever, the European Commission has been fined (Just โ‚ฌ400) for violating its own data privacy laws.

The breach involved sending an EU citizen's dataโ€”including IP address and browser metadataโ€”to Meta's servers in the U.S. via "Sign in with Facebook."

Learn more: https://thehackernews.com/2025/01/eu-commission-fined-for-transferring.html
๐Ÿ˜67๐Ÿ˜ฑ8๐Ÿ‘7๐Ÿ‘6โšก5
โš ๏ธ Warning: Over 23,800 GFI KerioControl firewalls are vulnerable to a 1-click RCE flaw (CVE-2024-52875) that gives attackers root access.

๐Ÿ›ก๏ธ Update to v9.4.5 Patch 1 and audit your firewall access points immediately.

๐Ÿ‘‰ Full details here: https://thehackernews.com/2025/01/critical-rce-flaw-in-gfi-keriocontrol.html
โšก10๐Ÿ‘5๐Ÿ˜4
๐Ÿ›‘ China-linked MirrorFace has targeted Japanโ€™s security and tech sectors in over 4 years of persistent attacks, says NPA & NCSC.

These attackers use spear-phishing, exploit device vulnerabilities, and evade antivirus detection by operating in Windows Sandboxโ€”leaving no trace behind.

๐Ÿ”— Learn the tactics attackers use and how to counter them: https://thehackernews.com/2025/01/mirrorface-leverages-anel-and-noopdoor.html
๐Ÿ”ฅ10๐Ÿ˜5โšก4๐Ÿ‘2๐Ÿ‘2