The Hacker News
βœ”
151K subscribers
1.86K photos
10 videos
3 files
7.77K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
🚨 New Vulnerability Alert!

CISA has added another critical BeyondTrust flaw to its "Known Exploited Vulnerabilities" catalogβ€”this time, impacting Privileged Remote Access (PRA) and Remote Support (RS).

Attackers are actively exploiting it β€” CVE-2024-12686.

Read more: https://thehackernews.com/2025/01/cisa-adds-new-beyondtrust-flaw-to-kev.html
πŸ‘15πŸ‘4
⚠️ VMware vCenter = Goldmine for Attackers.

Attackers are exploiting root-level access with the β€œvpxuser” account to control ESXi infrastructure. If it’s breached, everything is at risk.

πŸ‘‡ Discover expert tips on strengthening your defenses and preventing catastrophic breaches: https://thehackernews.com/2025/01/ransomware-on-esxi-mechanization-of.html
πŸ‘17πŸ‘3🀯1
A new credit card skimmer targeting WordPress e-commerce sites has been discovered.

β€· Malicious JavaScript code is injected into WordPress databases.
β€· It activates ONLY on checkout pages to steal sensitive payment info.
β€· This stealthy malware evades traditional detection tools, making it a serious threat.

This attack is incredibly difficult to spot, putting your customers' data and your reputation at risk.

πŸ”— Read more: https://thehackernews.com/2025/01/wordpress-skimmers-evade-detection-by.html
πŸ”₯20πŸ‘11🀯8
⚠️ WARNING: Zero-Day Exploit Likely Behind Fortinet Attack.

Attackers created super admin accounts, hijacked SSL VPNs, and moved laterally through networks to extract credentials.

Learn more in the full article: https://thehackernews.com/2025/01/zero-day-vulnerability-suspected-in.html
🀯23πŸ‘8πŸ”₯8πŸ€”3
HuiOne Guarantee, an illicit Telegram-based marketplace, has surpassed Hydra with $24B in crypto inflows.

β€· $150K funneled from North Korea’s Lazarus hacking group πŸ’»
β€· Facilitating romance scams, human trafficking, and money laundering
β€· Monthly inflows up 51% since July 2024 πŸ“ˆ

Learn more: https://thehackernews.com/2025/01/illicit-huione-telegram-market.html
😁16πŸ‘7πŸ€”4πŸ‘1
🚨 Russian cyber attackers are actively targeting Kazakhstan’s Ministry of Foreign Affairsβ€”this isn't just a cyber attack; it’s an espionage campaign to steal sensitive political and economic data.

The attackers use infected Microsoft Office docs to bypass security and deploy powerful malware like HATVIBEβ€”designed to remain undetected.

Learn more: https://thehackernews.com/2025/01/russian-linked-hackers-target.html
πŸ‘22πŸ”₯7😱7πŸ€”5😁3🀯1
🚨 4 Reasons Your SaaS Attack Surface Can No Longer be Ignored in 2025!

πŸš€ 200 new SaaS accounts/month for 100 employeesβ€”each a potential breach point.
🎯 50% of breaches target SaaS apps.
πŸ€– Unmanaged GenAI tools pose huge security risks.
βš–οΈ Weak SaaS security = GDPR/CCPA violations.
Securing your SaaS is no longer optional!

πŸ‘‰ Learn how to protect your SaaS environment now: https://thehackernews.com/2025/01/4-reasons-your-saas-attack-surface-can.html
πŸ‘8πŸ‘2⚑1
πŸ“£ Tomorrow! Join a live webinar on AI security. Explore how agentic systems are reshaping traditional DevSecOps practices and discover top AI security use cases in today’s enterprises.

Join James Berthoty, Ron Bitton, and Dor Sarig for an in-depth discussion on agentic-related risks and a 2025 forecast. Don’t miss out!

πŸ“… Wednesday, January 15th, 11:30am ET
πŸ‘‰ Register here: https://thn.news/ai-security-navigating
πŸ‘14πŸ€”4πŸ‘1
Google’s OAuth login exposes a critical vulnerability, allowing attackers to access old employee accounts simply by purchasing a defunct domain from a failed startup.

Learn how this vulnerability could affect your organization: https://thehackernews.com/2025/01/google-oauth-vulnerability-exposes.html
😁16😱9πŸ‘5🀯5πŸ‘2
πŸ”“ New macOS flaw (CVE-2024-44243) discovered!

Attackers could have bypassed crucial protections to install persistent malware and rootkits, potentially letting them take full control of your system.

Explore the details: https://thehackernews.com/2025/01/microsoft-uncovers-macos-vulnerability.html
πŸ”₯13πŸ‘6😱6πŸ‘1
🚨 UPDATE: Fortinet Confirms Critical Zero-Day 🚨

CVE-2024-55591 in FortiOS & FortiProxy (CVSS 9.6) allows attackers to gain super-admin access & hijack firewalls.

Affected versions: FortiOS 7.0.0-7.0.16 & FortiProxy 7.0.0-7.2.12.

Upgrade now to 7.0.17+ or 7.0.20+ to mitigate risk.

https://thehackernews.com/2025/01/zero-day-vulnerability-suspected-in.html
πŸ”₯29πŸ‘17⚑6😁2
πŸ”΄ Critical Alert: Microsoft has just released a massive patch for 161 vulnerabilities across its software, including 3 zero-day flaws that have been actively exploited.

β€· CVE-2025-21333
β€· CVE-2025-21334
β€· CVE-2025-21335

Patch now: https://thehackernews.com/2025/01/3-actively-exploited-zero-day-flaws.html
πŸ‘28πŸ”₯18😁6πŸ‘3⚑2
🚨 Critical Flaws Discovered in SimpleHelp Software!

An attacker could exploit these flaws to execute remote code, steal sensitive data, and bring your entire system down.

βœ… Action required NOW:
β€· SimpleHelp has released critical patches.
β€· Change admin passwords immediately.
β€· Restrict logins to trusted IP addresses.

Read: https://thehackernews.com/2025/01/critical-simplehelp-flaws-allow-file.html
πŸ‘7⚑3πŸ”₯3πŸ€”2
πŸ”₯ FBI removes PlugX malware from 4,250+ compromised computers.

$7 β€” that’s all it took for the FBI to sink a hacker-controlled server and trigger a "self-delete" command.

Learn more: https://thehackernews.com/2025/01/fbi-deletes-plugx-malware-from-4250.html
⚑23πŸ‘7πŸ‘4πŸ”₯1
🚨 Six critical security flaws disclosed in Rsync could allow attackers to execute arbitrary code on clients.

Any server with a public mirror could be exploited, putting SSH keys and other critical files at risk.

Read the full advisory: https://thehackernews.com/2025/01/google-cloud-researchers-uncover-flaws.html
πŸ”₯15πŸ‘8🀯4
⚠️ Cyber-attacks on ICS/OT are escalatingβ€”Are YOU prepared?

β€· ICS/OT security demands custom strategies, not IT playbooks.
β€· Cyber-attacks are growing, threatening power grids, water systems, and more.

πŸ‘‰ Check out the SANS Five ICS/OT Cybersecurity Critical Controls: https://thehackernews.com/2025/01/the-high-stakes-disconnect-for-icsot.html
πŸ‘11πŸ€”2πŸ”₯1
πŸ”’ North Korean hackers behind IT worker fraud linked to 2016 crowdfunding scam!

These attacks aren’t slowing down. With DPRK-backed groups like Lazarus leading crypto thefts, the scale of cybercrime has reached alarming levels.

πŸ”— Read the full report: https://thehackernews.com/2025/01/north-korean-it-worker-fraud-linked-to.html
πŸ‘24πŸ”₯2πŸ€”2
πŸ”΄ Warning: North Korea’s Lazarus Group is targeting Web3 and cryptocurrency developers!

Fake recruiters on LinkedIn are tricking developers with β€œcoding projects” that lead to malware.

πŸ‘‰ Learn more about their tactics: https://thehackernews.com/2025/01/lazarus-group-targets-web3-developers.html
πŸ‘17πŸ”₯10⚑3
🧐 A new malvertising campaign is targeting businesses by stealing Google Ads credentials! Here’s how it works:

β€· Ads that look legitimate lead to fraudulent login pages.
β€· Phishers steal 2FA codes and credentials.
β€· The goal? Hijack Google Ads accounts to run fraudulent ads.

πŸ”— Read more here: https://thehackernews.com/2025/01/google-ads-users-targeted-in.html
πŸ‘17😱7πŸ”₯5⚑4🀯2
🚨 URGENT: A Python-based backdoor is now used in RansomHub ransomware attacks after initial access via a fake browser update.
πŸ‘‡
Want to learn more? Read: https://thehackernews.com/2025/01/python-based-malware-powers-ransomhub.html
⚑13πŸ‘2πŸ”₯2