The Hacker News
βœ”
152K subscribers
1.87K photos
10 videos
3 files
7.78K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
🚨 Six critical security flaws disclosed in Rsync could allow attackers to execute arbitrary code on clients.

Any server with a public mirror could be exploited, putting SSH keys and other critical files at risk.

Read the full advisory: https://thehackernews.com/2025/01/google-cloud-researchers-uncover-flaws.html
πŸ”₯15πŸ‘8🀯4
⚠️ Cyber-attacks on ICS/OT are escalatingβ€”Are YOU prepared?

β€· ICS/OT security demands custom strategies, not IT playbooks.
β€· Cyber-attacks are growing, threatening power grids, water systems, and more.

πŸ‘‰ Check out the SANS Five ICS/OT Cybersecurity Critical Controls: https://thehackernews.com/2025/01/the-high-stakes-disconnect-for-icsot.html
πŸ‘11πŸ€”2πŸ”₯1
πŸ”’ North Korean hackers behind IT worker fraud linked to 2016 crowdfunding scam!

These attacks aren’t slowing down. With DPRK-backed groups like Lazarus leading crypto thefts, the scale of cybercrime has reached alarming levels.

πŸ”— Read the full report: https://thehackernews.com/2025/01/north-korean-it-worker-fraud-linked-to.html
πŸ‘24πŸ”₯2πŸ€”2
πŸ”΄ Warning: North Korea’s Lazarus Group is targeting Web3 and cryptocurrency developers!

Fake recruiters on LinkedIn are tricking developers with β€œcoding projects” that lead to malware.

πŸ‘‰ Learn more about their tactics: https://thehackernews.com/2025/01/lazarus-group-targets-web3-developers.html
πŸ‘17πŸ”₯10⚑3
🧐 A new malvertising campaign is targeting businesses by stealing Google Ads credentials! Here’s how it works:

β€· Ads that look legitimate lead to fraudulent login pages.
β€· Phishers steal 2FA codes and credentials.
β€· The goal? Hijack Google Ads accounts to run fraudulent ads.

πŸ”— Read more here: https://thehackernews.com/2025/01/google-ads-users-targeted-in.html
πŸ‘17😱7πŸ”₯5⚑4🀯2
🚨 URGENT: A Python-based backdoor is now used in RansomHub ransomware attacks after initial access via a fake browser update.
πŸ‘‡
Want to learn more? Read: https://thehackernews.com/2025/01/python-based-malware-powers-ransomhub.html
⚑13πŸ‘2πŸ”₯2
🚨 Ivanti has released urgent security updates to fix four critical vulnerabilities affecting EPM, Avalanche, and Application Control Engine. These flaws have been rated 9.8/10 on the CVSS scale, and if left unpatched, could allow remote attackers to leak sensitive data.

Learn more: https://thehackernews.com/2025/01/researcher-uncovers-critical-flaws-in.html
⚑9πŸ‘6πŸ”₯1
🚨 New phishing campaigns are using hidden code in images to deploy VIP Keylogger and 0bj3ctivity Stealer.

From the email to a PowerShell script to a .NET loaderβ€”everything is designed to bypass defenses.

πŸ”— Find out more about this rising threat: https://thehackernews.com/2025/01/hackers-hide-malware-in-images-to.html
⚑14πŸ‘4πŸ”₯1
πŸ”’ A new flaw (CVE-2024-7344) in UEFI systems has been discovered, letting attackers run unsigned code during system bootβ€”even with Secure Boot enabled.

Read more ➑️ https://thehackernews.com/2025/01/new-uefi-secure-boot-vulnerability.html
🀯26πŸ‘8⚑5😁4πŸ”₯2😱2
πŸ”΄ NTLMv1 Not Dead Yet!

Researchers uncover that a misconfiguration in on-premise apps can easily bypass Active Directory’s Group Policy meant to disable NTLMv1 authentication.

Learn How: https://thehackernews.com/2025/01/researchers-find-exploit-allowing.html
πŸ‘15😱7⚑3πŸ‘1
πŸ”‘ Stolen credentials are responsible for 80% of web app breaches in 2023-2024!

β€· Infostealer malware is fueling this rise, with credentials being sold for as little as $10.
β€· Even large companies with high security budgets are falling victim.

Learn how to tackle stolen credentials before they destroy your organization’s security.

πŸ”— Full article here: https://thehackernews.com/2025/01/the-10-cyber-threat-responsible-for.html
πŸ‘14πŸ‘1
🚨 Traditional trust management is failing in today’s digital world. As IoT devices explode, certificates pile up, and compliance rules tighten, how are you keeping up?

πŸ”‘ The solution? DigiCert ONE!
β€· Centralized trust management for devices, users, and workloads
β€· Automated security for hybrid environments
β€· Stress-free compliance

πŸ’‘Why it matters: The speed of digital transformation means old solutions just won’t cut it anymore. You need real-time, automated security.

πŸ“… Want to see how it works? Register for our free webinar now: https://thehackernews.com/2025/01/ready-to-simplify-trust-management-join.html
πŸ‘17πŸ”₯3πŸ‘1
⚑ A major shift in attack tactics – Star Blizzard, previously known as SEABORGIUM, is now exploiting WhatsApp accounts through a spear-phishing campaign.

β€· Primary targets: Diplomats, Ukraine supporters, and defense officials.
β€· Once clicked, hackers gain access to WhatsApp messages and data.

Learn more: https://thehackernews.com/2025/01/russian-star-blizzard-shifts-tactics-to.html
πŸ‘14😱5πŸ”₯1πŸ‘1
πŸ›‘ Alert : TikTok, SHEIN, AliExpress, and others accused of violating EU data laws by sending user data to China.

Privacy Group noyb demands suspension of data flows.

Find out more: https://thehackernews.com/2025/01/european-privacy-group-sues-tiktok-and.html
πŸ‘35😁20😱10πŸ‘7🀯7πŸ€”5πŸ”₯3
πŸ›‘οΈ The U.S. Treasury just sanctioned 2 individuals and 4 entities tied to North Korea’s illicit IT worker networkβ€”a major blow to funding its WMD and missile programs.

πŸ‘‰ Read More: https://thehackernews.com/2025/01/us-sanctions-north-korean-it-worker.html
πŸ‘17⚑4😁4πŸ”₯2
πŸ›‘ New Adversary-in-the-Middle Phishing Kit Alert!

A powerful new phishing kit called Sneaky 2FA has been discovered, designed to steal your credentials and bypass 2FA.

β€· Sold as a service via Telegram, offering an easy path for cybercriminals
β€· Built to outsmart anti-bot systems and Cloudflare challenges

πŸ‘‰ Learn how: https://thehackernews.com/2025/01/new-sneaky-2fa-phishing-kit-targets.html
πŸ‘24⚑5πŸ”₯1
🚨 Most companies are still relying on outdated security models for guest Wi-Fi.

It’s time to move beyond traditional security models and adopt Zero Trust for tighter control and constant verification.

β€· Prevent lateral movement
β€· Continuous verification
β€· Granular access control

πŸ‘‰ Explore how: https://thehackernews.com/2025/01/how-to-bring-zero-trust-to-wi-fi.html
😁17πŸ‘9πŸ€”2πŸ”₯1
🚨 Researchers discovered 3 vulnerabilities in WGS-804HPT switches used in automation systemsβ€”exploitable to execute remote code.

β€· CVE-2024-52320 & CVE-2024-48871: Critical 9.8 scores!
β€· Attackers can execute remote code with just a malicious HTTP request.

Read the full report: https://thehackernews.com/2025/01/critical-flaws-in-wgs-804hpt-switches.html
🀯23πŸ‘16😁4πŸ”₯2
πŸ›‘ The U.S. Treasury has sanctioned a Chinese cybersecurity firm and a Shanghai-based actor linked to the Salt Typhoon hacking group. This follows a recent breach of U.S. Treasury IT systems.

Read the full story: https://thehackernews.com/2025/01/us-sanctions-chinese-cybersecurity-firm.html
⚑35πŸ‘11😁11😱10🀯3πŸ”₯2πŸ€”1
🚨 Warning to Developers: Malicious Solana-related npm and PyPI packages are designed to steal #Solana private keys, drain wallets, and even delete your files.

Learn more: https://thehackernews.com/2025/01/hackers-deploy-malicious-npm-packages.html
😁24πŸ”₯9😱6πŸ‘5⚑2πŸ€”1