The Hacker News
βœ”
151K subscribers
1.86K photos
10 videos
3 files
7.78K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
🚨 Alert: A previously unknown China-linked APT group, PlushDaemon, has been linked to a 2023 supply chain attack targeting a South Korean VPN provider.

From screen recording to browser password harvesting – this backdoor does it all.

Read more: https://thehackernews.com/2025/01/plushdaemon-apt-targets-south-korean.html
⚑8πŸ‘4πŸ”₯2
πŸ€” 65% of security teams rely solely on pentest vendors for their reports. What happens when you can’t verify those reports?

β€· HackGATE fixes this by offering real-time visibility into pentest activities.
β€· Gain deeper insight into every test phase, ensuring quality and accountability.

Don’t just trust the reportβ€”verify it!

⚑ See how HackGATE can help: https://thehackernews.com/2025/01/hackgate-setting-new-standards-for.html
πŸ‘9πŸ”₯3πŸ€”2
βš–οΈ U.S. President Trump pardons Ross Ulbricht, creator of the Silk Road darkweb marketplace, after 11 years behind bars.

Ulbricht’s life sentence for trafficking and hacking is now officially void.

πŸ‘‰ Read the full article: https://thehackernews.com/2025/01/president-trump-pardons-silk-road.html
🀯32πŸ‘24πŸ‘12πŸ€”11😁8πŸ”₯4
πŸ‡°πŸ‡΅ North Korean malware #InvisibleFerret uses fake tech job interviews

It's target: corporate info, crypto data, source code 🎯

Read comprehensive technical analysis of this threat from @AnyRun_app
https://thn.news/invisibleferret-tech-analysis
⚑10🀯7πŸ”₯6πŸ‘3😁2
πŸ” New FREE Risk Assessment for Security Teams!

As GenAI and SaaS apps become essential, your organization’s security risks are growing. Employees' browser behavior could be leaking sensitive data.

πŸ” Gain actionable insights and uncover hidden risks with this customized risk assessment: https://thehackernews.com/2025/01/discover-hidden-browsing-threats-free.html
πŸ”₯11⚑2
πŸ›‘ Zero-Day Exploit in Cambium Routers!

Threat actors are exploiting this flaw to deploy the AIRASHI botnet, carrying out powerful DDoS attacks of up to 3 Tbps.

Take action to secure your IoT devices before it’s too late.

Learn more here: https://thehackernews.com/2025/01/hackers-exploit-zero-day-in-cnpilot.html
πŸ‘14🀯9⚑1
πŸ”₯ The Trump administration has just terminated all DHS advisory committee memberships, including the key Cyber Safety Review Board (CSRB).

CSRB's past work included:
β€· Reporting on Log4Shell and LAPSUS$ intrusions
β€· Holding tech firms accountable for cybersecurity lapses
β€· Investigating Salt Typhoon, a Chinese hacking group targeting U.S. telecoms

Read β†’ https://thehackernews.com/2025/01/trump-terminates-dhs-advisory-committee.html
🀯38😱20πŸ‘16πŸ‘9😁9πŸ”₯8⚑5πŸ€”1
πŸ”’ Google uncovers "TRIPLESTRENGTH," a financially motivated hacker group targeting cloud environments for cryptojacking and ransomware.

Their extensive reach includes Google Cloud, AWS, and Microsoft Azure.

πŸ‘‰ Read the full report: https://thehackernews.com/2025/01/triplestrength-targets-cloud-platforms.html
πŸ‘25πŸ”₯1
🚨 Critical Cisco Flaw Exposes Admin Access!

A new vulnerability in Cisco Meeting Management (CVE-2025-20156) could allow attackers to gain full administrator control. πŸ”

Also, CISA and FBI issue a warning on Ivanti exploit chainsβ€”targeting government and private sector networks.

Learn more: https://thehackernews.com/2025/01/cisco-fixes-critical-privilege.html
πŸ‘19πŸ”₯1
⚠️ A new BackConnect (BC) malware linked to QakBot is out, and it's evolving FAST.

Both QakBot and Black Basta are using this shared tool to ramp up their attacks, affecting thousands.

Find out: https://thehackernews.com/2025/01/qakbot-linked-bc-malware-adds-enhanced.html
πŸ‘15πŸ”₯2
πŸ”Ž Is your website tracking users more than necessary?

🚨 45% of third-party apps on websites access sensitive user data unnecessarily.

Take steps to secure your siteβ€”get actionable tips in the full report: https://thehackernews.com/2025/01/new-research-state-of-web-exposure-2025.html
πŸ‘12⚑4πŸ‘3πŸ”₯1πŸ€”1
πŸ‘‰ 50-80% of enterprise breaches are due to credential & user-based attacks.

Legacy authentication methods are outdated and vulnerable, but cutting-edge authentication systems are now making attacks impossible.

Learn how to upgrade your security today: https://thehackernews.com/2025/01/eliminate-identity-based-threats.html
⚑7πŸ‘4πŸ”₯2
Did you know security teams can now enforce MFA on user accounts directly in their web browser β€” even for apps that don’t allow mandatory MFA enforcement?

With Push Security, spend less time chasing users to configure MFA or trying to manually enforce it across hundreds of apps.

https://thn.news/mfa-enforce-other
πŸ‘7⚑3πŸ‘3πŸ”₯2😁1
πŸ”’ HellCat & Morpheus Ransomware Sharing Identical Code!

Cybercriminals are using the same payload for attacksβ€”just with victim-specific tweaks. Smaller, more agile groups like these may dominate the threat landscape moving forward.

πŸ‘‰ Read analysis: https://thehackernews.com/2025/01/experts-find-shared-codebase-linking.html
πŸ”₯12⚑4πŸ‘4
πŸ”΄ A new malware campaign is exploiting fake CAPTCHA verifications to spread Lumma Stealer, affecting global organizations.

Targets are being tricked into downloading malware outside of the browser context.

Read the full report: https://thehackernews.com/2025/01/beware-fake-captcha-campaign-spreads.html
😁20πŸ€”7πŸ”₯3πŸ‘1
⚠️ URGENT: Security Flaws Found in Palo Alto Networks Firewalls

β€· BootHole CVE-2020-10713: Secure Boot bypass
β€· LogoFAIL & PixieFail: Code execution via firmware & network stack vulnerabilities
β€· Misconfigured SPI flash access in PA-415

πŸ‘‰ Read: https://thehackernews.com/2025/01/palo-alto-firewalls-found-vulnerable-to.html
πŸ‘11😁8😱7πŸ‘4πŸ”₯1
πŸ•΅οΈβ€β™‚οΈ J-magic Campaign </>

A New Breed of Malware – Attackers are using "magic packets" to remotely control Juniper routers and deploying a variant of the publicly available backdoor "cd00r" into enterprise networks.

Find out more: https://thehackernews.com/2025/01/custom-backdoor-exploiting-magic-packet.html
πŸ‘24πŸ€”6⚑3πŸ”₯2
🚨 Urgent Alert: CVE-2020-11023 is back in the spotlight!

CISA adds this jQuery flaw to its Known Exploited Vulnerabilities list after active exploitation was detected.

Learn more: https://thehackernews.com/2025/01/cisa-adds-five-year-old-jquery-xss-flaw.html

Review your jQuery versions and update immediately.
πŸ‘13⚑10
πŸ”‘ Google introduces Identity Check, a new feature for Android devices that locks sensitive settings behind biometric authentication when outside trusted locations.

Powered by AI, it helps protect devices against unauthorized access.

πŸ‘‰ Check out: https://thehackernews.com/2025/01/androids-new-identity-check-feature.html
πŸ€”27πŸ‘15πŸ”₯8⚑4πŸ‘2😁1
⚑ Why Zero Trust Is the Future of Cybersecurity

πŸ”‘ Only verified users get access to specific IT resources.
πŸ”’ Context-based security, driven by AI, ensures nothing slips through the cracks.
🌐 No more backhauling trafficβ€”secure, fast, direct-to-app access.

Explore the full article: https://thehackernews.com/expert-insights/2025/01/zero-trust-security-why-its-essential.html
πŸ‘14⚑8πŸ€”4πŸ”₯1