The Hacker News
βœ”
152K subscribers
1.86K photos
10 videos
3 files
7.78K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
πŸ” New FREE Risk Assessment for Security Teams!

As GenAI and SaaS apps become essential, your organization’s security risks are growing. Employees' browser behavior could be leaking sensitive data.

πŸ” Gain actionable insights and uncover hidden risks with this customized risk assessment: https://thehackernews.com/2025/01/discover-hidden-browsing-threats-free.html
πŸ”₯11⚑2
πŸ›‘ Zero-Day Exploit in Cambium Routers!

Threat actors are exploiting this flaw to deploy the AIRASHI botnet, carrying out powerful DDoS attacks of up to 3 Tbps.

Take action to secure your IoT devices before it’s too late.

Learn more here: https://thehackernews.com/2025/01/hackers-exploit-zero-day-in-cnpilot.html
πŸ‘14🀯9⚑1
πŸ”₯ The Trump administration has just terminated all DHS advisory committee memberships, including the key Cyber Safety Review Board (CSRB).

CSRB's past work included:
β€· Reporting on Log4Shell and LAPSUS$ intrusions
β€· Holding tech firms accountable for cybersecurity lapses
β€· Investigating Salt Typhoon, a Chinese hacking group targeting U.S. telecoms

Read β†’ https://thehackernews.com/2025/01/trump-terminates-dhs-advisory-committee.html
🀯38😱20πŸ‘16πŸ‘9😁9πŸ”₯8⚑5πŸ€”1
πŸ”’ Google uncovers "TRIPLESTRENGTH," a financially motivated hacker group targeting cloud environments for cryptojacking and ransomware.

Their extensive reach includes Google Cloud, AWS, and Microsoft Azure.

πŸ‘‰ Read the full report: https://thehackernews.com/2025/01/triplestrength-targets-cloud-platforms.html
πŸ‘25πŸ”₯1
🚨 Critical Cisco Flaw Exposes Admin Access!

A new vulnerability in Cisco Meeting Management (CVE-2025-20156) could allow attackers to gain full administrator control. πŸ”

Also, CISA and FBI issue a warning on Ivanti exploit chainsβ€”targeting government and private sector networks.

Learn more: https://thehackernews.com/2025/01/cisco-fixes-critical-privilege.html
πŸ‘19πŸ”₯1
⚠️ A new BackConnect (BC) malware linked to QakBot is out, and it's evolving FAST.

Both QakBot and Black Basta are using this shared tool to ramp up their attacks, affecting thousands.

Find out: https://thehackernews.com/2025/01/qakbot-linked-bc-malware-adds-enhanced.html
πŸ‘15πŸ”₯2
πŸ”Ž Is your website tracking users more than necessary?

🚨 45% of third-party apps on websites access sensitive user data unnecessarily.

Take steps to secure your siteβ€”get actionable tips in the full report: https://thehackernews.com/2025/01/new-research-state-of-web-exposure-2025.html
πŸ‘12⚑4πŸ‘3πŸ”₯1πŸ€”1
πŸ‘‰ 50-80% of enterprise breaches are due to credential & user-based attacks.

Legacy authentication methods are outdated and vulnerable, but cutting-edge authentication systems are now making attacks impossible.

Learn how to upgrade your security today: https://thehackernews.com/2025/01/eliminate-identity-based-threats.html
⚑7πŸ‘4πŸ”₯2
Did you know security teams can now enforce MFA on user accounts directly in their web browser β€” even for apps that don’t allow mandatory MFA enforcement?

With Push Security, spend less time chasing users to configure MFA or trying to manually enforce it across hundreds of apps.

https://thn.news/mfa-enforce-other
πŸ‘7⚑3πŸ‘3πŸ”₯2😁1
πŸ”’ HellCat & Morpheus Ransomware Sharing Identical Code!

Cybercriminals are using the same payload for attacksβ€”just with victim-specific tweaks. Smaller, more agile groups like these may dominate the threat landscape moving forward.

πŸ‘‰ Read analysis: https://thehackernews.com/2025/01/experts-find-shared-codebase-linking.html
πŸ”₯12⚑4πŸ‘4
πŸ”΄ A new malware campaign is exploiting fake CAPTCHA verifications to spread Lumma Stealer, affecting global organizations.

Targets are being tricked into downloading malware outside of the browser context.

Read the full report: https://thehackernews.com/2025/01/beware-fake-captcha-campaign-spreads.html
😁20πŸ€”7πŸ”₯3πŸ‘1
⚠️ URGENT: Security Flaws Found in Palo Alto Networks Firewalls

β€· BootHole CVE-2020-10713: Secure Boot bypass
β€· LogoFAIL & PixieFail: Code execution via firmware & network stack vulnerabilities
β€· Misconfigured SPI flash access in PA-415

πŸ‘‰ Read: https://thehackernews.com/2025/01/palo-alto-firewalls-found-vulnerable-to.html
πŸ‘11😁8😱7πŸ‘4πŸ”₯1
πŸ•΅οΈβ€β™‚οΈ J-magic Campaign </>

A New Breed of Malware – Attackers are using "magic packets" to remotely control Juniper routers and deploying a variant of the publicly available backdoor "cd00r" into enterprise networks.

Find out more: https://thehackernews.com/2025/01/custom-backdoor-exploiting-magic-packet.html
πŸ‘24πŸ€”6⚑3πŸ”₯2
🚨 Urgent Alert: CVE-2020-11023 is back in the spotlight!

CISA adds this jQuery flaw to its Known Exploited Vulnerabilities list after active exploitation was detected.

Learn more: https://thehackernews.com/2025/01/cisa-adds-five-year-old-jquery-xss-flaw.html

Review your jQuery versions and update immediately.
πŸ‘13⚑10
πŸ”‘ Google introduces Identity Check, a new feature for Android devices that locks sensitive settings behind biometric authentication when outside trusted locations.

Powered by AI, it helps protect devices against unauthorized access.

πŸ‘‰ Check out: https://thehackernews.com/2025/01/androids-new-identity-check-feature.html
πŸ€”27πŸ‘15πŸ”₯8⚑4πŸ‘2😁1
⚑ Why Zero Trust Is the Future of Cybersecurity

πŸ”‘ Only verified users get access to specific IT resources.
πŸ”’ Context-based security, driven by AI, ensures nothing slips through the cracks.
🌐 No more backhauling trafficβ€”secure, fast, direct-to-app access.

Explore the full article: https://thehackernews.com/expert-insights/2025/01/zero-trust-security-why-its-essential.html
πŸ‘14⚑8πŸ€”4πŸ”₯1
🚨 5 indicted in a major North Korean IT worker scam targeting U.S. companies!

β€· $866,000 funneled through shell accounts
β€· Remote laptop farms deceived employers into hiring fake workers
β€· One suspect arrested, others face up to 20 years in prison

πŸ‘‰ Learn More: https://thehackernews.com/2025/01/doj-indicts-5-individuals-for-866k.html
⚑10😁5πŸ‘3πŸ”₯2
πŸ›‘ Over 100 Vulnerabilities in LTE & 5G Discovered.

These flaws could give hackers a backdoor into cellular networksβ€”disrupting communications at a city-wide level.

β€· Attacks on phone calls, messaging, and data.
β€· Exploiting buffer overflows and memory errors.
β€· Non-authenticated mobile devices can exploit these flaws.

Read the full details: https://thehackernews.com/2025/01/ransacked-over-100-security-flaws-found.html
🀯31😱9πŸ‘8πŸ”₯6⚑2😁2
Learn cybersecurity risk management from the experts at Georgetown. Attend our webinar on February 6.

https://thn.news/cyber-risk-mgmt-ig
😁15πŸ‘8⚑2πŸ‘2
πŸ”‘ Only 14% of Organizations Can Recover SaaS Data in MINUTES!

The rest? It takes hours, or even daysβ€”putting compliance and productivity at serious risk.

Lost time = lost revenue.

πŸ” Find out how to level up your data resilience in the 2025 SaaS Backup and Recovery Report: https://thehackernews.com/2025/01/insights-from-2025-saas-backup-and-recovery-report.html
πŸ‘9⚑6πŸ‘6🀯6πŸ”₯4πŸ€”3