The Hacker News
βœ”
152K subscribers
1.87K photos
10 videos
3 files
7.79K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
πŸ”’ Taiwan Bans DeepSeek AI Due to National Security Risks.

Concern? Cross-border data transmission can compromise sensitive government and critical infrastructure data.

Meanwhile, in just three days, DeepSeek faced multiple waves of DDoS attacks.

Learn more: https://thehackernews.com/2025/02/taiwan-bans-deepseek-ai-over-national.html
😁33πŸ‘17πŸ”₯11😱4🀯3
🚨 Cyberattacks on cloud infrastructures are evolving fast, and your current security measures may not be enough.

AI-driven workflows and massive data migrations are expanding attack surfaces. Cloud security isn’t just about detection anymore – it’s about prevention.

Read how cloud security will transform in 2025 and beyond: https://thehackernews.com/2025/02/watch-out-for-these-8-cloud-security.html
πŸ‘10πŸ‘4πŸ”₯3⚑1
⚠️ FERRET malware targets macOS users through job scam.

North Korean hackers pose as recruiters on LinkedIn to lure victims. A fake "software update" compromises your system, steals data, and drains your crypto wallet.

Learn more: https://thehackernews.com/2025/02/north-korean-hackers-deploy-ferret.html
πŸ”₯11😁5πŸ‘4
πŸ” Russian cybercriminals are exploiting new 7-Zip vulnerability (CVE-2025-0411) to target Ukrainian organizations.

This flaw bypasses Windows' MotW protections, allowing remote code execution via malicious archives.

Learn more about the exploit: https://thehackernews.com/2025/02/russian-cybercrime-groups-exploiting-7.html
πŸ”₯25πŸ€”8πŸ‘1
Python vs. no-code for security automation - a side-by-side breakdown πŸ”Ž

Security teams sometimes debate whether to write custom Python scripts or use a no-code platform like Tines for SOAR. Both have their advantages - but how do they compare in real-world automation?

In this blog post, security researcher Conor Dunne shares:

πŸ’‘ The security, maintenance, and performance trade-offs of each approach
πŸ’‘ A side-by-side comparison of core automation components - HTTP requests, webhooks, scheduling, and more
πŸ’‘ A real-world case study: automating a Slack news feed

Read the blog post: https://thn.news/tines-python-automation-fb
πŸ€”7πŸ‘4🀯4😁2
🚨 Alert! A malicious package targeting the Go ecosystem has backdoored countless systemsβ€”giving hackers remote access.

Despite changes to the original GitHub repository, the malicious version persisted, targeting unsuspecting developers.

πŸ‘‰ Learn more: https://thehackernews.com/2025/02/malicious-go-package-exploits-module.html
😱17πŸ‘9⚑5πŸ€”5😁3πŸ”₯1
⚠️ A newly disclosed vulnerability in Microsoft SharePoint connector could have allowed attackers to harvest user credentials and launch attacks across Power Automate, Power Apps, and Copilot 365.

Learn more: https://thehackernews.com/2025/02/microsoft-sharepoint-connector-flaw.html
πŸ”₯18🀯6😁5πŸ‘3⚑2πŸ€”1
πŸ”΄ CISA warns of critical actively exploited security flaws in popular enterprise software.

This includes high-severity vulnerabilities in Apache OFBiz, Microsoft .NET Framework, and Paessler PRTG Network Monitor.

Act before it’s too late.

Read: https://thehackernews.com/2025/02/cisa-adds-four-actively-exploited.html
😁10πŸ‘8🀯4πŸ”₯2
⚠️ Managing Active Directory (AD) and Entra ID in hybrid environments? You might be exposing your organization to critical vulnerabilities. Here’s why:

β€· Privilege Sprawl from mergers, mobility, and acquisitions
β€· Standing Privileges create unmonitored opportunities for attackers to exploit
β€· Manual systems can't keep up with the growing complexity

πŸ”§ Automate your identity managementβ€”save time and reduce human error.

πŸ‘‰ Get the Full Guide: https://thehackernews.com/expert-insights/2025/02/using-roles-and-attributes-to-protect.html
πŸ‘8πŸ”₯8😁2⚑1
🚨 ALERT: AsyncRAT Strikes Using Dropbox & TryCloudflare

β€· Phishing emails start the chain, leading to AsyncRAT and other malware.
β€· Hackers are now using Dropbox URLs and TryCloudflare tunnels to hide malicious activity.
β€· Python payloads launch a multi-stage attack, making detection nearly impossible.

Check out details: https://thehackernews.com/2025/02/asyncrat-campaign-uses-python-payloads.html
πŸ‘10πŸ€”7⚑1πŸ‘1
🚨 Vulnerability Assessments Soar in 2024. 24% of organizations now conduct assessments more than 4 times a yearβ€”up from 15% in 2023!

This shift to continuous monitoring means faster responses to threats and stronger defenses.

How is your organization keeping up? πŸ‘‡ Explore the full report now: https://thehackernews.com/2025/02/navigating-future-key-it-vulnerability.html
πŸ‘10⚑3😁1
πŸ›‘ Security Alert for Veeam Users! CVE-2025-23114 has a CVSS score of 9.0.

This new critical Man-in-the-Middle attack could allow hackers to execute arbitrary code on your servers.

βœ… Fix is Available! Check out the details here: https://thehackernews.com/2025/02/new-veeam-flaw-allows-arbitrary-code.html
πŸ‘8⚑2πŸ€”2
πŸ”’ Silent Lynx's Multi-Stage Attack Exposed: Targeting Embassies, Law Firms, and Banking Institutions

The group leverages RAR files, C++ binaries, and PowerShell scripts to infiltrate systems and exfiltrate sensitive data.

Read the full article here: https://thehackernews.com/2025/02/silent-lynx-using-powershell-golang-and.html
🀯9⚑6
πŸ”’ Hackers are exploiting tools like Axios and Node Fetch to take over Microsoft 365 accountsβ€”targeting high-value employees across industries like finance, healthcare, and IT.

Attack volume spiked to over 13 million login attempts in one password spraying campaign.

Read the full report: https://thehackernews.com/2025/02/cybercriminals-use-axios-and-node-fetch.html
πŸ‘8πŸ”₯7⚑5😱3
🚨 WARNING: Infamous North Korea-linked Lazarus Group is using fake job offers to spread cross-platform malwareβ€”targeting crypto and travel industries.

🏑✈️ Fake recruiter offers remote positions in crypto/travel
πŸ“„ Victims send personal info (CVs, GitHub links)
‼️ Attackers deploy a JavaScript data stealer and Python backdoor

This is a complex attack chain that can give attackers persistent remote access to your systems.

Learn more: https://thehackernews.com/2025/02/cross-platform-javascript-stealer.html
πŸ‘14🀯11⚑8😁6
πŸ”΄ Hacktivism has evolved – from political protest to full-blown cyber warfare. The latest surge in DDoS attacks is shaking both the public and private sectors.

These attacks are not just about disruptionβ€”they're designed to manipulate public opinion and disrupt elections. Now's the time to be aware.

Want to know how geopolitics is shaping the cyber landscape? Read the full analysis now:

https://thehackernews.com/expert-insights/2025/02/hacking-in-name-of.html
πŸ”₯20πŸ‘10😁4⚑2πŸ€”2
πŸ›‘ Cisco just patched two critical vulnerabilities in Identity Services Engine (ISE) that could allow attackers to execute arbitrary commands and escalate privileges remotely.

⚠️ CVE-2025-20124 & CVE-2025-20125 carry CVSS scores of 9.9 and 9.1.

Read β€” https://thehackernews.com/2025/02/cisco-patches-critical-ise.html
😁17πŸ”₯4πŸ‘2πŸ‘1
πŸ›‘ North Korea-linked Kimsuky hacking group now using forceCopy, a new info-stealer malware targeting browser credentials.

Spear-phishing emails trick victims into opening disguised Windows shortcut files. PowerShell and mshta.exe trigger malware download, leading to deeper infection.

πŸ‘‰ Read More: https://thehackernews.com/2025/02/north-korean-apt-kimsuky-uses-lnk-files.html
πŸ‘8πŸ€”7⚑3😁3πŸ‘1
🚨 New malware campaign "SparkCat" has been discovered on Apple and Google app stores, using OCR to target crypto wallet recovery phrases.

Read the full report: https://thehackernews.com/2025/02/sparkcat-malware-uses-ocr-to-extract.html
πŸ€”12🀯6😁4πŸ‘1
Ransomware is hitting harder in 2025. Hackers demand millionsβ€”and paying up doesn’t guarantee you’ll get your data back.

LockBit, Lynx, and Virlockβ€”ransomware groups are evolving, targeting everyone from small businesses to critical infrastructure.

Get the full breakdown on how to defend against these threats.: https://thehackernews.com/2025/02/top-3-ransomware-threats-active-in-2025.html
πŸ‘14⚑8πŸ€”3πŸ”₯2