The Hacker News
βœ”
152K subscribers
1.87K photos
10 videos
3 files
7.78K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
πŸ›‘ XE Group has evolved. They’re no longer just stealing credit card dataβ€”they’re exploiting zero-day vulnerabilities (like CVE-2024-57968 in VeraCore) to target supply chains

Once in, they can drop reverse shells, exfiltrate files, and even modify data

https://thehackernews.com/2025/02/xe-hacker-group-exploits-veracore-zero.html
😁8πŸ‘4😱3⚑2πŸ€”2
Zimbra's latest patch addresses three new vulnerabilities:

β€’ SQL Injection (CVE-2025-25064) exposing email metadata to authenticated attackers.
β€’ XSS vulnerability in the Classic Web Client, risking user security.
β€’ SSRF flaw (CVE-2025-25065) allowing unauthorized redirection to internal systems.

Upgrade ASAP to avoid potential exploitation and secure your systems.

Read: https://thehackernews.com/2025/02/zimbra-releases-security-updates-for.html
πŸ”₯13πŸ‘6😁3⚑1
A Chinese-speaking hacker group, DragonRank, is targeting IIS servers across Asia with BadIIS malware, redirecting users to rogue gambling sites.

Critical sectorsβ€”governments, universities, and tech firmsβ€”are at risk.

πŸ”— Read more: https://thehackernews.com/2025/02/dragonrank-exploits-iis-servers-with.html
πŸ‘11😁10πŸ”₯3πŸ€”3⚑2🀯1
🚨 This Week in Cyber: Hackers Are Getting Smarterβ€”Are You?

πŸ”Ή AI-powered fraud is on the rise
πŸ”Ή Stolen ASP .NET keys fuel cyberattacks
πŸ”Ή Ransomware payouts drop, but attacks surge
πŸ”Ή Abandoned cloud storage = hacker goldmine

Stay ahead of the threats. Read the full recap now: https://thehackernews.com/2025/02/thn-weekly-recap-top-cybersecurity_10.html
πŸ‘11⚑5πŸ‘4
⚠️ WARNING: Hackers are using Google Tag Manager (GTM) to deliver credit card skimming malware on Magento e-commerce sites.

Targeting checkout pages to capture credit card details
3 sites found infected; it could be more

Learn more about this attack: https://thehackernews.com/2025/02/hackers-exploit-google-tag-manager-to.html
πŸ‘22😁10πŸ”₯8⚑5
πŸ›‘ Apple has released emergency security updates for iOS and iPadOS to patch a vulnerability exploited in the wild.

This flaw, identified as CVE-2025-24200, could allow attackers to disable USB Restricted Mode on locked devices.

Update your devices now: https://thehackernews.com/2025/02/apple-patches-actively-exploited-ios.html
πŸ”₯19πŸ‘6⚑3πŸ€”2
πŸ”’ Think VPNs are enough? Think again. VPNs are a band-aid solutionβ€”they expose your network to new attack vectors. Attacks through VPNs can bypass security defenses like firewalls.

Want a better way to secure your network? Discover Zero Trust and how it reduces your risk.

Read more now: https://thehackernews.com/expert-insights/2025/02/eliminate-your-attack-surface-by.html
πŸ‘15πŸ”₯7🀯7⚑4😱2
A global law enforcement operation has shut down the dark web data leak and negotiation sites tied to the notorious 8Base ransomware gang.

The seizure of over 40 pieces of evidence signals serious progress in the fight against cybercrime.

Find out more: https://thehackernews.com/2025/02/8base-ransomware-data-leak-sites-seized.html
😁12😱8⚑7πŸ‘5πŸ€”1
🚨 Cybercriminals are using the ClickFix technique to deliver NetSupport RATβ€”a powerful malware that gives attackers full control over your device.

Fake CAPTCHA pages are injecting malicious PowerShell commands to deploy the malware.

Learn more: https://thehackernews.com/2025/02/threat-actors-exploit-clickfix-to.html
πŸ”₯13⚑5πŸ‘5
🚨 DDoS Attacks Skyrocket by 56%β€”2 Tbps Peak!

The largest DDoS attack ever recorded hit a shocking 2 Tbps in Q3–Q4 2024, marking an 18% increase from the previous record.

Learn how to protect your organization from the rising tide of DDoS threats

Read: https://thehackernews.com/2025/02/gcore-ddos-radar-reveals-56-yoy.html
πŸ‘8🀯4⚑3
πŸ”’ Progress Software has patched high-severity vulnerabilities in its LoadMaster software. These flaws could let hackers execute commands or download sensitive files.

Act now: Update to version 7.2.61.0 or higher to fix these critical flaws.

Learn more: https://thehackernews.com/2025/02/progress-software-patches-high-severity.html
πŸ‘5πŸ”₯4⚑2
🚨 MFA is more critical than everβ€”but it's NOT without its challenges.

The price of implementing MFA goes beyond just subscriptions. Training, support, and help desk calls add up.

Learn how to make MFA work for your business without the sticker shock: https://thehackernews.com/2025/02/4-ways-to-keep-mfa-from-becoming-too.html
πŸ‘13⚑2πŸ‘2
πŸ”¬ Industry-first report examines the relationship between remediation delays and incidents, based on insights from over 150 security decision makers in large U.S. enterprises.

Some key findings:
⚑ Over 62% of incidents are directly related to backlogged risks that the security team was already fully aware of.
⚑ It takes organizations 10X longer to remediate vulnerabilities than it takes for attackers to exploit them.

Get ZEST Security's full report here: https://thn.news/cloud-risk-impact-2025
😁5πŸ‘4⚑2
⚑ Google confirms the new Android SafetyCore DOES NOT perform client-side scanning of your content

Β» Uses machine learning to flag scams, spam, and malware on your deviceβ€”not in the cloud
Β» You control which apps can access the system
Β» No secret scanning of your private data

πŸ‘‰ Read more: https://thehackernews.com/2025/02/google-confirms-android-safetycore.html
πŸ€”24πŸ‘8😁6⚑3
🚨 Critical security flaws discovered in Ivanti products could allow attackers to execute arbitrary code remotely.

The vulnerabilities (CVE-2024-38657, CVE-2025-22467, CVE-2024-10644, and CVE-2024-47908) impact Ivanti Connect Secure, Policy Secure, and Cloud Services Application.

Read the full details: https://thehackernews.com/2025/02/ivanti-patches-critical-flaws-in.html
πŸ‘13😁5⚑4πŸ”₯3🀯2πŸ‘1
🚨 Microsoft has released patches for 63 flaws, including 2 actively exploited vulnerabilities.

CVE-2025-21391 allows attackers to delete crucial files, while CVE-2025-21418 enables SYSTEM privilege escalation on Windows.

πŸ”§ Apply the latest update now. Read more: https://thehackernews.com/2025/02/microsofts-patch-tuesday-fixes-63-flaws.html
πŸ‘19😁4😱4πŸ€”3πŸ‘1
πŸ”’ Are your Okta passwords strong enough to stop cybercriminals? Secure Okta with robust password policies, phishing-resistant 2FA, and behavior detection rules.

⏰ Don’t wait until it’s too lateβ€”explore the essential security settings to safeguard your organization today.

πŸ”§ Read More: https://thehackernews.com/2025/02/dont-overlook-these-6-critical-okta.html
πŸ‘5⚑3πŸ”₯1😁1
⚠️ Kimsuky, the North Korea-linked hacker group, is adopting a new tactic: deceiving victims into running malicious PowerShell commands.

This method tricks targets into executing harmful code that allows remote access and data theft.

Learn more: https://thehackernews.com/2025/02/north-korean-hackers-exploit-powershell.html
πŸ‘12πŸ”₯9😁3⚑2
Learn from the infosec lead at a bank who cut threat response time in half and saved millions of dollars in prevented incidents on a budget.

Must-read for all CISOs out there: https://thn.news/bank-security-sandbox-tg
πŸ”₯13πŸ‘7😁1
CISOs are becoming AI leaders – and there’s a framework to guide them.

The CLEAR framework is your roadmap!
➀ Create AI asset inventories
➀ Learn user behaviors
➀ Enforce AI policies
➀ Apply security-focused AI use cases
➀ Reuse existing frameworks (NIST, ISO)

πŸ”— Read more: https://thehackernews.com/2025/02/how-to-steer-ai-adoption-ciso-guide.html
πŸ‘7πŸ‘1