The Hacker News
βœ”
152K subscribers
1.87K photos
10 videos
3 files
7.79K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
South Korea halts downloads of Chinese AI chatbot DeepSeek due to data protection concerns.

The suspension comes after security flaws were discovered and non-compliance with local privacy laws.

Read: https://thehackernews.com/2025/02/south-korea-suspends-deepseek-ai.html
πŸ‘24😁15⚑5πŸ€”4πŸ”₯2πŸ‘1😱1
🚨 This week’s update: Former Google insider charged with espionage, UI flaws targeted by nation-state actors, and critical patches needed for ThinkPHP and OwnCloud.

Get the full scoop here: https://thehackernews.com/2025/02/thn-weekly-recap-google-secrets-stolen.html
πŸ‘11🀯5πŸ”₯4⚑2😁1
Is something missing from your cybersecurity strategy? It could be CTEM's continuous threat validation.

Discover why Continuous Threat Exposure Management (CTEM) is the next-gen solution for proactive cybersecurity.

πŸ”— Explore the full report to learn more about CTEM: https://thehackernews.com/2025/02/cisos-expert-guide-to-ctem-and-why-it.html
πŸ‘16😁4πŸ”₯2⚑1
🚨 Microsoft uncovers a new, advanced variant of the XCSSET malware targeting macOS users. It's the first major revision since 2022.

This latest update features sophisticated obfuscation and persistence methods, making it harder to detect and stop.

Learn about these new techniques: https://thehackernews.com/2025/02/microsoft-uncovers-new-xcsset-macos.html
πŸ‘16πŸ”₯11😁2πŸ€”1
⚠️ New MageCart malware targets Magento sites, hiding in <img> tags to avoid detection.

The code stays dormant until a user visits a checkout πŸ›’ page β€” then it springs into action, capturing card details.

πŸ”— Read the full article: https://thehackernews.com/2025/02/cybercriminals-exploit-onerror-event-in.html
😁13πŸ‘3πŸ”₯3πŸ‘3
🚨 Security vulnerabilities in Xerox VersaLink printers could allow attackers to steal authentication credentials via pass-back attacks, exposing critical systems.

CVE-2024-12510 and CVE-2024-12511 impact LDAP and SMB/FTP services and could lead to compromised Windows Active Directory access.

Get the full details: https://thehackernews.com/2025/02/new-xerox-printer-flaws-could-let.html
😱13πŸ‘6πŸ€”4😁3🀯3
⚠️ A new campaign called RevivalStone, attributed to the China-linked Winnti group, is targeting Japanese manufacturers, materials, and energy sectors.

The attacks leveraging sophisticated tools like DEATHLOTUS and UNAPIMON to infiltrate and control enterprise systems.

Learn more: https://thehackernews.com/2025/02/winnti-apt41-targets-japanese-firms-in.html
πŸ‘15πŸ€”5πŸ”₯3
🚨 Critical vulnerability in Juniper Networks devices could let attackers hijack control.

The flaw affects Session Smart Routers, Conductor, and WAN Assurance Routersβ€”putting your network at risk.

Update your devices now. Get the full details here: https://thehackernews.com/2025/02/juniper-session-smart-routers.html
πŸ‘15πŸ€”3🀯1
New macOS malware alert: FrigidStealer is targeting users outside North America through fake updates to steal sensitive data.

This threat is linked to the elusive TA2727 group, which also spreads malware like Lumma Stealer and Marcher via web injects.

https://thehackernews.com/2025/02/new-frigidstealer-malware-targets-macos.html
😁12πŸ‘6πŸ”₯2πŸ€”2😱1
πŸ’» 93% of malware still relies on the Top 10 MITRE ATT&CK techniques.

πŸ›‘οΈ Focus on proven TTPs like credential theft and process injection to defend against the threats that matter today.

πŸ”— Explore the full insights in the Picus Red Report 2025: https://thehackernews.com/2025/02/debunking-ai-hype-inside-real-hacker.html
😁8πŸ‘5πŸ€”2⚑1
🐼 Mustang Panda, a Chinese state-backed group, has evolved its attack methods by using Microsoft’s MAVInject.exe to inject malware into external processes, bypassing antivirus detection and remaining undetected.

Read more about the attack chain: https://thehackernews.com/2025/02/chinese-hackers-exploit-mavinjectexe-to.html
πŸ‘19πŸ”₯4πŸ€”4
πŸ”΄ Two new vulnerabilities found in OpenSSH – one allowing active Man-in-the-Middle (MitM) attacks and the other leading to Denial-of-Service (DoS).

Get the details on CVE-2025-26465 and CVE-2025-26466: https://thehackernews.com/2025/02/new-openssh-flaws-enable-man-in-middle.html
πŸ”₯30😱15πŸ‘3⚑1πŸ€”1🀯1
🚨 Two critical vulnerabilities in Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN are actively exploited, now added to CISA's KEV catalog.

CVE-2025-0108 allows unauthenticated attackers to bypass PAN-OS security, while CVE-2024-53704 compromises SSLVPN authentication.

Exploitation is escalating, with attack traffic spiking 10x in a week. Act now!

Read More: https://thehackernews.com/2025/02/cisa-adds-palo-alto-networks-and.html
πŸ‘16😁8πŸ‘1πŸ€”1
🚨ALERT: A global cryptocurrency miner campaign is targeting gamers.

Cybercriminals are using popular games like BeamNG-drive and Garry's Mod to deliver malicious software, secretly mining cryptocurrency on infected gaming rigs.

Learn more: https://thehackernews.com/2025/02/trojanized-game-installers-deploy.html
🀯13πŸ€”6πŸ‘4😁1
⚠️ Exposed or forgotten assets are prime hacker targets. In 2024, over 60% of breaches started with small, overlooked assets like old subdomains.

Learn how Attack Surface Management (ASM) helps you detect changes in real time and secure vulnerable assets.

Read: https://thehackernews.com/expert-insights/2025/02/how-hackers-exploit-your-attack-surface.html
πŸ‘17πŸ€”5
Looking to grow your cybersecurity business? vCISO services are the key to capturing the growing demand for strategic leadership.

This Ultimate Guide breaks down actionable steps for MSPs and MSSPs to build a profitable vCISO practice.

Check out: https://thehackernews.com/2025/02/the-ultimate-msp-guide-to-structuring.html
πŸ€”7πŸ‘1🀯1
A new Snake Keylogger variant is targeting Windows users in China, Turkey, Indonesia, Taiwan, and Spain, with over 280 million infection attempts blocked in a year.

Delivered via phishing emails, it logs keystrokes, steals credentials, and monitors clipboards from browsers like Chrome and Firefox.

Read more: https://thehackernews.com/2025/02/new-snake-keylogger-variant-leverages.html
πŸ”₯17πŸ€”5⚑4πŸ‘4😁3😱2πŸ‘1
Russian-aligned threat actors are using malicious QR codes to hijack Signal accounts via the app’s legitimate β€œlinked devices” feature.

Once compromised, threat actors gain real-time access to victim messages, enabling persistent surveillance.

Learn how these attacks work: https://thehackernews.com/2025/02/hackers-exploit-signals-linked-devices.html
πŸ”₯23😁11🀯11πŸ‘3⚑2πŸ€”2πŸ‘1
🚨 Microsoft has issued high-severity security updates for Bing (CVE-2025-21355) and Power Pages (CVE-2025-24989), addressing two serious flaws.

One of these vulnerabilities is already being exploited in the wild.

Read more: https://thehackernews.com/2025/02/microsoft-patches-actively-exploited.html
πŸ”₯13πŸ‘6πŸ€”5😁4
Citrix has patched a severe flaw in NetScaler Console & Agent (CVE-2024-12284) with a CVSS score of 8.8.

This privilege escalation bug could allow authenticated attackers to execute unauthorized actions.

UPDATE immediately to the latest versions.

Read: https://thehackernews.com/2025/02/citrix-releases-security-fix-for.html
⚑9πŸ‘6πŸ€”2πŸ”₯1