The Hacker News
βœ”
152K subscribers
1.88K photos
10 videos
3 files
7.79K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
Cybercriminals are leveraging fake CAPTCHA images in phishing PDFs to distribute the dangerous Lumma Stealer malware.

260 unique domains and 5,000 phishing PDFs, mostly hosted on Webflow, are part of this ongoing campaign.

Learn more about the tactics: https://thehackernews.com/2025/02/5000-phishing-pdfs-on-260-domains.html
⚑12πŸ”₯7πŸ‘5πŸ€”3
πŸ” RDP allows remote work and efficient IT management, but it’s also a prime target for cyberattacks.

50% of SMBs use RDP daily, cutting costs and downtimeβ€”but exposing systems to the internet increases vulnerability.

Find out how to fortify your RDP and reduce the risk in the full article: https://thehackernews.com/2025/02/rdp-double-edged-sword-for-it-teams.html
πŸ‘20πŸ”₯6⚑4πŸ‘1
A Serbian activist’s Android phone was unlocked using a zero-day exploit developed by Cellebrite.

This attack leveraged a vulnerability in Android USB drivers, enabling attackers to bypass lock screens.

Read the full article to uncover how this exploit was used: https://thehackernews.com/2025/02/amnesty-finds-cellebrites-zero-day.html
πŸ”₯34πŸ€”13πŸ‘11🀯6⚑3😁2
Mozilla updates Firefox’s Terms of Use after user concerns over data rights.

The new revisions clarify that Mozilla doesn’t own your dataβ€”but the language change follows a wave of community criticism.

Read the full breakdown here: https://thehackernews.com/2025/03/mozilla-updates-firefox-terms-again.html
πŸ”₯37😁19πŸ‘14🀯14πŸ€”11⚑5
A botnet malware is rapidly spreading across 226 countries, infecting over 1.5 million Android TV devices.

RSA and XXTEA encryption make it harder to detect and trace the botnet’s activity.

Read the full analysis here: https://thehackernews.com/2025/03/vo1d-botnets-peak-surpasses-159m.html
😱18πŸ‘11😁6⚑5πŸ€”4🀯4
Ransomware attacks jumped 11% in 2024, hitting a record 5,414 incidents. Disruptions in Q2 and Q4 caused a surge, as law enforcement cracked down on major cybercrime groups.

Read the full analysis on this growing threat: https://thehackernews.com/2025/03/the-new-ransomware-groups-shaking-up.html
😱14πŸ‘8πŸ‘1
Paragon Partition Manager's BioNTdrv.sys driver has a critical vulnerability (CVE-2025-0289) exploited in ransomware attacks.

Attackers with local access can escalate privileges and run malicious code on Windows systems.

Read the full analysis here: https://thehackernews.com/2025/03/hackers-exploit-paragon-partition.html
😱11πŸ‘8⚑3πŸ”₯3πŸ‘1😁1
Is the future of the SOC autonomous?

"Autonomous SOC" has become one of the biggest buzzwords in the post-GPT era. But how much of the hype is real?

In an on-demand webinar, Tines CEO Eoin Hinchy and guest speaker Allie Mellen, Principal Analyst at Forrester, take a deep into the practical applications of AI in security operations.

They explored:
πŸ”Έ How SOCs are evolving with AI and workflow orchestration
πŸ”Έ Practical applications of AI within the SOC
πŸ”Έ How teams can identify areas where AI-driven autonomy makes sense

Watch now: https://thn.news/future-soc-autonomous-fb
πŸ‘10πŸ”₯3🀯1
The U.K. ICO is investigating TikTok, Reddit, and Imgur for potential child data privacy violations.

The focus is on whether these platforms are using minors' personal data to target content.

Read the full story here: https://thehackernews.com/2025/03/uk-ico-investigates-tiktok-reddit-and.html
😁8πŸ€”6πŸ‘4πŸ”₯2πŸ‘2
A new phishing campaign uses the ClickFix technique to launch a multi-stage attack via SharePoint.

It hides behind trusted services and uses the Havoc C2 framework to avoid detection.

Read the full analysis here: https://thehackernews.com/2025/03/hackers-use-clickfix-trick-to-deploy.html
πŸ‘13😁6πŸ‘1
A threat group is exploiting AWS misconfigurations to send phishing emails.

TGR-UNK-0011 uses exposed AWS access keys to bypass email security, blending in with trusted communications.

Learn more about their tactics: https://thehackernews.com/2025/03/hackers-exploit-aws-misconfigurations.html
πŸ‘21πŸ”₯3⚑2😁2πŸ€”1
⚠️ Google’s March 2025 Android Security Bulletin warns of 44 vulnerabilities, including two actively exploited flaws: CVE-2024-43093 and CVE-2024-50302, with one tied to a zero-day attack on activists.

Get the full details: https://thehackernews.com/2025/03/googles-march-2025-android-security.html
πŸ”₯26πŸ€”7😁2
The U.S. CISA has added five vulnerabilities to its Known Exploited Vulnerabilities (KEV) list, affecting software from Cisco, Microsoft, and Progress WhatsUp Gold.

Learn how this impacts you and how to protect yourself: https://thehackernews.com/2025/03/cisco-hitachi-microsoft-and-progress.html
⚑17πŸ‘9πŸ€”6🀯1
A mass exploitation campaign targets ISPs in China and the U.S. West Coast, affecting over 4,000 IPs with brute-force attacks and malware, including crypto miners and info stealers.

Cybercriminals bypass security and steal data using PowerShell and Telegram.

Read here: https://thehackernews.com/2025/03/over-4000-isp-networks-targeted-in.html
πŸ‘17πŸ”₯5😁3😱1
A new phishing campaign targets critical UAE sectors with a Go-based backdoor, Sosano. The attack uses a compromised Indian electronics company to deliver a targeted payload.

Learn more: https://thehackernews.com/2025/03/suspected-iranian-hackers-used.html
πŸ‘13πŸ‘4⚑2πŸ”₯2
Cyberattacks are getting smarterβ€”are you?

Threat-Led Vulnerability Management (TLVM) helps you focus on the vulnerabilities most likely to be exploited, making your defenses stronger and your resources smarter.

Discover how to optimize your strategy: https://thehackernews.com/expert-insights/2025/03/why-now-is-time-to-adopt-threat-led.html
πŸ‘10πŸ”₯2😁2πŸ€”1
⚠️ ALERT: VMware ESXi, Workstation, and Fusion products have critical vulnerabilities that are being actively exploited.

These flaws could allow remote code execution and information disclosure.

Learn more about the vulnerabilities and fixes here: https://thehackernews.com/2025/03/vmware-security-flaws-exploited-in.html
⚑24🀯4πŸ€”2πŸ”₯1
Credential stuffing is getting harder to stop, but attackers are evolving. Stolen credentials, often just $10, drive 80% of web app attacks, and the threat is growing.

With billions of compromised credentials out there, attacks can spread quickly and widely.

Learn more about this shift in attack strategies: https://thehackernews.com/2025/03/how-new-ai-agents-will-transform.html
🀯9😁3πŸ‘2πŸ‘1
Black Basta and CACTUS ransomware groups now share the same BackConnect module, signaling a shift in attack methods.

The overlap in tactics means cybersecurity professionals must watch for threats across multiple ransomware families.

Read here: https://thehackernews.com/2025/03/researchers-link-cactus-ransomware.html
πŸ”₯13πŸ‘6⚑3😱3😁1🀯1
Researchers have found a malicious campaign targeting Go developers with fake libraries.

At least 7 typosquatted packages impersonate popular Go modules to deploy loader malware. These can execute remote code, stealing data or credentials on Linux and macOS systems.

Read the full analysis here: https://thehackernews.com/2025/03/seven-malicious-go-packages-found.html
😱11🀯5⚑2πŸ”₯2😁2πŸ‘1πŸ€”1