The Hacker News
βœ”
151K subscribers
1.8K photos
9 videos
3 files
7.71K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
⚠️ North Korean-backed APT37 (aka InkySquid) has been observed delivering a never-before-seen backdoor, VeilShell, as part of stealthy state-sponsored cyberattacks targeting Southeast Asia.

Find details here: https://thehackernews.com/2024/10/north-korean-hackers-using-new.html
😁8πŸ‘3😱3πŸ‘2
πŸ”΄ New stealthy #malware "Perfctl" is hitting Linux servers, running crypto miners & proxyjacking undetected. It exploits Polkit vulnerability (CVE-2021-4043) for privilege escalation & uses a rootkit to evade defense.

Details here: https://thehackernews.com/2024/10/new-perfctl-malware-targets-linux.html
πŸ”₯17πŸ‘3
As non-human identities outnumber human ones, they pose an escalating security risk. Learn why machine identity management is vital for modern cybersecurity.

Read: https://thehackernews.com/2024/10/the-secret-weakness-execs-are.html
πŸ‘9πŸ”₯5πŸ‘2
Google is enhancing Android 14 security on Pixel devices to prevent 2G attacks and protect against baseband exploits. Baseband vulnerabilities expose devices to remote attacks, potentially compromising sensitive data.

Read: https://thehackernews.com/2024/10/android-14-adds-new-security-features.html
πŸ‘33😁6⚑5πŸ‘4πŸ”₯1
A major #vulnerability (CVE-2024-47374) in the LiteSpeed Cache WordPress plugin could allow attackers to execute arbitrary #JavaScript and hijack accounts.

Find details here: https://thehackernews.com/2024/10/wordpress-litespeed-cache-plugin.html

Patch now to protect your site.
πŸ”₯14πŸ‘5😁2
The largest-ever DDoS attack just occurredβ€”3.8 Tbps in just 65 seconds!

Is your CPU capacity prepared to filter massive attack traffic? Attackers leveraged compromised ASUS routers, a serious reminder to address CVE-2024-3080 now.

Read: https://thehackernews.com/2024/10/cloudflare-thwarts-largest-ever-38-tbps.html
πŸ”₯28🀯21πŸ‘5⚑3😁3
The U.S. Department of Justice and #Microsoft have seized 107 domains used by Russia-linked COLDRIVER hackers to launch phishing attacks, frequently targeting experts in Russian affairs, #privacy advocates, and intelligence officials.

Read: https://thehackernews.com/2024/10/us-and-microsoft-seize-107-russian.html
πŸ”₯15😱6πŸ‘4⚑2🀯1
Continuous Threat Exposure Management (CTEM) enables continuous protection by helping you prioritize threats with real-time data.

πŸ”—Learn how CTEM fits into your cybersecurity framework: https://thehackernews.com/2024/10/how-to-get-going-with-ctem-when-you.html
πŸ”₯14πŸ‘9⚑2
Apple has released critical iOS and iPadOS updates addressing a vulnerability (CVE-2024-44204) that could expose your passwords via VoiceOver technology.

Read: https://thehackernews.com/2024/10/apple-releases-critical-ios-and-ipados.html

iPhone XS and later, plus iPads from the Pro, Air, and Mini series, are impacted.
πŸ”₯35πŸ‘11😁10🀯6⚑3πŸ‘3πŸ€”3
Meta hit hard as Europe’s top court restricts #Facebook’s use of personal data for targeted ads, even with user consent.

Read > https://thehackernews.com/2024/10/eu-court-limits-metas-use-of-personal.html

This ruling pushes all companies to adopt more transparent, privacy-first data practices.
πŸ‘43πŸ‘14πŸ”₯6⚑3
🚨 Just dropped the latest Cybersecurity Recap newsletter! Dive into:

β€”Record-breaking DDoS attacks 🌐
β€”Evil Corp & LockBit takedowns πŸ•΅οΈβ€β™‚οΈ
β€”New North Korean malware 🦠
β€”700K+ routers vulnerable to attack 🚨

Read: https://thehackernews.com/2024/10/thn-cybersecurity-recap-top-threats-and.html

Stay secure, stay informed!
πŸ”₯7⚑2πŸ‘1😁1🀯1
πŸ” Google will soon block unsafe #Android sideloading in India, targeting apps that abuse sensitive permissions.

Learn more: https://thehackernews.com/2024/10/google-blocks-unsafe-android-app.html

The pilot has already stopped nearly 900,000 high-risk installs in Southeast Asia, making it a vital fraud protection tool.
πŸ‘8πŸ‘3πŸ”₯3
A critical security flaw in Apache Avro SDK (CVE-2024-47561) threatens large-scale data processing systems.

Ensure your systems are patched to avoid arbitrary code execution risks.

Details here: https://thehackernews.com/2024/10/critical-apache-avro-sdk-flaw-allows.html
πŸ‘6πŸ”₯1
Meet Gorilla, a new Mirai-based botnet issuing 300,000+ attack commands in just one month.

It exploits an Apache Hadoop vulnerability to control IoT devices and cloud hosts long-term.

Discover more about its capabilities.: https://thehackernews.com/2024/10/new-gorilla-botnet-launches-over-300000.html
πŸ”₯7πŸ‘5πŸ‘2
βš οΈπŸ’Έ API vulnerabilities and bot attacks are costing organizations up to $186 billion a year. Learn how to protect your digital infrastructure from these growing threats.

πŸ‘‰ Read more: https://thehackernews.com/2024/10/vulnerable-apis-and-bot-attacks-costing.html
πŸ‘12⚑5πŸ‘2πŸ”₯2
πŸ” Qualcomm releases urgent security updates, including a critical patch for CVE-2024-43047β€”a flaw currently being exploited in the wild.

Learn more πŸ‘‰ https://thehackernews.com/2024/10/qualcomm-urges-oems-to-patch-critical.html

Qualcomm urges OEMs to deploy the update ASAP.
πŸ‘7πŸ”₯5
Ukraine claims a cyber attack on Russian state media VGTRK on Putin’s birthday. While VGTRK downplays damage, reports say hackers wiped servers, including backupsβ€”a warning for those relying on basic recovery plans.

Read: https://thehackernews.com/2024/10/pro-ukrainian-hackers-strike-russian.html
πŸ‘26πŸ”₯15😁6😱4🀯2πŸ€”1
GoldenJackal strikes againβ€”targeting high-profile, air-gapped networks in embassies and government entities with sophisticated #malware like JackalWorm.

Read: https://thehackernews.com/2024/10/goldenjackal-target-embassies-and-air.html

Use of USB drives to exfiltrate data underscores the importance of monitoring offline systems.
πŸ”₯10πŸ‘4⚑3😁3
⚑ Cyber threat group "Awaken Likho" is targeting Russian government and industrial entities with spear-phishing attacks, disguising malicious files as Word or PDF documents to trick users.

Learn more: https://thehackernews.com/2024/10/cyberattack-group-awaken-likho-targets.html
πŸ‘13πŸ€”7😁3😱3🀯2πŸ”₯1
πŸ”‘ Discover how AI-powered identity systems, like One Identity’s Vigilance AIβ„’ Threat Engine, are transforming #cybersecurity by detecting behavioral anomalies and preventing credential-based attacks.

Find details here: https://thehackernews.com/2024/10/the-value-of-ai-powered-identity.html
😁6πŸ‘5⚑3😱2
A recent case study shows how a malicious redirect led shoppers to a fake "evil twin" checkout page, stealing their financial info. Learn how quick action saved a retailer from costly damage.

Read: https://thehackernews.com/2024/10/new-case-study-evil-twin-checkout-page.html
πŸ‘13😁3🀯1