The Hacker News
βœ”
151K subscribers
1.84K photos
10 videos
3 files
7.76K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
⚠️ CERT-UA warns of a sophisticated email attack using RDP files to breach sensitive systems in Ukraine.

Read: https://thehackernews.com/2024/10/cert-ua-identifies-malicious-rdp-files.html
πŸ”₯9πŸ‘6😁5
Explore the rise of AI impersonation fraud and its implications for cybersecurity.

Learn how to safeguard your organization against these emerging threats.

Read: https://thehackernews.com/2024/10/eliminating-ai-deepfake-threats-is-your.html
πŸ‘13πŸ”₯7
TeamTNT shifts tactics to target Docker environments for #cryptocurrency mining by exploiting exposed daemons to deploy malware and cryptominers.

Read: https://thehackernews.com/2024/10/notorious-hacker-group-teamtnt-launches.html
πŸ‘11πŸ€”7πŸ‘3
A new attack technique bypasses Microsoft's Driver Signature Enforcement on fully patched Windows systems, enabling attackers to load unsigned kernel drivers and compromising the integrity of OS security.

Learn more: https://thehackernews.com/2024/10/researchers-uncover-os-downgrade.html
πŸ”₯15😁12🀯10πŸ‘6πŸ‘2
A staggering 10-fold increase in phishing pages created with Webflow has been observed, targeting over 120 organizations globally.

Discover how to stay ahead of evolving threats: https://thehackernews.com/2024/10/cybercriminals-use-webflow-to-deceive.html
πŸ‘12πŸ”₯8πŸ‘2
πŸ¦Ήβ€β™‚οΈ AI manipulation, 🌩️ cloud storage flaws, and a major πŸ’£ AWS vulnerability - this week's cybersecurity recap is packed!

https://thehackernews.com/2024/10/thn-cybersecurity-recap-top-threats_28.html

Don't let your friends and colleagues fall victim to the latest cyber threats. Share this newsletter with them, it's a must-read!
πŸ‘12πŸ”₯5
⚠️ Alert for developers - Three packages found to contain the BeaverTail #malware linked to North Korean cyber campaigns.

Find details here: https://thehackernews.com/2024/10/beavertail-malware-resurfaces-in.html
πŸ”₯8⚑2πŸ‘2
⚠️ Russian espionage group UNC5812 is using Telegram to deliver #malware designed to undermine military recruitment in Ukraine.

Threats like SUNSPINNER and CraxsRAT exploit vulnerabilities in #Android and Windows.

Read: https://thehackernews.com/2024/10/russian-espionage-group-targets.html
πŸ‘12⚑5πŸ‘2
🚨 New OT security threats are emerging as ships and cranes become more digital.

Find out how SSH’s PrivX OT Edition can help tackle these challenges in marine and industrial operations.

Read: https://thehackernews.com/2024/10/sailing-seven-seas-securely-from-port.html
πŸ‘7πŸ”₯4
🚨 Evasive Panda has targeted a government entity in Taiwan with the newly discovered CloudScout toolset, capable of hijacking authenticated sessions to steal sensitive data from cloud services.

Read: https://thehackernews.com/2024/10/chinese-hackers-use-cloudscout-toolset.html
πŸ”₯8😁4πŸ‘2
New research reveals that AMD and Intel processors remain vulnerable to speculative execution attacksβ€”more than six years after the Spectre flaw was identified, despite existing mitigations.

Learn more: https://thehackernews.com/2024/10/new-research-reveals-spectre.html
πŸ‘8πŸ”₯8😁4
πŸ›‘οΈ The U.S. government has released new guidance on the Traffic Light Protocol (TLP) to enhance controlled sharing of threat intelligence, enabling organizations to protect sensitive data while responding to cyber threats.

Learn more: https://thehackernews.com/2024/10/us-government-issues-new-tlp-guidance.html
πŸ€”8πŸ‘6
⚠️ Dutch National Police have disrupted RedLine and MetaStealer, two notorious information stealers.

Over 1,200 servers across multiple countries were involved, showcasing the vast infrastructure that supports these cyber threats.

Read: https://thehackernews.com/2024/10/dutch-police-disrupt-major-info.html
πŸ”₯12😁5
πŸ’‘ Discover how exposure validation can help cybersecurity teams focus on critical vulnerabilities, optimizing resources and improving security posture.

Read: https://thehackernews.com/2024/10/a-sherlock-holmes-approach-to.html
⚑8πŸ‘2
Ensure that your data stays secure in a constantly shifting environment.

Data Detection & Response (DDR) provides real-time protection by detecting threats and stopping data breaches before they happen.

Learn more in Sentra Security's guide: https://thn.news/data-detection-response-sentra
πŸ‘13πŸ”₯8πŸ‘2
🚨 Over three dozen security flaws found in popular open-source AI models could lead to severe risks, including remote code execution and data theft.

Read: https://thehackernews.com/2024/10/researchers-uncover-vulnerabilities-in.html
πŸ‘15⚑5😁5😱2
Researchers have uncovered a malicious Python package posing as a #cryptocurrency trading tool. Downloaded over 1,300 times before removal, this #malware affects Windows and macOS systems.

Read: https://thehackernews.com/2024/10/researchers-uncover-python-package.html
πŸ‘12
UPDATE - Microsoft reports a surge in APT29 spear-phishing campaigns using malicious emails containing RDP configuration files, enabling remote control of compromised systems.

Learn more: https://thehackernews.com/2024/10/cert-ua-identifies-malicious-rdp-files.html
πŸ”₯14😁6πŸ‘5
A newly discovered flaw in the Opera browser allowed malicious extensions to access private APIs, potentially enabling serious security breaches

Find details here: https://thehackernews.com/2024/10/opera-browser-fixes-big-security-hole.html
πŸ”₯8πŸ‘5😁3🀯3
⚠️ Alert: SYS01stealer is on the rise! This #malware not only steals data but exploits #Facebook ads to amplify its reach, making it a unique threat for businesses relying on social media for marketing.

Learn more: https://thehackernews.com/2024/10/malvertising-campaign-hijacks-facebook.html
πŸ‘11πŸ‘6
Keeping up with vulnerability management for compliance is a challenge. Let Intruder handle it!

Intruder's platform offers continuous monitoring and automated reporting, helping you stay compliant without the hassle

Read: https://thehackernews.com/2024/10/embarking-on-compliance-journey-heres.html
πŸ”₯6πŸ‘3πŸ‘1