The Hacker News
βœ”
151K subscribers
1.85K photos
10 videos
3 files
7.76K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
North Korean hackers are ramping up attacks on crypto firms with a sophisticated #malware campaign.

Disguised as PDF files, this multi-stage malware is designed to evade detection and exploit macOS vulnerabilities.

Read more β€” https://thehackernews.com/2024/11/north-korean-hackers-target-crypto.html
πŸ‘7πŸ”₯4😁4⚑3
πŸ”’πŸ’» Cybercriminals are exploiting techniques like disabling Windows Event Logging to bypass security measures.

This tactic allows them to operate undetected, putting your organization at risk.

Learn how πŸ‘‰ https://thehackernews.com/2024/11/5-most-common-malware-techniques-in-2024.html
πŸ‘13πŸ”₯9⚑3πŸ€”3🀯3
πŸ”’ Weak passwords continue to be a major vulnerability for organizations. With hackers able to crack simple passwords in seconds, it’s time to reassess your security measures!

πŸ›‘οΈ Learn how to reinforce your defensesβ€”read more here: https://thehackernews.com/2024/11/a-hackers-guide-to-password-cracking.html
πŸ€”8
🚨 Can your SOC keep pace with the growing number of security threats?

The 2024 State of Threat Detection Report reveals:

βœ“ Over 50% can't keep up with rising threats
βœ“ 71% say vendors must own breach failures
βœ“ 89% are turning to AI-powered tools

Is it a threat detection problem or an attack signal problem?

πŸ‘‰ Find out now. Download the free report: https://thn.news/state-of-threat-detection-2024
πŸ‘11😁4πŸ€”4πŸ‘1😱1
🚨 CISA has added a critical #vulnerability (CVE-2024-5910) in Palo Alto Networks Expedition to its Known Exploited Vulnerabilities catalog.

This flaw allows attackers to take over admin accounts, risking sensitive data.

πŸ‘‰ Read details: https://thehackernews.com/2024/11/cisa-alerts-to-active-exploitation-of.html
⚑10🀯7
πŸ¦ πŸ’» Researchers unveil CRON#TRAP, a new #malware campaign using a Linux virtual instance to compromise Windows systems.

Read the full article to stay informed πŸ‘‰ https://thehackernews.com/2024/11/new-crontrap-malware-infects-windows-by.html
πŸ”₯9πŸ‘8😁5
πŸ”₯ Discover how storytelling in cybersecurity training with Huntress SAT can drastically enhance your team's knowledge retention.

Join experts in our upcoming WEBINAR to see how it can reshape your infosec culture.

πŸ“… Don’t miss outβ€”watch it here: https://thehackernews.com/2024/11/webinar-learn-how-storytelling-can-make.html
πŸ‘8πŸ€”8⚑3πŸ”₯1
🚨 A new campaign is targeting the npm repository with malicious JavaScript libraries aimed at infecting Roblox users with open-source stealer malware.

Read the full report: https://thehackernews.com/2024/11/malicious-npm-packages-target-roblox.html
πŸ‘6⚑5πŸ€”5
Two cyber threat groups, Transparent Tribe and IcePeony, are intensifying attacks on India's government sectors.

Understanding these threats is crucial for protecting your organization.

Read more to stay informed: https://thehackernews.com/2024/11/icepeony-and-transparent-tribe-target.html
πŸ‘13⚑7😁1
πŸ›‘οΈπŸ’» AndroxGh0st malware is evolving!

Now exploiting multiple critical vulnerabilities while collaborating with the Mozi botnet, it's a serious threat to IoT and cloud security.

πŸ”— Read now: https://thehackernews.com/2024/11/androxgh0st-malware-integrates-mozi.html
πŸ”₯19πŸ‘6😁3
πŸ•΅οΈβ€β™‚οΈπŸ’° The founder of Bitcoin Fog, a major #cryptocurrency mixer, sentenced to 12+ years for laundering over $400M tied to darknet crime.

Read the full story πŸ‘‡ https://thehackernews.com/2024/11/bitcoin-fog-founder-sentenced-to-12.html
⚑9πŸ‘7🀯7πŸ”₯2πŸ‘1
πŸ’‘ Cyberattacks on SMBs are rising, but many can't afford full-time CISOs. The vCISO model offers a cost-effective solution.

πŸ“š The vCISO Academy by Cynomi equips MSPs & MSSPs with the skills to meet the growing demand.

Learn more: https://thehackernews.com/2024/11/the-vciso-academy-transforming-msps-and.html
πŸ‘13⚑9πŸ‘4
⚠️ Critical "potential" RCE vulnerability in PAN-OS could expose your network to cybercriminals.

Palo Alto Networks advises securing management interfaces ASAP.

πŸ”— Details here: https://thehackernews.com/2024/11/palo-alto-advises-securing-pan-os.html
πŸ‘16⚑12😁8🀯3😱1
⚠️ New phishing campaign spreading Remcos RAT via Excel attachments! It’s a fileless variant, making it even harder to detect.

Read: https://thehackernews.com/2024/11/cybercriminals-use-excel-exploit-to.html

πŸ”’ Update your defenses NOW!
πŸ”₯15πŸ‘6😁5⚑3
🚨 Critical Command Injection Flaws found in Aruba Networking Access Points!

Remote code execution is possibleβ€”CVE-2024-42509 & CVE-2024-47460 threaten your network’s security. Don't wait for an attack!

Read more: https://thehackernews.com/2024/11/hpe-issues-critical-security-patches.html

πŸ‘‰ Patch your devices NOW.
πŸ‘10⚑7😁3
πŸ›‘ Critical vulnerabilities discovered in popular open-source machine learning (ML) tools like Weave, ZenML, and Mage AI.

These flaws could lead to hijacked servers and compromised pipelines.

Read the full report here πŸ‘‰ https://thehackernews.com/2024/11/security-flaws-in-popular-ml-toolkits.html
😱12😁7πŸ‘3πŸ‘2
DTCC cuts breach risks by 11% with Automated Security Validation. Using Pentera, they boosted security, reduced costs, and freed up expert resourcesβ€”without adding staff.

Is your team ahead, or falling behind? πŸ€”

Read how DTCC is leading the way: https://thehackernews.com/2024/11/the-roi-of-security-investments-how.html
⚑5πŸ‘4
🚨 SEO poisoning attack alert! GootLoader malware spreads by exploiting searches like "Are Bengal Cats legal in Australia?"

Read more: https://thehackernews.com/2024/11/new-gootloader-campaign-targets-users.html
πŸ”₯7πŸ‘5😁3
πŸ” Imagine your banking app or car's software secretly turning on you...

This isn't a movie plotβ€”it's the world of cyber in 2024. Dive into this week’s wildest cyber threats and top defense tips in our latest weekly recap.

Read it here: https://thehackernews.com/2024/11/thn-recap-top-cybersecurity-threats_11.html
πŸ‘16πŸ”₯4πŸ‘4
A new ransomware, Ymir, uses advanced memory management tactics to execute malicious code stealthily.

It targeted a Colombian organization after credentials were stolen by RustyStealer.

Read: https://thehackernews.com/2024/11/new-ymir-ransomware-exploits-memory-for.html
πŸ‘12πŸ€”5πŸ”₯4😁2
πŸ›‘οΈ North Korean hackers are using Flutter apps to target macOS with malware, bypassing traditional Apple security through signed developer IDs. Cryptocurrency companies are at risk.

Learn more: https://thehackernews.com/2024/11/north-korean-hackers-target-macos-using.html
😁14🀯8πŸ”₯3πŸ‘1