The Hacker News
βœ”
151K subscribers
1.84K photos
9 videos
3 files
7.75K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
A hacking group with suspected ties to China has been linked to a series of cyber espionage attacks in the Philippines, mainly using USB devices as the initial infection vector.

Read: https://thehackernews.com/2022/11/chinese-cyber-espionage-hackers-using.html
πŸ‘24πŸ”₯11πŸ‘4πŸ€”4🀯4⚑3😱3😁1
Researchers have disclosed details of three new security vulnerabilities affecting Operational Technology (OT) products from CODESYS and Festo.

Read: https://thehackernews.com/2022/11/3-new-vulnerabilities-affect-ot.html
πŸ‘15πŸ”₯3πŸ€”3⚑1
Australian government has passed a new bill that significantly increases penalties (up to $50 million) for companies affected by serious or repeated data breaches.

Read: https://thehackernews.com/2022/11/australia-passes-bill-to-fine-companies.html
πŸ‘27πŸ‘7πŸ”₯5⚑4😱3
French data protection watchdog has fined the country's largest electricity provider ElectricitΓ© de France (EDF) €600,000 for using insecure MD5 hash algorithm to store its customers' passwords.

Read: https://thehackernews.com/2022/11/french-electricity-provider-fined-for.html
πŸ‘34😁15πŸ”₯12🀯12😱4⚑1
A malicious Android app distributed through the Google Play Store secretly collected users' text messages in order to create accounts on various platforms, including Facebook, Google, and WhatsApp.

https://thehackernews.com/2022/11/this-malicious-app-abused-hacked.html
πŸ‘31πŸ”₯12🀯9😱6⚑5πŸ€”4πŸ‘2
An "unexpected behavior" in the npm command line interface could allow malicious NPM libraries to bypass security checks and hide vulnerabilities.

Read: https://thehackernews.com/2022/11/researchers-find-way-malicious-npm.html
πŸ”₯21😱20πŸ‘8πŸ‘2⚑1😁1
North Korea-linked ScarCruft APT hackers have been spotted using a previously undocumented backdoor called "Dolphin" to spy on targets in its southern counterpart.

Read: https://thehackernews.com/2022/12/north-korea-hackers-using-new-dolphin.html
😱19πŸ‘8⚑4πŸ€”4πŸ”₯1πŸ‘1
LastPass password management service has been hit by another security incident in which attackers gained access to some of its customers' data.

Read: https://thehackernews.com/2022/12/lastpass-suffers-another-security.html
😱46😁19πŸ‘11πŸ”₯5🀯5⚑3πŸ‘3
Researchers 'accidentally' crash the KMSDBot cryptocurrency mining botnet while sending commands to the bot to test its functionality and attack signatures.

Read: https://thehackernews.com/2022/12/researchers-accidentally-crashed.html
😁38πŸ‘16πŸ”₯5πŸ‘4😱3πŸ€”2⚑1
Over 300,000 Android users have fallen victim to dozens of Google Play Store apps that contain the Schoolyard Bully Trojan and steal users' Facebook credentials.

Read: https://thehackernews.com/2022/12/schoolyard-bully-trojan-apps-stole.html
😁32πŸ‘16🀯11⚑10πŸ‘5πŸ€”4
Hackers behind the devastating cyberattack on Australian insurer Medibank have posted another dump of the stolen data on the dark web after the company refused to pay a ransom.

Read: https://thehackernews.com/2022/12/hackers-leak-another-set-of-medibank.html
🀯26πŸ‘15πŸ€”10😱10πŸ”₯4⚑3😁2
Google accuses a Barcelona-based surveillanceware vendor named Variston IT of planting #spyware on targeted devices by exploiting zero-day vulnerabilities in Google Chrome, Mozilla Firefox and Windows.

Details: https://thehackernews.com/2022/12/google-accuses-spanish-spyware-vendor.html
πŸ”₯40πŸ€”16πŸ‘10⚑8😱6πŸ‘3
Multiple unpatched vulnerabilities have been discovered in the remote keyboard and mouse apps 'Lazy Mouse,' 'PC Keyboard' and 'Telepad' β€” installed by more than two million Android users.

Read: https://thehackernews.com/2022/12/watch-out-these-android-keyboard-apps.html
⚑15πŸ‘10😱5😁4
U.S. cybersecurity agency warns of an increasing number of Cuba ransomware attacks that has extorted more than $60 MILLION in ransom payments from over 100 entities across the world.

Read: https://thehackernews.com/2022/12/cuba-ransomware-extorted-over-60.html
⚑29πŸ”₯8πŸ‘6😁6πŸ€”4😱1
Hackers are exploiting a vulnerability in the Redis database application to deploy a new Go-based malware, dubbed "Redigo," that is designed to take control of servers and build botnet networks.

Details: https://thehackernews.com/2022/12/hackers-exploiting-redis-vulnerability.html
πŸ‘13πŸ”₯12πŸ‘4😁4⚑3
CISA warns of several critical vulnerabilities in Mitsubishi Electric GX Works3 engineering software, which is widely used in the ICS environment.

Read: https://thehackernews.com/2022/12/cisa-warns-of-multiple-critical.html
πŸ‘17🀯4⚑3πŸ‘1
Researchers have uncovered a high-severity security vulnerability in IBM Cloud Databases for PostgreSQL that could be exploited to tamper with internal repositories and execute unauthorized code.

Read: https://thehackernews.com/2022/12/researchers-disclose-supply-chain-flaw.html
πŸ€”13πŸ‘12πŸ‘6⚑5😁5😱1
Hackers abused compromised platform certificates used by Android smartphone vendors such as Samsung, LG, and MediaTek to sign malicious apps and bypass security checks.

Read: https://thehackernews.com/2022/12/hackers-sign-android-malware-apps-with.html
πŸ‘45🀯19πŸ”₯14πŸ€”8😱3⚑2πŸ‘2
A new RCE vulnerability [CVE-2022-23093] has been reported in the ping module of the FreeBSD operating system that could be exploited to remotely crash the program or execute malicious code.

Read: https://thehackernews.com/2022/12/critical-ping-vulnerability-allows.html
🀯28πŸ‘13😱13πŸ‘9😁5πŸ€”5⚑3πŸ”₯1
North Korean Lazarus hackers have been spotted distributing fake cryptocurrency apps to attack users with a new variant of AppleJeus malware.

Read: https://thehackernews.com/2022/12/north-korean-hackers-spread-applejeus.html
πŸ‘17😁10🀯9πŸ‘8πŸ”₯8⚑4πŸ€”4