The Hacker News
โœ”
151K subscribers
1.85K photos
10 videos
3 files
7.77K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: admin@thehackernews.com

๐ŸŒ Website: https://thehackernews.com
Download Telegram
Did you know the average company uses over 400 SaaS applications? Yet, 56% of IT pros arenโ€™t aware of their data backup responsibilities.

Discover the hidden secrets in your backup data and how to keep them safe: https://thehackernews.com/2024/05/are-your-saas-backups-as-secure-as-your.html
๐Ÿ‘12๐Ÿ”ฅ7๐Ÿคฏ2โšก1
๐Ÿ” Attention: CISA has added a critical security flaw (CVE-2020-17519) in Apache Flink to its Known Exploited Vulnerabilities catalog. Attackers are exploiting this flaw to gain unauthorized access to sensitive information.

Learn more: https://thehackernews.com/2024/05/cisa-warns-of-actively-exploited-apache.html
๐Ÿ‘11โšก7
๐Ÿšจ Ransomware attacks on VMware ESXi follow a similar pattern, exploiting misconfigurations and vulnerabilities.

Learn the key steps and how to protect your organization: https://thehackernews.com/2024/05/ransomware-attacks-exploit-vmware-esxi.html
โšก17๐Ÿ‘14๐Ÿ”ฅ8๐Ÿคฏ4
๐Ÿšจ ALERT: BLOODALCHEMY malware, an updated version of Deed RAT and successor to ShadowPad, targets government organizations in Southern and Southeastern Asia.

Learn more: https://thehackernews.com/2024/05/japanese-experts-warn-of-bloodalchemy.html
๐Ÿ”ฅ10โšก4๐Ÿ‘2
๐Ÿšจ A shocking supply chain attack impacting courtroom video recording software. Malicious actors backdoored the installer for JAVS Viewer v8.3.7 to deliver RustDoor malware.

๐Ÿ“ฐ Find out more: https://thehackernews.com/2024/05/courtroom-software-backdoored-to.html
๐Ÿ”ฅ20๐Ÿ‘5โšก2
๐Ÿ”ฅ Urgent: Google released security updates for Chrome to fix a new ZERO-DAY (CVE-2024-5274) under active exploitation in the wild.

Details - https://thehackernews.com/2024/05/google-detects-4th-chrome-zero-day-in.html

Users of Chromium-based browsers like Microsoft Edge, Brave, Opera, and Vivaldi should watch for patches.
๐Ÿ˜ฑ18๐Ÿค”11๐Ÿ”ฅ10๐Ÿ‘5โšก2
๐Ÿšจ Watch out! Fake antivirus sites mimicking Avast, Bitdefender, and Malwarebytes are spreading malware like SpyNote (Android), Lumma, and StealC (Windows) to steal your data.

Learn more: https://thehackernews.com/2024/05/fake-antivirus-websites-deliver-malware.html
๐Ÿ”ฅ12๐Ÿ‘9๐Ÿ˜ฑ7โšก3๐Ÿ‘2๐Ÿ˜1๐Ÿคฏ1
๐Ÿ›ก๏ธ Attention CISOs: Colonial pipeline and SolarWinds attacks highlighted cloud security challenges in DevOps.

Learn to maintain cloud security in #DevOps. Ensure innovation without compromising security.

More insights: https://thehackernews.com/2024/05/devops-dilemma-how-can-cisos-regain.html
๐Ÿ”ฅ13๐Ÿ‘7โšก2๐Ÿค”2
โšก Wondering how cybercriminals outsmart even the best security systems?

Join this can't-miss expert WEBINAR to uncover their tactics.

Save your spot now: https://thehackernews.com/2024/05/how-do-hackers-blend-in-so-well-learn.html
๐Ÿ”ฅ11๐Ÿ‘4โšก2๐Ÿค”2
๐Ÿ•ต๏ธโ€โ™‚๏ธ Attackers can create rogue VMs within your VMware environment to evade detection!

MITRE analysis of a recent Chinese threat actor UNC5221 attack shows they used this tactic to maintain network access.

๐Ÿ” Read the full article: https://thehackernews.com/2024/05/hackers-created-rogue-vms-to-evade.html
๐Ÿคฏ20๐Ÿ‘13๐Ÿ”ฅ9โšก3๐Ÿค”3
Researchers found a vulnerability in AI-as-a-service provider "Replicate" that could allow unauthorized access to proprietary AI models and sensitive data.

Read: https://thehackernews.com/2024/05/experts-find-flaw-in-replicate-ai.html

The issue stemmed from the arbitrary code execution potential in AI model packaging.
๐Ÿ‘22๐Ÿ”ฅ10๐Ÿ˜7โšก5
Indian government, defense, and aerospace sectors targeted by Pakistan-nexus actor Transparent Tribe using cross-platform malware written in Python, Golang, and Rust.

Learn about the new set of attacks: https://thehackernews.com/2024/05/pakistan-linked-hackers-deploy-python.html
๐Ÿ”ฅ17โšก8๐Ÿ‘3๐Ÿ˜3๐Ÿคฏ3๐Ÿ‘1
๐Ÿšจ Experts have uncovered phishing campaigns using HTML smuggling, DNS tunneling, generative AI, PhaaS toolkits, malvertising, and Cloudflare Workers to serve malicious sites targeting Microsoft and Gmail credentials.

Find out more: https://thehackernews.com/2024/05/new-tricks-in-phishing-playbook.html
๐Ÿ”ฅ17๐Ÿ‘5
๐Ÿšจ Cyber Alert: #Microsoft highlights Morocco-based Storm-0539, stealing up to $100,000/day in gift card fraud.

๐Ÿ”— Discover the full story: https://thehackernews.com/2024/05/moroccan-cybercrime-group-steals-up-to.html
๐Ÿ˜11๐Ÿ”ฅ8๐Ÿ‘6๐Ÿ‘2โšก1
๐Ÿšจ 83% of organizations have fallen victim to phishing. Itโ€™s time to rethink our security strategies. Discover innovative solutions that inspect web sessions and neutralize threats in real-time.

Read the full report: https://thehackernews.com/2024/05/report-dark-side-of-phishing-protection.html
๐Ÿค”12๐Ÿ”ฅ9๐Ÿ‘6๐Ÿ˜3โšก1๐Ÿ‘1
๐Ÿšจ Critical Alert: TP-Link Archer C5400X ๐ŸŽฎ Gaming Router Vulnerability.

๐Ÿšฆ Severity: Maximum (CVSS 10.0)

๐Ÿ›ก๏ธ Impact: Remote code execution Patch available: Firmware version 1_1.1.7 Protect your network, update now!

Read more: https://thehackernews.com/2024/05/tp-link-gaming-router-vulnerability.html
๐Ÿ”ฅ18๐Ÿ˜ฑ10๐Ÿ˜6๐Ÿ‘5โšก2๐Ÿ‘2
Unknown threat actors are targeting WordPress sites with a new attack vector, using the Dessky Snippets plugin to insert malicious PHP code and harvest credit card data.

Read More ๐Ÿ‘‰ https://thehackernews.com/2024/05/wordpress-plugin-exploited-to-steal.html
๐Ÿ˜ฑ15โšก4๐Ÿ‘3
Dual Threat: CatDDoS & DNSBomb!

๐Ÿฑ CatDDoS botnet exploits 80+ vulnerabilities, targeting 300+ devices daily for DDoS attacks.

๐Ÿ’ฃ DNSBomb, a new attack technique, achieves a 20,000x amplification in PDoS attacks.

Read the full story: https://thehackernews.com/2024/05/researchers-warn-of-catddos-botnet-and.html
๐Ÿค”14๐Ÿคฏ10๐Ÿ‘6โšก3
Special deals from the ANYRUN interactive malware sandbox ๐ŸŽ

New and existing clients can receive:
โœ… 6 months of free service
โœ… Additional licenses for team members

Get it until May 31 โžก๏ธ https://thn.news/anyrun-sandbox
๐Ÿ‘12๐Ÿคฏ5๐Ÿ˜2๐Ÿ‘1
๐Ÿ”’ With endless cyber threats, the 'spray 'n pray' approach is costing you big time. Discover the secret to prioritizing your resources and efforts on what truly matters.

Donโ€™t miss out โ€“ read the full article now: https://thehackernews.com/2024/05/4-step-approach-to-mapping-and-securing.html
๐Ÿ”ฅ14๐Ÿ‘4๐Ÿค”1