The Hacker News
βœ”
151K subscribers
1.77K photos
9 videos
3 files
7.68K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
⚑ Telegram has agreed to provide users' IP addresses and phone numbers to authorities in response to valid legal requests. This decision comes after increased pressure, following the arrest of CEO Pavel Durov.

Read: https://thehackernews.com/2024/09/telegram-agrees-to-share-user-data-with.html
🀯96😱39πŸ€”22😁20πŸ‘15πŸ”₯11πŸ‘4⚑3
🚨 New version of the Android banking trojan Octo2 spotted!

With enhanced Device Takeover (DTO) capabilities, it can remotely control devices to steal financial data & commit fraud undetected.

Read: https://thehackernews.com/2024/09/new-octo2-android-banking-trojan.html
πŸ‘10⚑5😱4😁2
Is it time to ditch the 90-day password reset?

Frequent changes can lead to weak passwords like Password1 ➑️ Password2, increasing security risks. Even strong passwords aren’t foolproof as attackers exploit reuse & breaches.

Learn why 'never expire' might expose your business: https://thehackernews.com/2024/09/why-never-expire-passwords-can-be-risky.html
πŸ‘18🀯4πŸ€”1
🚨 Kaspersky has officially pulled out of the U.S. market, unexpectedly replacing its antivirus software with UltraAV for some users. Many users have raised concerns about this unannounced transition.

Learn more: https://thehackernews.com/2024/09/kaspersky-exits-us-automatically.html
πŸ€”15πŸ‘6πŸ”₯6😁6😱4⚑3
🚨 WEBINAR ALERT: Software Supply Chain Security 101 🚨

Join ReversingLabs on September 25th @ 12pm ET for a crash course on the technical tactics of software supply chain compromises and learn how to assess the risks posed by commercial software.

https://thn.news/supply-chain-security-101
πŸ‘11🀯4😁2πŸ€”2
πŸ”₯ Anyrun just released Safebrowsing β€” a new service that lets you quickly explore URLs in an isolated virtual browser.

πŸ›‘οΈ It notifies you about threats and has a friendly interface, perfect for users with any expertise level.

Give it a try, it's freeπŸ‘‡ https://thn.news/malware-analysis-sandbox-1
πŸ‘27πŸ€”8πŸ”₯5🀯4
The U.S. Department of Commerce is proposing a ban on connected vehicles with software and hardware from foreign adversaries like China and Russia.

The ban impacts VCS and ADS tech in vehicles and could take full effect by 2027-2030.

Read: https://thehackernews.com/2024/09/us-proposes-ban-on-connected-vehicles.html
πŸ‘20🀯8😁7
⚠️ SaaS Data Leaks Are Rising! Attacks on platforms like Azure and Snowflake expose sensitive records.

Misconfigurations and weak passwords make you vulnerable. An SSPM can detect gaps, monitor permissions, and mitigate threats in real-time.

Explore: https://thehackernews.com/2024/09/the-sspm-justification-kit.html
πŸ”₯13πŸ‘4
Altered Android apps on Google Play, like Wuta Camera (10M+ downloads), spread new Necro malware.

It can run malicious code, subscribe to paid services, and create device tunnels. Necro uses steganography to hide, evading detection.

https://thehackernews.com/2024/09/necro-android-malware-found-in-popular.html
πŸ”₯23πŸ€”6πŸ‘5⚑3🀯1
CISA just added a critical Ivanti vTM vulnerability (CVE-2024-7593) to its Known Exploited Vulnerabilities (KEV) list due to active exploitation.

With a CVSS score of 9.8, this vulnerability allows unauthenticated attackers to bypass admin controlsβ€”creating rogue admin users in your system.

Ivanti has released patches, but many affected systems remain exposed. U.S. federal agencies have until October 15 to fix the issue, but anyone using Ivanti needs to act now.

Read: https://thehackernews.com/2024/09/cisa-flags-critical-ivanti-vtm.html
⚑11πŸ‘3πŸ€”3😁2
πŸ“§πŸ”“ Hackers are exploiting legit email accounts in transport companies to deliver RATs like NetSupport & DanaBot, causing disruptions, data theft, and major financial damage if not addressed quickly.

Learn more: https://thehackernews.com/2024/09/transportation-companies-hit-by.html
πŸ‘7😁5🀯3πŸ”₯1
A vulnerability in the memory feature of OpenAI's ChatGPT app for macOS, dubbed "SpAIware," could hvae allowed attackers to embed #spyware, exposing user data across multiple conversations.

Learn more: https://thehackernews.com/2024/09/chatgpt-macos-flaw-couldve-enabled-long.html
πŸ‘15πŸ”₯9😁3
Despite a decade of SOAR advancements, SOCs remain manual-heavy. Agentic AI is breaking new ground by automating the hardest SOC tasksβ€”triage and investigation.

Learn how it could reshape your cybersecurity strategy: https://thehackernews.com/2024/09/agentic-ai-in-socs-solution-to-soars.html
πŸ€”6πŸ‘4πŸ”₯3
🚨 New red team tool Splinter discovered by Palo Alto's Unit 42. Not as advanced as Cobalt Strike, but still a threat if misused. Built with Rust, it enables process injection & C2 communication.

Learn more: https://thehackernews.com/2024/09/cybersecurity-researchers-warn-of-new.html

Cyber pros, stay alert!
πŸ‘13⚑1
⚑ Phishing attacks are becoming harder to spot. Learn about key phishing indicators and discover effective ways to identify and mitigate these threats using advanced tools like ANYRUN.

Read: https://thehackernews.com/2024/09/expert-tips-on-how-to-spot-phishing-link.html
πŸ”₯15πŸ‘4πŸ‘3⚑1πŸ€”1
πŸ”₯ Mozilla's new Firefox browser feature, Privacy Preserving Attribution (PPA), is under fire for enabling tracking πŸ‘€ without user consent.

While it claims to protect privacy, watchdogs argue it violates EU's GDPR.

Learn more: https://thehackernews.com/2024/09/mozilla-faces-privacy-complaint-for.html
πŸ€”28🀯16⚑5πŸ‘5πŸ‘3πŸ”₯2😁1
πŸ” Google’s transition to Rust programming language has led to a staggering drop in memory safety vulnerabilities in Androidβ€”from 76% to just 24% over six years!

Learn more: https://thehackernews.com/2024/09/googles-shift-to-rust-programming-cuts.html
πŸ”₯40πŸ€”13πŸ‘6⚑3πŸ‘1
⚠️ Beijing-sponsored Salt Typhoon, also known as GhostEmperor, has been caught infiltrating U.S. Internet Service Providers, potentially compromising Cisco routers.

Read: https://thehackernews.com/2024/09/chinese-hackers-infiltrate-us-internet.html

The campaign's goal: to establish long-term access for data exfiltration or worse.
πŸ‘9πŸ€”9🀯8⚑2
πŸ›‘ SloppyLemming hacker group is using cloud services to run espionage campaigns in South & East Asia, targeting gov, law enforcement, & energy sectors.

Spear-phishing & credential harvesting are key attack methods.

Learn more: https://thehackernews.com/2024/09/cloudflare-warns-of-india-linked.html
⚑7πŸ‘4πŸ€”4πŸ”₯2🀯2
🚨 SilentSelfie: Kurdish websites hit by prolonged watering hole attack, stealing sensitive data from journalists & activists.

Malicious APKs capture locations & files without persistence, making detection tougher.

Learn more: https://thehackernews.com/2024/09/watering-hole-attack-on-kurdish-sites.html
😱10πŸ‘5πŸ‘4🀯4⚑3