The Hacker News
โœ”
151K subscribers
1.78K photos
9 videos
3 files
7.7K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: admin@thehackernews.com

๐ŸŒ Website: https://thehackernews.com
Download Telegram
The U.S. Department of Justice and #Microsoft have seized 107 domains used by Russia-linked COLDRIVER hackers to launch phishing attacks, frequently targeting experts in Russian affairs, #privacy advocates, and intelligence officials.

Read: https://thehackernews.com/2024/10/us-and-microsoft-seize-107-russian.html
๐Ÿ”ฅ15๐Ÿ˜ฑ6๐Ÿ‘4โšก2๐Ÿคฏ1
Continuous Threat Exposure Management (CTEM) enables continuous protection by helping you prioritize threats with real-time data.

๐Ÿ”—Learn how CTEM fits into your cybersecurity framework: https://thehackernews.com/2024/10/how-to-get-going-with-ctem-when-you.html
๐Ÿ”ฅ14๐Ÿ‘9โšก2
Apple has released critical iOS and iPadOS updates addressing a vulnerability (CVE-2024-44204) that could expose your passwords via VoiceOver technology.

Read: https://thehackernews.com/2024/10/apple-releases-critical-ios-and-ipados.html

iPhone XS and later, plus iPads from the Pro, Air, and Mini series, are impacted.
๐Ÿ”ฅ35๐Ÿ‘11๐Ÿ˜10๐Ÿคฏ6โšก3๐Ÿ‘3๐Ÿค”3
Meta hit hard as Europeโ€™s top court restricts #Facebookโ€™s use of personal data for targeted ads, even with user consent.

Read > https://thehackernews.com/2024/10/eu-court-limits-metas-use-of-personal.html

This ruling pushes all companies to adopt more transparent, privacy-first data practices.
๐Ÿ‘43๐Ÿ‘14๐Ÿ”ฅ6โšก3
๐Ÿšจ Just dropped the latest Cybersecurity Recap newsletter! Dive into:

โ€”Record-breaking DDoS attacks ๐ŸŒ
โ€”Evil Corp & LockBit takedowns ๐Ÿ•ต๏ธโ€โ™‚๏ธ
โ€”New North Korean malware ๐Ÿฆ 
โ€”700K+ routers vulnerable to attack ๐Ÿšจ

Read: https://thehackernews.com/2024/10/thn-cybersecurity-recap-top-threats-and.html

Stay secure, stay informed!
๐Ÿ”ฅ7โšก2๐Ÿ‘1๐Ÿ˜1๐Ÿคฏ1
๐Ÿ” Google will soon block unsafe #Android sideloading in India, targeting apps that abuse sensitive permissions.

Learn more: https://thehackernews.com/2024/10/google-blocks-unsafe-android-app.html

The pilot has already stopped nearly 900,000 high-risk installs in Southeast Asia, making it a vital fraud protection tool.
๐Ÿ‘8๐Ÿ‘3๐Ÿ”ฅ3
A critical security flaw in Apache Avro SDK (CVE-2024-47561) threatens large-scale data processing systems.

Ensure your systems are patched to avoid arbitrary code execution risks.

Details here: https://thehackernews.com/2024/10/critical-apache-avro-sdk-flaw-allows.html
๐Ÿ‘6๐Ÿ”ฅ1
Meet Gorilla, a new Mirai-based botnet issuing 300,000+ attack commands in just one month.

It exploits an Apache Hadoop vulnerability to control IoT devices and cloud hosts long-term.

Discover more about its capabilities.: https://thehackernews.com/2024/10/new-gorilla-botnet-launches-over-300000.html
๐Ÿ”ฅ7๐Ÿ‘5๐Ÿ‘2
โš ๏ธ๐Ÿ’ธ API vulnerabilities and bot attacks are costing organizations up to $186 billion a year. Learn how to protect your digital infrastructure from these growing threats.

๐Ÿ‘‰ Read more: https://thehackernews.com/2024/10/vulnerable-apis-and-bot-attacks-costing.html
๐Ÿ‘12โšก5๐Ÿ‘2๐Ÿ”ฅ2
๐Ÿ” Qualcomm releases urgent security updates, including a critical patch for CVE-2024-43047โ€”a flaw currently being exploited in the wild.

Learn more ๐Ÿ‘‰ https://thehackernews.com/2024/10/qualcomm-urges-oems-to-patch-critical.html

Qualcomm urges OEMs to deploy the update ASAP.
๐Ÿ‘7๐Ÿ”ฅ5
Ukraine claims a cyber attack on Russian state media VGTRK on Putinโ€™s birthday. While VGTRK downplays damage, reports say hackers wiped servers, including backupsโ€”a warning for those relying on basic recovery plans.

Read: https://thehackernews.com/2024/10/pro-ukrainian-hackers-strike-russian.html
๐Ÿ‘26๐Ÿ”ฅ15๐Ÿ˜6๐Ÿ˜ฑ4๐Ÿคฏ2๐Ÿค”1
GoldenJackal strikes againโ€”targeting high-profile, air-gapped networks in embassies and government entities with sophisticated #malware like JackalWorm.

Read: https://thehackernews.com/2024/10/goldenjackal-target-embassies-and-air.html

Use of USB drives to exfiltrate data underscores the importance of monitoring offline systems.
๐Ÿ”ฅ10๐Ÿ‘4โšก3๐Ÿ˜3
โšก Cyber threat group "Awaken Likho" is targeting Russian government and industrial entities with spear-phishing attacks, disguising malicious files as Word or PDF documents to trick users.

Learn more: https://thehackernews.com/2024/10/cyberattack-group-awaken-likho-targets.html
๐Ÿ‘13๐Ÿค”7๐Ÿ˜3๐Ÿ˜ฑ3๐Ÿคฏ2๐Ÿ”ฅ1
๐Ÿ”‘ Discover how AI-powered identity systems, like One Identityโ€™s Vigilance AIโ„ข Threat Engine, are transforming #cybersecurity by detecting behavioral anomalies and preventing credential-based attacks.

Find details here: https://thehackernews.com/2024/10/the-value-of-ai-powered-identity.html
๐Ÿ˜6๐Ÿ‘5โšก3๐Ÿ˜ฑ2
A recent case study shows how a malicious redirect led shoppers to a fake "evil twin" checkout page, stealing their financial info. Learn how quick action saved a retailer from costly damage.

Read: https://thehackernews.com/2024/10/new-case-study-evil-twin-checkout-page.html
๐Ÿ‘13๐Ÿ˜3๐Ÿคฏ1
๐ŸŽฎ Alert: Hackers are tricking GAMERS searching for cheats into downloading Lua-based malware, which stays hidden and delivers payloads like RedLine Stealer.

Learn how it works and how to stay safe: https://thehackernews.com/2024/10/gamers-tricked-into-downloading-lua.html
๐Ÿ˜ฑ9๐Ÿ‘8๐Ÿ˜8๐Ÿ‘4๐Ÿค”2โšก1
โš ๏ธ WARNING: Ivantiโ€™s CSA is under attack! Three new zero-day vulnerabilities are being actively exploited in the wild.

These flaws, CVE-2024-9379, CVE-2024-9380, and CVE-2024-9381, allow attackers to bypass restrictions, execute arbitrary SQL, and gain remote code executionโ€”all with admin privileges.

Find details here: https://thehackernews.com/2024/10/zero-day-alert-three-critical-ivanti.html
๐Ÿ˜12๐Ÿ‘6๐Ÿค”5
โš ๏ธ Microsoft warns of cyberattacks abusing OneDrive, SharePoint & Dropbox.

Hackers use โ€œliving-off-trusted-sitesโ€ (LOTS) to bypass defenses. View-only files trick users into sharing 2FA tokens, leading to BEC & financial fraud.

Learn more: https://thehackernews.com/2024/10/microsoft-detects-growing-use-of-file.html
๐Ÿ˜ฑ13๐Ÿ‘10โšก1๐Ÿ˜1
๐Ÿ‘‰ Microsoft has released patches for 118 vulnerabilities, two of which (CVE-2024-43572 and CVE-2024-43573) are being actively exploited in the wild.

Find details here: https://thehackernews.com/2024/10/microsoft-issues-security-update-fixing.html

Ensure your systems are protectedโ€”apply these patches ASAP!
๐Ÿค”8๐Ÿ”ฅ6๐Ÿ‘5๐Ÿ˜5๐Ÿ‘4
New IoT regulations may force small manufacturers out of business, despite improving security. With 100+ new vulnerabilities daily, compliance costs are rising fast.

How will this impact cybersecurity? Read: https://thehackernews.com/expert-insights/2024/10/will-small-iot-device-oem-survive.html
๐Ÿ˜10๐Ÿ‘4