The Hacker News
βœ”
151K subscribers
1.8K photos
9 videos
3 files
7.71K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
Nation-state attackers are exploiting Ivanti CSA vulnerabilities, including zero-days, to breach and patch networks, locking out competitors.

Is your CSA secure? Stay proactiveβ€”read the report and tighten your patching strategy.

Read: https://thehackernews.com/2024/10/nation-state-attackers-exploiting.html
πŸ‘14😁13⚑3
πŸ›‘ Jetpack WordPress plugin flaw, active since 2016, allows unauthorized access to user-submitted forms. Over 27M sites are at riskβ€”update now to protect your users' data.

Read: https://thehackernews.com/2024/10/wordpress-plugin-jetpack-patches-major.html
😁9🀯4😱4πŸ‘2πŸ‘1
Last week’s top threats include zero-day exploits, North Korean hackers, AI tools going rogue, and more.

Learn about GoldenJackal's breach of air-gapped systems, and the FBI's crypto sting.

Read: https://thehackernews.com/2024/10/thn-cybersecurity-recap-top-threats.html

Don’t miss outβ€”stay secure and ready for the next wave!
πŸ‘10πŸ‘6
Cybersecurity researchers have uncovered a new malware campaign using Hijack Loader, signed with legitimate code-signing certificates, to bypass defenses and deploy information-stealing malware like Lumma.

Find details here: https://thehackernews.com/2024/10/researchers-uncover-hijack-loader.html
πŸ€”7πŸ‘5
China accuses the U.S. of fabricating the Volt Typhoon threat actor and deploying false flags and backdoors to conceal its own cyberattacks.

Details here: https://thehackernews.com/2024/10/china-accuses-us-of-fabricating-volt.html
πŸ‘13πŸ€”11😁8πŸ”₯5⚑1
Mismanaged vulnerabilities in cloud environments are delaying incident responses and putting businesses at greater risk.

Discover how unified detection can close cloud security gaps and stop stealthy attacks before they unfold.

Read: https://thehackernews.com/2024/10/5-steps-to-boost-detection-and-response.html
πŸ‘9πŸ€”4😁1
πŸ”₯ Industry-first report covering real-world attacks on GenAI, analyzing 2,000+ LLM apps. Including jailbreak methods, adversaries' objectives, and technical insights.

Download the Pillar Security's full report here: https://thn.news/genai-attacks
😁10πŸ‘8
North Korean hackers are now using a Linux variant of the notorious FASTCash malware to target ATMs by compromising payment switches in ATM cashout schemes.

Learn more: https://thehackernews.com/2024/10/new-linux-variant-of-fastcash-malware.html
😁12πŸ‘8πŸ”₯6⚑3πŸ‘3
DarkVision RAT returns in a new campaign via PureCrypter, enabling attackers to steal passwords, record screens, and gain full remote access for just $60β€”making sophisticated breaches accessible even to non-technical cybercriminals.

Read: https://thehackernews.com/2024/10/new-malware-campaign-uses-purecrypter.html
πŸ‘14⚑1
TrickMo Android trojan has upgradedβ€”now stealing unlock patterns and PINs by mimicking the lock screen!

With thousands of stolen credentials already exposed, it’s targeting banking data, corporate VPNs, social media, and healthcare apps.

https://thehackernews.com/2024/10/trickmo-banking-trojan-can-now-capture.html
🀯21
πŸ’₯ A critical flaw in SolarWinds Web Help Desk (CVE-2024-28987) has been actively exploited, and it involves hard-coded credentials that allow attackers to access sensitive help desk tickets.

Learn more: https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-in.html
😁13πŸ‘7
πŸ›‘οΈ GitHub has released urgent security updates to fix a critical flaw (CVE-2024-9487) with a CVSS score of 9.5!

This bug allows unauthorized access by bypassing SAML SSO authenticationβ€”an immediate threat to your enterprise.

Details: https://thehackernews.com/2024/10/github-patches-critical-flaw-in.html
πŸ”₯21πŸ‘6πŸ‘6
πŸ›‘ A new spear-phishing campaign in Brazil is using a clever trick to bypass security guardrails and deliver the dangerous Astaroth #malware.

Learn how to protect your organization from this growing threat: https://thehackernews.com/2024/10/astaroth-banking-malware-resurfaces-in.html
⚑7πŸ€”7πŸ‘5πŸ”₯3πŸ‘2
Zero-day vulnerabilities are on the rise, leaving businesses exposed.

NDR solutions with machine learning can detect network anomalies before attacks happen. Learn how AI-driven NDR is key to defending against these evolving threats.

https://thehackernews.com/2024/10/rise-of-zero-day-vulnerabilities.html
😁9πŸ‘4πŸ‘3
πŸ”₯ One click, and chaos begins!

North Korean APT group ScarCruft has been linked to the exploitation of a zero-day Windows flaw (CVE-2024-38178), targeting unpatched Internet Explorer Mode in Edge, infecting devices with RokRAT malware.

Read: https://thehackernews.com/2024/10/north-korean-scarcruft-exploits-windows.html
πŸ‘9😁7πŸ”₯6
πŸ›‘οΈ Malware like AgentTesla is making headlines for its stealthy data theft tactics.

With tools like ANYRUN's Threat Intelligence Lookup, offering searches across 40+ indicators and live sandbox analysis, threat detection has never been more powerful.

Read: https://thehackernews.com/2024/10/5-techniques-for-collecting-cyber.html
πŸ”₯9πŸ‘5
πŸ”’ FIDO Alliance has proposed a new protocol to securely transfer passkeys πŸ”‘ across different platforms.

Backed by Apple, Google, Microsoft, and Amazon, this signals a major shift in the future of authentication.

Read: https://thehackernews.com/2024/10/fido-alliance-drafts-new-protocol-to.html
πŸ‘18⚑4πŸ€”2
Manage cybersecurity risk with a master’s from Georgetown. Learn more in our Oct. 23 webinar.


Join now: https://thn.news/cyberrisk-webinar-li
πŸ”₯7πŸ‘2πŸ‘2
Researchers uncovered threat actors attempting to weaponize the open-source tool EDRSilencer to tamper with Endpoint Detection and Response (EDR) solutions.

Learn how it works: https://thehackernews.com/2024/10/hackers-abuse-edrsilencer-tool-to.html
πŸ‘15🀯7⚑3πŸ‘2
πŸ›‘ Kubernetes Image Builder #vulnerability (CVE-2024-9486) has a serious root access flaw.

With a CVSS score of 9.8, this flaw lets attackers exploit default credentials to take over virtual machines using certain image builds.

Read: https://thehackernews.com/2024/10/critical-kubernetes-image-builder.html
πŸ‘10😱5⚑3🀯3πŸ‘2