The Hacker News
βœ”
151K subscribers
1.81K photos
9 videos
3 files
7.72K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
πŸ’₯ A critical flaw in SolarWinds Web Help Desk (CVE-2024-28987) has been actively exploited, and it involves hard-coded credentials that allow attackers to access sensitive help desk tickets.

Learn more: https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-in.html
😁13πŸ‘7
πŸ›‘οΈ GitHub has released urgent security updates to fix a critical flaw (CVE-2024-9487) with a CVSS score of 9.5!

This bug allows unauthorized access by bypassing SAML SSO authenticationβ€”an immediate threat to your enterprise.

Details: https://thehackernews.com/2024/10/github-patches-critical-flaw-in.html
πŸ”₯21πŸ‘6πŸ‘6
πŸ›‘ A new spear-phishing campaign in Brazil is using a clever trick to bypass security guardrails and deliver the dangerous Astaroth #malware.

Learn how to protect your organization from this growing threat: https://thehackernews.com/2024/10/astaroth-banking-malware-resurfaces-in.html
⚑7πŸ€”7πŸ‘5πŸ”₯3πŸ‘2
Zero-day vulnerabilities are on the rise, leaving businesses exposed.

NDR solutions with machine learning can detect network anomalies before attacks happen. Learn how AI-driven NDR is key to defending against these evolving threats.

https://thehackernews.com/2024/10/rise-of-zero-day-vulnerabilities.html
😁9πŸ‘4πŸ‘3
πŸ”₯ One click, and chaos begins!

North Korean APT group ScarCruft has been linked to the exploitation of a zero-day Windows flaw (CVE-2024-38178), targeting unpatched Internet Explorer Mode in Edge, infecting devices with RokRAT malware.

Read: https://thehackernews.com/2024/10/north-korean-scarcruft-exploits-windows.html
πŸ‘9😁7πŸ”₯6
πŸ›‘οΈ Malware like AgentTesla is making headlines for its stealthy data theft tactics.

With tools like ANYRUN's Threat Intelligence Lookup, offering searches across 40+ indicators and live sandbox analysis, threat detection has never been more powerful.

Read: https://thehackernews.com/2024/10/5-techniques-for-collecting-cyber.html
πŸ”₯9πŸ‘5
πŸ”’ FIDO Alliance has proposed a new protocol to securely transfer passkeys πŸ”‘ across different platforms.

Backed by Apple, Google, Microsoft, and Amazon, this signals a major shift in the future of authentication.

Read: https://thehackernews.com/2024/10/fido-alliance-drafts-new-protocol-to.html
πŸ‘18⚑4πŸ€”2
Manage cybersecurity risk with a master’s from Georgetown. Learn more in our Oct. 23 webinar.


Join now: https://thn.news/cyberrisk-webinar-li
πŸ”₯7πŸ‘2πŸ‘2
Researchers uncovered threat actors attempting to weaponize the open-source tool EDRSilencer to tamper with Endpoint Detection and Response (EDR) solutions.

Learn how it works: https://thehackernews.com/2024/10/hackers-abuse-edrsilencer-tool-to.html
πŸ‘15🀯7⚑3πŸ‘2
πŸ›‘ Kubernetes Image Builder #vulnerability (CVE-2024-9486) has a serious root access flaw.

With a CVSS score of 9.8, this flaw lets attackers exploit default credentials to take over virtual machines using certain image builds.

Read: https://thehackernews.com/2024/10/critical-kubernetes-image-builder.html
πŸ‘10😱5⚑3🀯3πŸ‘2
Privileged Access Management (PAM) is more than complianceβ€”it's your frontline defense against threats targeting critical assets.

Learn how to strengthen your PAM strategy before it’s too late.

Read: https://thehackernews.com/expert-insights/2024/10/master-privileged-access-management.html
πŸ‘7πŸ‘4πŸ€”4
⚑ 35,000 DDoS attacks in one yearβ€”Anonymous Sudan orchestrated this by running a DDoS botnet-for-hire.

Two Sudanese brothers face charges for targeting critical infrastructure and major companies, including #Microsoft, worldwide.

Read: https://thehackernews.com/2024/10/us-charges-two-sudanese-brothers-for.html
πŸ‘11😁5⚑4
🚨 High-profile entities in the Middle East and Africa are under attack by SideWinder (APT-C-17), with a new multi-stage infection chain delivering the dangerous StealerBot malware.

Learn more: https://thehackernews.com/2024/10/sidewinder-apt-strikes-middle-east-and.html
πŸ€”6😁3πŸ‘2
🚨 Zero Trust in Google Workspace: Don’t Wait Until 2025 to Start! 🚨

Nearly 50% of companies planning to implement Zero Trust security within #googlecloud environments in 2025 struggle with getting started due to challenges like handling granular access controls, monitoring and auditing. Facing similar roadblocks?

πŸ’Ό Join ex-Google expert Mikael Klambro and the Zenphi_co team in this free webinar to learn practical solutions, including:

β–Ά Automating user access controls 🌐
β–Ά Managing least privilege access for employees and third-party collaborators πŸ‘₯
β–Ά Ensuring secure collaboration in a cloud-first environment ☁️

🎁 Bonus: Register now to receive our Zero Trust Implementation Blueprintβ€”a resource that will not only enhance your organization’s #datasecurity but also set you apart as a top-tier Google Workspace and cybersecurity professional.

πŸ’‘ Stay ahead of the curve in #accessmanagement and prepare your organization for 2025 β€” don’t miss it!

https://thn.news/zero-trust-gworkspace-webinar
πŸ‘12πŸ‘2😁2
🚨 Researchers just infiltrated the affiliate panel of the rising ransomware group, Cicada3301. This RaaS is targeting critical sectors with sophisticated, cross-platform attacks.

Learn more: https://thehackernews.com/2024/10/cross-platform-cicada3301-ransomware.html
😁15
With over 80% of breaches today leveraging compromised identities, managing your SaaS attack surface is critical. Discover how to gain full visibility over your SaaS environment and minimize identity-based risks.

Read: https://thehackernews.com/2024/01/5-ways-to-reduce-saas-security-risks.html
πŸ”₯7πŸ‘3😁2
RomCom’s latest cyber espionage wave uses malware written in C++, Rust, Go, and Lua to attack high-profile Ukrainian and Polish entities.

Learn more: https://thehackernews.com/2024/10/russian-romcom-attacks-target-ukrainian.html
πŸ‘9πŸ”₯4😁3πŸ‘2
πŸ›‘ Microsoft discovered a serious security flaw (CVE-2024-44133) in #Apple’s macOS TCC framework that could bypass user consent for sensitive data access like your location, camera, or microphone!

Learn more: https://thehackernews.com/2024/10/microsoft-reveals-macos-vulnerability.html
πŸ”₯19😁16πŸ‘5πŸ‘4πŸ€”4😱3
πŸ›‘ It’s all about the details…

Cybercriminals are getting more creative, now leveraging fake Google Meet pages to trick users into running malicious PowerShell code, infecting both Windows & macOS with info-stealers like StealC and Atomic.

https://thehackernews.com/2024/10/beware-fake-google-meet-pages-deliver.html
πŸ”₯14😁4🀯4πŸ‘3
🚨 Cyber agencies sound the alarm as Iranian hackers relentlessly target critical sectors like #healthcare, IT, and energy through brute-force attacks, password spraying, and MFA push bombing.

Read ➑ https://thehackernews.com/2024/10/us-and-allies-warn-of-iranian.html
πŸ‘15😁5😱5