The Hacker News
โœ”
151K subscribers
1.85K photos
10 videos
3 files
7.77K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: admin@thehackernews.com

๐ŸŒ Website: https://thehackernews.com
Download Telegram
A China-linked nation-state group named TAG-112 targeted Tibetan media and university websites, using a cyber espionage campaign to deliver the Cobalt Strike post-exploitation toolkit.

Learn more โ€” https://thehackernews.com/2024/11/china-linked-tag-112-targets-tibetan.html
โšก10๐Ÿ‘9๐Ÿ”ฅ4๐Ÿคฏ1
๐Ÿ›‘ Watch out! The threat actor Mysterious Elephant (APT-K-47) is using a new trick: exploiting WinRARโ€™s security flaw to spread malware.

Their latest campaign uses Hajj-themed lures to deceive victims into executing a malicious payload disguised as a Microsoft CHM file.

Learn more about the tactics https://thehackernews.com/2024/11/apt-k-47-uses-hajj-themed-lures-to.html
๐Ÿ‘20โšก5๐Ÿ”ฅ5๐Ÿค”4
Sapphire Sleet, a North Korea-linked threat group, has stolen over $10 million in cryptocurrency through sophisticated social engineering schemes.

Curious how these attacks work? Learn more: https://thehackernews.com/2024/11/north-korean-hackers-steal-10m-with-ai.html
๐Ÿ‘18๐Ÿคฏ6โšก5๐Ÿ”ฅ2๐Ÿ˜ฑ1
Google blocks over 1,000 websites linked to Chinaโ€™s GLASSBRIDGE influence operation.

These fake news sites push pro-China narratives, disguising themselves as legitimate news outlets.

Learn more: https://thehackernews.com/2024/11/google-exposes-glassbridge-pro-china.html
๐Ÿ‘43๐Ÿ˜ฑ11๐Ÿ‘9โšก4๐Ÿ˜4๐Ÿค”4๐Ÿ”ฅ1
This media is not supported in your browser
VIEW IN TELEGRAM
Researchers have uncovered new attack techniques targeting infrastructure-as-code (IaC) and policy-as-code (PaC) tools like HashiCorp's Terraform and Open Policy Agent (OPA), posing a severe risk to cloud platforms.

Learn how this attack works: https://thehackernews.com/2024/11/cybersecurity-flaws-in-iac-and-pac.html
๐Ÿ‘19๐Ÿ”ฅ10โšก2๐Ÿคฏ1
Ever heard of attackers mimicking your device's profile to bypass security? Itโ€™s happening right now.

Modern phishing attacks gather detailed device info to impersonate victims, making detection harder than ever.

Learn more about these advanced techniques: https://thehackernews.com/2024/11/flying-under-radar-security-evasion.html
๐Ÿ‘11๐Ÿ”ฅ9๐Ÿ˜6โšก4๐Ÿคฏ1
Google has just rolled out a new feature called "Restore Credentials," making it easier than ever to securely access third-party apps when transferring data to a new #Android device.

Discover how this feature works. https://thehackernews.com/2024/11/googles-new-restore-credentials-tool.html
๐Ÿ‘21โšก4๐Ÿ‘4๐Ÿ˜4๐Ÿ”ฅ3
๐Ÿšจ A critical security flaw (CVE-2023-28461) impacting Array Networks AG and vxAG gateways has been added to the CISA's Known Exploited Vulnerabilities catalog after reports of active exploitation.

Read more about the flaw, its exploitation: https://thehackernews.com/2024/11/cisa-urges-agencies-to-patch-critical.html
๐Ÿ‘13๐Ÿ”ฅ7
A previously unknown China-linked hacking group, Earth Estries, has been discovered using custom backdoorsโ€”GHOSTSPIDER and MASOL RATโ€”to target Southeast Asian telecoms, #technology companies, and governments.

Read full details: https://thehackernews.com/2024/11/chinese-hackers-use-ghostspider-malware.html
๐Ÿ‘17๐Ÿ˜4
A Russia-aligned hacker group has used zero-day flaws in Firefox and Windows to deliver the RomCom backdoor malware.

The attack requires no user interactionโ€”just visiting a compromised site is enough to trigger the exploit.

Read the full article: https://thehackernews.com/2024/11/romcom-exploits-zero-day-firefox-and.html
๐Ÿ”ฅ30๐Ÿ˜ฑ21๐Ÿ‘5๐Ÿ˜3โšก2๐Ÿค”2๐Ÿคฏ1
Turn strategy into action step-by-step! ๐Ÿ‘‡

Master the 5 stages of the CTEM framework and take your cybersecurity to the next level:

1๏ธโƒฃ Scoping
2๏ธโƒฃ Discovery
3๏ธโƒฃ Prioritization
4๏ธโƒฃ Validation
5๏ธโƒฃ Mobilization

Donโ€™t just react to threatsโ€”stay ahead of them. Learn how XM Cyber can help you operationalize CTEM and secure your organization effectively.

๐Ÿ‘‰ Discover the Guide: https://thn.news/operationalizing-ctem

๐Ÿ’ก Swipe through the carousel to explore each stage in detail! ๐Ÿš€
๐Ÿ‘20๐Ÿ”ฅ4๐Ÿ‘1๐Ÿคฏ1
๐Ÿ›‘ Two critical vulnerabilities found in WordPressโ€™s CleanTalk plugin leave sites exposed to malicious attacks and data theft.

This exploit impacts over 200,000 sitesโ€”update your CleanTalk plugin ASAP!

Get the full details here: https://thehackernews.com/2024/11/critical-wordpress-anti-spam-plugin.html
๐Ÿ‘27๐Ÿ”ฅ16๐Ÿ˜3๐Ÿ˜ฑ2
๐Ÿšจ New threat alert: Matrix, a lone-wolf hacker, is using IoT devices as a botnet to launch widespread DDoS attack.

Learn how you can secure your systems and prevent similar threats. Full story here: https://thehackernews.com/2024/11/matrix-botnet-exploits-iot-devices-in.html
๐Ÿ”ฅ15๐Ÿ‘6๐Ÿ˜5โšก1
๐Ÿ”’ INTERPOLโ€™s massive operation across 19 African nations has resulted in over 1,000 arrests and the takedown of 134,000+ malicious networks.

Learn more about how this operation โ€” https://thehackernews.com/2024/11/interpol-busts-african-cybercrime-1006.html
๐Ÿ‘31๐Ÿ‘10โšก4๐Ÿ”ฅ4๐Ÿค”3๐Ÿ˜2๐Ÿ˜ฑ2
Zero Trust isnโ€™t just a buzzwordโ€”itโ€™s a necessity. Zero Trust Network Access (ZTNA) can replace VPNs, reduce lateral movement, and harden existing devices, making them nearly impossible to exploit.

Find out how to get started with Zero Trust for a stronger security posture: https://thehackernews.com/expert-insights/2024/11/defensible-security-architecture-and.html
๐Ÿ‘25๐Ÿ”ฅ8๐Ÿ‘4
APT-C-60 strikes again โ€“ this time with a targeted attack exploiting the WPS Office vulnerability (CVE-2024-7262) to deploy the SpyGlace backdoor.

Read more about how this advanced attack works: https://thehackernews.com/2024/11/apt-c-60-exploits-wps-office.html
๐Ÿ‘19โšก5๐Ÿค”2๐Ÿ˜ฑ2
A new UEFI bootkit called Bootkitty has been discovered, designed specifically for Linux systemsโ€”marking a significant shift in the cyber threat landscape.

Read the full analysis โ€” https://thehackernews.com/2024/11/researchers-discover-bootkitty-first.html
๐Ÿ”ฅ27๐Ÿ˜ฑ12๐Ÿ‘6๐Ÿ˜3โšก2
Multi-stage cyberattacks are getting harder to detect and more dangerous than ever. Learn how they trick you into letting your guard down.

Attackers use links, embedded QR codes, and other sneaky methods to steal your credentials.

Learn how to spot these hidden threats: https://thehackernews.com/2024/11/latest-multi-stage-attack-scenarios.html
๐Ÿ‘17๐Ÿ”ฅ12๐Ÿคฏ4โšก3๐Ÿ‘2
A critical #vulnerability (CVE-2024-11680) in the ProjectSend file-sharing app is being actively exploited.

It allows attackers to execute malicious code on vulnerable servers.

Donโ€™t wait for an attackโ€”patch now: https://thehackernews.com/2024/11/critical-flaw-in-projectsend-under.html
๐Ÿ‘26๐Ÿ˜ฑ9โšก4๐Ÿ‘2๐Ÿ˜2
T-Mobile has detected attempted cyber intrusions from an external provider's networkโ€”but no sensitive data was accessed.

Find out more: https://thehackernews.com/2024/11/us-telecom-giant-t-mobile-detects.html
๐Ÿ‘19๐Ÿค”9๐Ÿ‘2๐Ÿ˜1๐Ÿ˜ฑ1