The Hacker News
βœ”
152K subscribers
1.86K photos
10 videos
3 files
7.78K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
Google’s OAuth login exposes a critical vulnerability, allowing attackers to access old employee accounts simply by purchasing a defunct domain from a failed startup.

Learn how this vulnerability could affect your organization: https://thehackernews.com/2025/01/google-oauth-vulnerability-exposes.html
😁16😱9πŸ‘5🀯5πŸ‘2
πŸ”“ New macOS flaw (CVE-2024-44243) discovered!

Attackers could have bypassed crucial protections to install persistent malware and rootkits, potentially letting them take full control of your system.

Explore the details: https://thehackernews.com/2025/01/microsoft-uncovers-macos-vulnerability.html
πŸ”₯13πŸ‘6😱6πŸ‘1
🚨 UPDATE: Fortinet Confirms Critical Zero-Day 🚨

CVE-2024-55591 in FortiOS & FortiProxy (CVSS 9.6) allows attackers to gain super-admin access & hijack firewalls.

Affected versions: FortiOS 7.0.0-7.0.16 & FortiProxy 7.0.0-7.2.12.

Upgrade now to 7.0.17+ or 7.0.20+ to mitigate risk.

https://thehackernews.com/2025/01/zero-day-vulnerability-suspected-in.html
πŸ”₯29πŸ‘17⚑6😁2
πŸ”΄ Critical Alert: Microsoft has just released a massive patch for 161 vulnerabilities across its software, including 3 zero-day flaws that have been actively exploited.

β€· CVE-2025-21333
β€· CVE-2025-21334
β€· CVE-2025-21335

Patch now: https://thehackernews.com/2025/01/3-actively-exploited-zero-day-flaws.html
πŸ‘28πŸ”₯18😁6πŸ‘3⚑2
🚨 Critical Flaws Discovered in SimpleHelp Software!

An attacker could exploit these flaws to execute remote code, steal sensitive data, and bring your entire system down.

βœ… Action required NOW:
β€· SimpleHelp has released critical patches.
β€· Change admin passwords immediately.
β€· Restrict logins to trusted IP addresses.

Read: https://thehackernews.com/2025/01/critical-simplehelp-flaws-allow-file.html
πŸ‘7⚑3πŸ”₯3πŸ€”2
πŸ”₯ FBI removes PlugX malware from 4,250+ compromised computers.

$7 β€” that’s all it took for the FBI to sink a hacker-controlled server and trigger a "self-delete" command.

Learn more: https://thehackernews.com/2025/01/fbi-deletes-plugx-malware-from-4250.html
⚑23πŸ‘7πŸ‘4πŸ”₯1
🚨 Six critical security flaws disclosed in Rsync could allow attackers to execute arbitrary code on clients.

Any server with a public mirror could be exploited, putting SSH keys and other critical files at risk.

Read the full advisory: https://thehackernews.com/2025/01/google-cloud-researchers-uncover-flaws.html
πŸ”₯15πŸ‘8🀯4
⚠️ Cyber-attacks on ICS/OT are escalatingβ€”Are YOU prepared?

β€· ICS/OT security demands custom strategies, not IT playbooks.
β€· Cyber-attacks are growing, threatening power grids, water systems, and more.

πŸ‘‰ Check out the SANS Five ICS/OT Cybersecurity Critical Controls: https://thehackernews.com/2025/01/the-high-stakes-disconnect-for-icsot.html
πŸ‘11πŸ€”2πŸ”₯1
πŸ”’ North Korean hackers behind IT worker fraud linked to 2016 crowdfunding scam!

These attacks aren’t slowing down. With DPRK-backed groups like Lazarus leading crypto thefts, the scale of cybercrime has reached alarming levels.

πŸ”— Read the full report: https://thehackernews.com/2025/01/north-korean-it-worker-fraud-linked-to.html
πŸ‘24πŸ”₯2πŸ€”2
πŸ”΄ Warning: North Korea’s Lazarus Group is targeting Web3 and cryptocurrency developers!

Fake recruiters on LinkedIn are tricking developers with β€œcoding projects” that lead to malware.

πŸ‘‰ Learn more about their tactics: https://thehackernews.com/2025/01/lazarus-group-targets-web3-developers.html
πŸ‘17πŸ”₯10⚑3
🧐 A new malvertising campaign is targeting businesses by stealing Google Ads credentials! Here’s how it works:

β€· Ads that look legitimate lead to fraudulent login pages.
β€· Phishers steal 2FA codes and credentials.
β€· The goal? Hijack Google Ads accounts to run fraudulent ads.

πŸ”— Read more here: https://thehackernews.com/2025/01/google-ads-users-targeted-in.html
πŸ‘17😱7πŸ”₯5⚑4🀯2
🚨 URGENT: A Python-based backdoor is now used in RansomHub ransomware attacks after initial access via a fake browser update.
πŸ‘‡
Want to learn more? Read: https://thehackernews.com/2025/01/python-based-malware-powers-ransomhub.html
⚑13πŸ‘2πŸ”₯2
🚨 Ivanti has released urgent security updates to fix four critical vulnerabilities affecting EPM, Avalanche, and Application Control Engine. These flaws have been rated 9.8/10 on the CVSS scale, and if left unpatched, could allow remote attackers to leak sensitive data.

Learn more: https://thehackernews.com/2025/01/researcher-uncovers-critical-flaws-in.html
⚑9πŸ‘6πŸ”₯1
🚨 New phishing campaigns are using hidden code in images to deploy VIP Keylogger and 0bj3ctivity Stealer.

From the email to a PowerShell script to a .NET loaderβ€”everything is designed to bypass defenses.

πŸ”— Find out more about this rising threat: https://thehackernews.com/2025/01/hackers-hide-malware-in-images-to.html
⚑14πŸ‘4πŸ”₯1
πŸ”’ A new flaw (CVE-2024-7344) in UEFI systems has been discovered, letting attackers run unsigned code during system bootβ€”even with Secure Boot enabled.

Read more ➑️ https://thehackernews.com/2025/01/new-uefi-secure-boot-vulnerability.html
🀯26πŸ‘8⚑5😁4πŸ”₯2😱2
πŸ”΄ NTLMv1 Not Dead Yet!

Researchers uncover that a misconfiguration in on-premise apps can easily bypass Active Directory’s Group Policy meant to disable NTLMv1 authentication.

Learn How: https://thehackernews.com/2025/01/researchers-find-exploit-allowing.html
πŸ‘15😱7⚑3πŸ‘1
πŸ”‘ Stolen credentials are responsible for 80% of web app breaches in 2023-2024!

β€· Infostealer malware is fueling this rise, with credentials being sold for as little as $10.
β€· Even large companies with high security budgets are falling victim.

Learn how to tackle stolen credentials before they destroy your organization’s security.

πŸ”— Full article here: https://thehackernews.com/2025/01/the-10-cyber-threat-responsible-for.html
πŸ‘14πŸ‘1
🚨 Traditional trust management is failing in today’s digital world. As IoT devices explode, certificates pile up, and compliance rules tighten, how are you keeping up?

πŸ”‘ The solution? DigiCert ONE!
β€· Centralized trust management for devices, users, and workloads
β€· Automated security for hybrid environments
β€· Stress-free compliance

πŸ’‘Why it matters: The speed of digital transformation means old solutions just won’t cut it anymore. You need real-time, automated security.

πŸ“… Want to see how it works? Register for our free webinar now: https://thehackernews.com/2025/01/ready-to-simplify-trust-management-join.html
πŸ‘17πŸ”₯3πŸ‘1
⚑ A major shift in attack tactics – Star Blizzard, previously known as SEABORGIUM, is now exploiting WhatsApp accounts through a spear-phishing campaign.

β€· Primary targets: Diplomats, Ukraine supporters, and defense officials.
β€· Once clicked, hackers gain access to WhatsApp messages and data.

Learn more: https://thehackernews.com/2025/01/russian-star-blizzard-shifts-tactics-to.html
πŸ‘14😱5πŸ”₯1πŸ‘1
πŸ›‘ Alert : TikTok, SHEIN, AliExpress, and others accused of violating EU data laws by sending user data to China.

Privacy Group noyb demands suspension of data flows.

Find out more: https://thehackernews.com/2025/01/european-privacy-group-sues-tiktok-and.html
πŸ‘35😁20😱10πŸ‘7🀯7πŸ€”5πŸ”₯3