The Hacker News(@TheHackersNews) 's Twitter Profileg
The Hacker News

@TheHackersNews

#1 Most trusted publication for breaking cybersecurity and hacking news, insights, and analysis for information security professionals.

ID:209811713

linkhttps://thehackernews.com/ calendar_today29-10-2010 23:55:25

39,0K Tweets

913,7K Followers

2,0K Following

Follow People
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🚨 MILLIONS of malicious 'imageless' containers have been planted on Docker Hub over the past 5 years in multiple cybercriminal campaigns designed to phish users and deliver payloads.

Get details here: thehackernews.com/2024/04/millio…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🤖 U.S. government releases new AI security guidelines to protect critical systems like power grids and water treatment plants from AI threats.

Learn more: thehackernews.com/2024/04/us-gov…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🔒 Say goodbye to easily guessable passwords on your smart home devices!

The U.K.'s PSTI act prohibits DEFAULT PASSWORDS from April 2024 onwards. Manufacturers must up their security game or face hefty fines up to £10 MILLION.

Read: thehackernews.com/2024/04/new-uk…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🚨 NEW THREAT ALERT!

Cybersecurity researchers have uncovered 'Muddling Meerkat' - a sophisticated Chinese threat actor abusing DNS for global reconnaissance since 2019.

Details: thehackernews.com/2024/04/china-…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

Just in! Google is tightening the screws on bad actors:

200K app submissions rejected
333K bad accounts blocked
2.28 million policy-violating apps prevented
31 SDKs impacting 790,000+ apps had data access limited
1.5 million outdated apps removed

thehackernews.com/2024/04/google…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

👨‍💻🔐 A new security (CVE-2024-27322) has been discovered in the R language. It could allow attackers to execute arbitrary code through malicious RDS files, exposing your projects to supply chain attacks.

Read: thehackernews.com/2024/04/new-r-…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

Learn how Exposure Management empowers organizations to prioritize the most critical exposures based on their potential impact and proactively strengthen cybersecurity posture.

Read the full article to discover the power of Exposure Management ➡️ thehackernews.com/2024/04/naviga…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🚨 Multiple vulnerabilities have been discovered in the popular Judge0 online code execution system, putting users at risk of complete system compromise.

Get the details: thehackernews.com/2024/04/sandbo…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

📢 Heads up! Okta is sounding the alarm on an unprecedented spike in credential stuffing attacks targeting online services.

These attacks are powered by readily available tools and stolen credentials.

Details: thehackernews.com/2024/04/okta-w…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

Cybersecurity researchers have uncovered a targeted cyber attack against Ukraine that leveraged a 7-year-old Office flaw to deploy Cobalt Strike beacons on victims' systems.

Read: thehackernews.com/2024/04/ukrain…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🚨 Developers Beware! A new social engineering scam is on the rise, luring software engineers with fake job interviews only to infect their systems with BeaverTail and InvisibleFerret backdoors .

thehackernews.com/2024/04/bogus-…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

Multiple severe vulnerabilities discovered in Brocade SANnav SAN management application.

From insecure root access to lack of authentication and encryption, one flaw even allows unauthenticated remote attackers to log in as root!

Read: thehackernews.com/2024/04/severe…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🛡️ Did you know 70% of successful breaches begin at the endpoint? Unprotected devices are gateways for devastating cyberattacks.

This guide shares 10 must-know tips, from identifying vulnerabilities to implementing robust security solutions: thehackernews.com/2024/04/10-cri…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

⚠️ Attention users!

A new called Brokewell is disguising itself as updates for popular apps like Google Chrome and Klarna. Don't fall for these fake updates.

Click to find out more: thehackernews.com/2024/04/new-br…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🆘 Attention, Palo Alto Networks users!

A critical (CVE-2024-3400) in PAN-OS could expose your systems to remote code execution attacks.

Good news: Hotfixes and remediation steps available.

Read full advisory: thehackernews.com/2024/04/palo-a…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🚨 Attention users!

A critical SQL injection (CVE-2024-27956) in the WP-Automatic plugin is being actively exploited. With a max severity of 9.9/10, this bug enables site takeovers and malicious activities.

Details: thehackernews.com/2024/04/hacker…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

North Korean hackers used fake job offers to deliver a new Trojan called Kaolin RAT. It can change file timestamps and load - a gateway to the dangerous FudModule rootkit.

Details here: thehackernews.com/2024/04/north-…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

Most network attacks aren't ultra-sophisticated. They often use common tools that exploit multiple vulnerabilities.

A simulation shows how attackers can gain access through something as simple as a malicious email attachment.

thehackernews.com/2024/04/networ…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

The new search tool from @AnyRun_app helps you quickly find relevant threats.

🔍 Scan the service's public database using your own YARA rules to identify matching files. Explore the findings further in the sandbox.

Learn more ➡️ thehackernews.uk/yara-malware-s…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

U.S. Department of Justice arrested two founders of mixer Samourai, seizing the service, for allegedly enabling over $2 billion in illegal transactions and laundering more than $100 million in criminal proceeds.

Learn more: thehackernews.com/2024/04/doj-ar…

account_circle