The Hacker News
β Official THN Telegram Channel β A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking. π¨ Contact: [email protected] π Website: https://thehackernews.com
Ko'proq ko'rsatish124 957
Obunachilar
+3724 soatlar
+1247 kunlar
+35930 kunlar
- Kanalning o'sishi
- Post qamrovi
- ER - jalb qilish nisbati
Ma'lumot yuklanmoqda...
Obunachilar o'sish tezligi
Ma'lumot yuklanmoqda...
Ransomware, DDoS, data breaches β 2023 was a tough year for cybersecurity.
The good news? Many of these attacks could have been prevented with better basic practices.
Learn more at our upcoming webinar: https://thehackernews.com/2024/06/ultimate-cyber-hygiene-guide-learn-how.html
SAVE YOUR SPOT NOW!
π€ 3π 1
π¨ LightSpy, a malware framework, now targets macOS alongside iOS, Android, and Windows. It uses 10 plugins to gather extensive data from infected devices.
Learn more: https://thehackernews.com/2024/06/lightspy-spywares-macos-variant-found.html
β‘ 2π 1
Traditional SCA tools often miss critical vulnerabilities and create alert fatigue. Learn how to protect your software supply chain from emerging threats.
π Download the guide for more insights: https://thehackernews.com/2024/06/cyber-landscape-is-evolving-so-should.html
π₯ 5π€ 2π± 2π 1
Growing concerns over responsible π€ AI use:
β Google guides Android devs
β Meta faces EU privacy complaints
β Microsoft's Recall feature raises security red flags
Learn about the potential risks & how they could impact you: https://thehackernews.com/2024/06/the-ai-debate-googles-guidelines-metas.html
π 9π₯ 6
π FBI has 7,000+ decryption keys for LockBit ransomware to help victims recover their data for free. If you're a victim, don't pay the ransom.
π§ Here's how to unlock your data: https://thehackernews.com/2024/06/fbi-distributes-7000-lockbit-ransomware.html
π 21π 5π€― 4π 2
π Alert: CERT-UA warns of cyber-attacks on Ukraine's defense forces using the SPECTR malware in SickSync espionage campaign.
Learn more about the tactics used by the Vermin group: https://thehackernews.com/2024/06/spectr-malware-targets-ukraine-defense.html
π 5π₯ 4π€― 4
Cybercriminals are exploiting vulnerabilities in Docker and ThinkPHP to deploy cryptominers and web shells.
Learn more about these cyberattacks - https://thehackernews.com/2024/06/commando-cat-cryptojacking-attacks.html
Secure your installations and update your applications to prevent attacks.
π 12π₯ 3π€― 2
New vulnerabilities are disclosed hourly, new exploits for old vulnerabilities are publicly released and threat actors are updating their techniques continuously.
Knowing where and how to prioritize your security resources to achieve the greatest impact with the least time invested is critical.
Join Intruderβs webinar on June 12, 2024, to learn how to get started: https://thn.news/exposure-management-lessons
Canβt make it? Register for the webinar and a copy will be sent.
Focus on what matters most! Exposure management and your attack surface
Your business, attack surface and the threat landscape are not static - they are constantly changing. Knowing where and how to prioritize your security resources to achieve the greatest impact with the least time invested is critical. Join us to find out how to get started.
π 9π₯ 6
π¨ 61% of U.S. businesses were hit by software supply chain attacks last year, causing data breaches, financial losses, and reputational harm.
π Learn how to protect your organization from these critical threats: https://thehackernews.com/2024/06/third-party-cyber-attacks-threat-no-one.html
π₯ 13π 7π 1
π€ Muhstik botnet malware is now exploits CVE-2023-33246 in Apache RocketMQ, targeting IoT devices and Linux servers for DDoS attacks and cryptomining.
Find more details on this ongoing threat here: https://thehackernews.com/2024/06/muhstik-botnet-exploiting-apache.html
π 9π₯ 6π 1