The Hacker News(@TheHackersNews) 's Twitter Profileg
The Hacker News

@TheHackersNews

#1 Most trusted publication for breaking cybersecurity and hacking news, insights, and analysis for information security professionals.

ID:209811713

linkhttps://thehackernews.com/ calendar_today29-10-2010 23:55:25

39,0K Tweets

913,8K Followers

2,0K Following

Follow People
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🔥 Webinar Alert >>

Join us for 'Uncovering Contemporary DDoS Attack Tactics' with cybersecurity expert Andrey Slastenov. Learn how to protect your business from devastating DDoS attacks.

Don't miss out—register today: thehackernews.com/2024/05/expert…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

Threat actors like APT28, REF2924, and Red Stinger are weaponizing Graph API to evade detection and communicate with their command-and-control infrastructure hosted on Microsoft cloud services.

Read: thehackernews.com/2024/05/hacker…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🚨 65% of SaaS apps aren't approved by IT! Are you aware of the risks lurking in your digital workspace? Discover how unauthorized apps can jeopardize your data and what you can do about it.

Dive into this guide on mitigating Shadow SaaS risks: thehackernews.com/2024/05/new-gu…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

📨 Watch Out for Spoofed Emails!

The U.S. government has issued a new advisory warning about North Korean hackers sending spoofed emails that appear to be from trusted sources

Learn more: thehackernews.com/2024/05/nsa-fb…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🐍 Python isn't just a language, it's a gateway to innovation in blockchain!

Join the conversation with Mark, Min, and John from Algorand Foundation 🐍 as they discuss the fusion of Python & blockchain development.

Watch it here: thehackernews.com/videos/2024/05…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

announces that over 400 million accounts now use passkeys—the passwordless authentication solution—and are extending support for the use of passkeys to high-risk users as part of its Advanced Protection Program (APP).

thehackernews.com/2024/05/google…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

Aruba Networking has released patches for ArubaOS to fix 4 critical flaws allowing remote code execution, giving attackers full control.

thehackernews.com/2024/05/four-c…

Vulnerability affects mobility controllers, WLAN gateways, and more. Update software immediately to stay protected.

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

Exploring DSPMs at RSA? With @Sentra_Security's DSPM:

🔸Your data stays in your environment
🔸Get 150+ out-of-the-box and custom classifiers
🔸There's no need to configure connections manually
🔸Continuous activity log monitoring & suspicious activities alert

Schedule a live…

Exploring DSPMs at RSA? With @Sentra_Security's DSPM: 🔸Your data stays in your environment 🔸Get 150+ out-of-the-box and custom classifiers 🔸There's no need to configure connections manually 🔸Continuous activity log monitoring & suspicious activities alert Schedule a live…
account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🚨 Alert - Popular apps like Xiaomi File Manager and WPS Office are vulnerable to a path traversal flaw that could let hackers overwrite files and execute malicious code, leaving over 1.5 billion users exposed.

Details here: thehackernews.com/2024/05/popula…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

Relying on a single scanner? New research shows leading scanners can miss thousands of vulnerabilities.

Use multiple scanning engines for a comprehensive view of your attack surface.

Learn more: thehackernews.com/2024/05/when-i…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🕵️‍♂️ Ukrainian hacker from REvil gang sentenced to over 13 years, ordered to pay $16M restitution for 2,500+ attacks demanding $700M in crypto ransoms.

Learn more: thehackernews.com/2024/05/ukrain…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

⚡ Dropbox Sign Breached!

Unidentified hackers accessed user emails, usernames, and account settings for all Sign users. Emails, phone numbers, and authentication info like API keys were also exposed for some.

Learn more: thehackernews.com/2024/05/dropbo…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

A new botnet called Goldoon is targeting D-Link routers with a critical from 2015.

This flaw (CVE-2015-2051) allows RCE, giving attackers full control. An alarming spike in Goldoon activity was detected on April 9th.

thehackernews.com/2024/05/new-go…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

Understanding volatile data is key to digital forensics. Discover how this ephemeral data can be like fleeting whispers in a city, crucial yet swift to disappear.

Explore: cybersecurity.att.com/blogs/security…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🚨 Attention users!

A critical flaw (CVE-2023-7028) is being actively exploited, allowing account takeover by sending password reset emails to unverified addresses.

Read details: thehackernews.com/2024/05/cisa-w…

Update to the latest patched versions immediately.

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🚨 Attention router users!

A new stealthy called Cuttlefish is targeting SOHO routers to monitor ALL traffic passing through infected devices to steals authentication credentials.

Read: thehackernews.com/2024/05/new-cu…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🕵️‍♀️ Forensic analysis uncovers criminal clusters tied to money laundering.

Scientists teamed up to analyze blockchain data, revealing shady transactions to crypto exchanges. Hunt on to stop bad actors.

Read on: thehackernews.com/2024/05/bitcoi…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

Researchers have uncovered a new malware called Wpeeper that uses compromised sites to hide its true command-and-control servers.

This sneaky backdoor can collect device info, manage files, & execute malicious commands.

Learn more: thehackernews.com/2024/05/androi…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

Are your employees snoozing through outdated training? 69% admit to bypassing security guidelines.

Wake them up! Engage your team with relevant, expertly crafted lessons that drive real behavioral change.

Read on to learn how: thehackernews.com/2024/05/everyo…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

ZLoader, a dangerous , has resurfaced with an enhanced anti-analysis feature that prevents it from running on any machine other than the one initially infected.

Learn more about it: thehackernews.com/2024/05/zloade…

account_circle