The Hacker News(@TheHackersNews) 's Twitter Profileg
The Hacker News

@TheHackersNews

#1 Most trusted publication for breaking cybersecurity and hacking news, insights, and analysis for information security professionals.

ID:209811713

linkhttps://thehackernews.com/ calendar_today29-10-2010 23:55:25

39,1K Tweets

914,3K Followers

2,0K Following

Follow People
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🛑 Attention VMware users.

Multiple security flaws discovered in Workstation (17.x) and Fusion (13.x). Don't wait, update now to stay protected.

Read details: thehackernews.com/2024/05/vmware…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🔔 Urgent: has released emergency fixes for a new zero-day (CVE-2024-4761) that has been actively exploited in the wild.

Details here: thehackernews.com/2024/05/new-ch…

Upgrade to the latest version now.

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🔒 Is your organization's cybersecurity at risk due to human users? Discover the importance of advanced authentication measures and how to avoid common implementation mistakes.

Learn more: thehackernews.com/2024/05/6-mist…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🔐 Researchers uncover critical vulnerabilities in Cacti, a popular open-source network monitoring tool. Don't wait, update your instances to version 1.2.27 today.

More info in the article.: thehackernews.com/2024/05/critic…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

's lack of content validation and privacy controls poses a significant risk, allowing attackers to use its own features to bypass email security controls and deliver malicious content.

Learn how it works & how to mitigate the risk: thehackernews.com/expert-insight…

@Recolabs_ai

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🚨 Attention - A new social engineering campaign is targeting enterprises with spam emails to gain initial access. The threat actor overwhelms users' email and calls them, offering assistance to resolve the issue.

Learn more: thehackernews.com/2024/05/ongoin…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🚨 Did you know 60% of SOC incidents are repeat findings due to unmitigated risks?

Explore how the SecurityHQ's Response Platform utilizes AI to help analysts overcome this challenge.

🔗 Read more here: thehackernews.com/2024/05/shq-re…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🔒 Browser Security Alert: Did you know that 62% of the workforce uses unmanaged devices to access corporate data?

Learn more about the risks and how to protect your organization in the Annual Browser Security Report 2024.

Read: thehackernews.com/2024/05/the-20…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

MITREcorp has launched EMB3D, a new threat-modeling framework for embedded devices used in critical infrastructure.

Read: thehackernews.com/2024/05/mitre-…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

Researchers have uncovered multiple severe security flaws in Cinterion cellular modems that could put your communication networks and IoT devices at risk.

Learn more about the risks and how to mitigate them: thehackernews.com/2024/05/severe…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🚨 Attention - Black Basta operation has targeted over 500 entities across various sectors since April 2022.

Learn more about their tactics and how to protect your organization: thehackernews.com/2024/05/black-…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🚨 Attention Python developers!

A malicious PyPI package, 'requests-darwin-lite,' posing as a fork of the popular 'requests' library, has been spotted that's hiding Golang-based Sliver C2 framework in a PNG image.

Details here: thehackernews.com/2024/05/malici…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

WARNING: Using or any Chromium-based browsers? Don't wait—update your browser ASAP!

Google has just released an update to patch a new zero-day flaw, CVE-2024-4671, which hackers are actively exploiting in the wild.

Details thehackernews.com/2024/05/chrome…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

🔥 Alert: FIN7 hackers are impersonating trusted names like AnyDesk, WinSCP, BlackRock, and more to lure victims into their trap through malicious Google ads.

Read: thehackernews.com/2024/05/fin7-h…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

⚡ Don't just detect threats - respond to them.

EDR solutions offer powerful response and remediation capabilities to help you mitigate and contain threats quickly.

Find the right EDR solution for your business with this guide: thehackernews.com/2024/05/whats-…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

North Korean threat actor Kimsuky used a new Golang-based , Durian, in targeted attacks against South Korean crypto firms.

This backdoor enables remote code execution, file downloads, and data theft.

Explore the full report: thehackernews.com/2024/05/north-…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

Unlock AI potential in . Join us for an expert webinar with @CensysIO on the role of Generative AI in threat hunting.

Discover how AI-driven tools, such as , are reshaping threat hunting and defense strategies.

Reserve your seat: thehackernews.com/2024/05/censys…

account_circle
The Hacker News(@TheHackersNews) 's Twitter Profile Photo

WARNING: Using or any Chromium-based browsers? Don't wait—update your browser ASAP!

Google has just released an update to patch a new zero-day flaw, CVE-2024-4671, which hackers are actively exploiting in the wild.

Details thehackernews.com/2024/05/chrome…

account_circle