The Hacker News Profile Banner
The Hacker News Profile
The Hacker News

@TheHackersNews

Followers
914,244
Following
2,043
Media
7,053
Statuses
39,128

#1 Most trusted publication for breaking cybersecurity and hacking news, insights, and analysis for information security professionals.

The Internet
Joined October 2010
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@TheHackersNews
The Hacker News
3 hours
Alexey Pertsev, co-founder of Tornado Cash, sentenced to 5+ years in prison by Dutch court. The crypto mixer service was sanctioned by the U.S. for facilitating money laundering. Read details here: #CryptoNews #Cryptocurrency
5
12
18
@TheHackersNews
The Hacker News
4 hours
🚨 Attention - #Microsoft has patched 61 new security flaws, including two zero-days actively exploited in the wild. Find out how threat actors could gain domain admin privileges and create stealthy persistence mechanisms. Read details: #cybersecurity
0
34
54
@TheHackersNews
The Hacker News
19 hours
🛑 Attention VMware users. Multiple security flaws discovered in Workstation (17.x) and Fusion (13.x). Don't wait, update now to stay protected. Read details: #cybersecurity
12
93
154
@TheHackersNews
The Hacker News
21 hours
🔔 Urgent: #Google has released emergency fixes for a new zero-day #vulnerability (CVE-2024-4761) that has been actively exploited in the wild. Details here: Upgrade to the latest version now.
6
140
193
@TheHackersNews
The Hacker News
23 hours
🔒 Is your organization's cybersecurity at risk due to human users? Discover the importance of advanced authentication measures and how to avoid common implementation mistakes. Learn more: #cybersecurity #hacking
4
13
20
@TheHackersNews
The Hacker News
24 hours
🔐 Researchers uncover critical vulnerabilities in Cacti, a popular open-source network monitoring tool. Don't wait, update your instances to version 1.2.27 today. More info in the article.: #cybersecurity #hacking
1
52
73
@TheHackersNews
The Hacker News
24 hours
#GitHub 's lack of content validation and privacy controls poses a significant risk, allowing attackers to use its own features to bypass email security controls and deliver malicious content. Learn how it works & how to mitigate the risk: @Recolabs_ai
0
18
25
@TheHackersNews
The Hacker News
1 day
🚨 Attention - A new social engineering campaign is targeting enterprises with spam emails to gain initial access. The threat actor overwhelms users' email and calls them, offering assistance to resolve the issue. Learn more: #CybersecurityNews
3
32
47
@TheHackersNews
The Hacker News
1 day
🚨 Did you know 60% of SOC incidents are repeat findings due to unmitigated risks? Explore how the SecurityHQ's Response Platform utilizes AI to help analysts overcome this challenge. 🔗 Read more here: #cybersecurity #infosec
3
7
19
@TheHackersNews
The Hacker News
2 days
🔒 Browser Security Alert: Did you know that 62% of the workforce uses unmanaged devices to access corporate data? Learn more about the risks and how to protect your organization in the Annual Browser Security Report 2024. Read: #cybersecurity
0
7
18
@TheHackersNews
The Hacker News
2 days
Researchers have uncovered multiple severe security flaws in Cinterion cellular modems that could put your communication networks and IoT devices at risk. Learn more about the risks and how to mitigate them: #cybersecurity #infosec
3
32
57
@TheHackersNews
The Hacker News
2 days
🚨 Attention Python developers! A malicious PyPI package, "requests-darwin-lite," posing as a fork of the popular "requests" library, has been spotted that's hiding Golang-based Sliver C2 framework in a PNG image. Details here: #infosec #cybersecurity
3
107
177
The Hacker News Retweeted
@TheHackersNews
The Hacker News
5 days
WARNING: Using #Chrome or any Chromium-based browsers? Don't wait—update your browser ASAP! Google has just released an update to patch a new zero-day flaw, CVE-2024-4671, which hackers are actively exploiting in the wild. Details #cybersecurity
9
266
409
@TheHackersNews
The Hacker News
5 days
⚡ Don't just detect threats - respond to them. EDR solutions offer powerful response and remediation capabilities to help you mitigate and contain threats quickly. Find the right EDR solution for your business with this guide: #cybersecurity #infosec
0
14
46