noname 🥸 pfp

noname 🥸

@n3rd

79 Following
23 Followers


noname 🥸 pfp
noname 🥸
@n3rd
⚠️ A high-severity vulnerability in Samsung's Monkey's Audio decoder (CVE-2024-49415) is putting millions of devices at risk. 🔴 No user interaction needed – attackers can exploit this flaw remotely, allowing them to execute arbitrary code on your phone. Update your Samsung device immediately to patch this flaw. Read details here: https://thehackernews.com/2025/01/google-project-zero-researcher-uncovers.html
0 reply
0 recast
0 reaction

noname 🥸 pfp
noname 🥸
@n3rd
🚨 China-linked RedDelta hackers are targeting Southeast Asia, Mongolia & Taiwan with custom PlugX backdoors in a series of espionage attacks. ⤷ New tactic: Using Cloudflare CDN to mask malicious traffic ⤷ Spyware deployed: Custom PlugX backdoor Read: https://thehackernews.com/2025/01/reddelta-deploys-plugx-malware-to.html
0 reply
0 recast
0 reaction

noname 🥸 pfp
noname 🥸
@n3rd
🚨 New Threat Alert: Banshee Stealer! The latest variant targets macOS users and hides its tracks using Apple-inspired encryption. 💻 Targets victims via phishing websites disguised as Google Chrome & Telegram 💸 Offered to hackers for $3,000/month under a Malware-as-a-Service model 🔗 Read more: https://thehackernews.com/2025/01/new-banshee-stealer-variant-bypasses.html
0 reply
0 recast
0 reaction

noname 🥸 pfp
noname 🥸
@n3rd
🛑 China-linked MirrorFace has targeted Japan’s security and tech sectors in over 4 years of persistent attacks, says NPA & NCSC. These attackers use spear-phishing, exploit device vulnerabilities, and evade antivirus detection by operating in Windows Sandbox—leaving no trace behind. 🔗 Learn the tactics attackers use and how to counter them: https://thehackernews.com/2025/01/mirrorface-leverages-anel-and-noopdoor.html
0 reply
0 recast
0 reaction

noname 🥸 pfp
noname 🥸
@n3rd
😄😄 For the first time ever, the European Commission has been fined (Just €400) for violating its own data privacy laws. The breach involved sending an EU citizen's data—including IP address and browser metadata—to Meta's servers in the U.S. via "Sign in with Facebook." Learn more: https://thehackernews.com/2025/01/eu-commission-fined-for-transferring.html
0 reply
0 recast
0 reaction

noname 🥸 pfp
noname 🥸
@n3rd
🚨 Forgotten domains are becoming cybercriminals' secret weapon to bypass email security! Hackers are reviving decades-old domains that lack basic security measures to send phishing emails. These tactics fool even advanced systems like SPF and DMARC. Learn more: https://thehackernews.com/2025/01/neglected-domains-used-in-malspam-to.html
0 reply
0 recast
0 reaction

noname 🥸 pfp
noname 🥸
@n3rd
🔒 NonEuclid, a new Remote Access Trojan, combines stealth, evasion, and ransomware into a single devastating package. It’s being advertised as a crimeware solution. ⤷ Dual Purpose: Acts as both a RAT and ransomware. ⤷ Stealth Mode: Uses sandbox detection to avoid virtual environments. ⤷ Persistence: Modifies Windows Registry and sets scheduled tasks for survival. 👉 Read more: https://thehackernews.com/2025/01/researchers-expose-noneuclid-rat-using.html
0 reply
0 recast
0 reaction

noname 🥸 pfp
noname 🥸
@n3rd
🚨 Lumma malware continues to wreak havoc in 2025, stealing sensitive information through fake CAPTCHA pages, torrents, and phishing emails. Explore how to proactively analyze Lumma and stop it in its tracks using tools like @ANYRUN_app's sandbox. 👉 https://thehackernews.com/2025/01/top-5-malware-threats-to-prepare.html
0 reply
0 recast
0 reaction

noname 🥸 pfp
noname 🥸
@n3rd
CISA has flagged 3 actively exploited vulnerabilities—two in Mitel MiCollab and one in Oracle WebLogic Server. ⤷ CVE-2024-41713: Remote access via path traversal. ⤷ CVE-2024-55550: Exploited by attackers with admin privileges. ⤷ CVE-2020-2883: A high-severity vulnerability in Oracle WebLogic with known exploits. 👉 Don’t wait—secure your systems now: https://thehackernews.com/2025/01/cisa-flags-critical-flaws-in-mitel-and.html
0 reply
0 recast
0 reaction

noname 🥸 pfp
noname 🥸
@n3rd
🚨 Every second in 2024, cybercriminals attempted 7,000 password attacks—up 75% from last year! Phishing surged 58%, leading to $3.5 billion in losses. Learn the top strategies to protect your SaaS environment from these relentless threats. Read here: https://thehackernews.com/2025/01/from-22m-in-ransom-to-100m-stolen.html
0 reply
0 recast
0 reaction

noname 🥸 pfp
noname 🥸
@n3rd
FireScam malware is targeting Android devices by disguising itself as a fake “Telegram Premium” app. Once installed, it: ↪ Steals sensitive data (messages, notifications, call logs, credentials) ↪ Blocks legitimate app updates to remain undetected This malware uses advanced techniques to spy on users and maintain control over devices—posing a major threat to personal and organizational data. Get all the details 👉 https://thehackernews.com/2025/01/firescam-android-malware-poses-as.html
0 reply
0 recast
0 reaction

noname 🥸 pfp
noname 🥸
@n3rd
🔒 Critical Alert: Malicious npm packages are impersonating Hardhat tools to steal private keys and mnemonics. ↪ Over 1,000 downloads of a single fake package, active for over a year. ↪ Data is exfiltrated using hardcoded Ethereum addresses. Open-source dependency complexity is a hacker’s dream—manual reviews are becoming impossible. 🔧 What You Can Do: ✅ Double-check every dependency. ✅ Use tools to audit npm packages. ✅ Build robust supply chain defenses. 🔗 Read the details: https://thehackernews.com/2025/01/russian-speaking-attackers-target.html
0 reply
1 recast
0 reaction

noname 🥸 pfp
noname 🥸
@n3rd
🚨 Critical Update: With Edgio services shutting down, Microsoft is migrating all .NET workloads to Azure Front Door CDNs. 💡 Deadline: January 7, 2025. 👉 Scan your codebase and update references today to avoid downtime. Learn more: https://thehackernews.com/2025/01/critical-deadline-update-old-net.html
0 reply
0 recast
0 reaction

noname 🥸 pfp
noname 🥸
@n3rd
🚨 The U.S. Treasury just sanctioned Integrity Technology Group, a Beijing-based cybersecurity firm, for enabling state-sponsored cyberattacks on U.S. entities. ↪ Linked to Flax Typhoon (aka RedJuliett) ↪ Exploited IoT vulnerabilities. ↪ Targeted government agencies, telecoms, and universities. 🔗 Read the details: https://thehackernews.com/2025/01/us-treasury-sanctions-beijing.html
0 reply
0 recast
1 reaction

noname 🥸 pfp
noname 🥸
@n3rd
🚨 ALERT: New multi-turn jailbreaking attack, Bad Likert Judge, cleverly bypasses AI safety measures across six major platforms, including AWS, Google, and NVIDIA. » Attack success rates spike by 60% using this technique. » Tested across major platforms—OpenAI, Google, and more. » Categories impacted: hate speech, malware, even weapons. 👉 Explore expert findings: https://thehackernews.com/2025/01/new-ai-jailbreak-method-bad-likert.html
0 reply
0 recast
0 reaction

noname 🥸 pfp
noname 🥸
@n3rd
🔒 Apple will pay $95M to settle claims that Siri accidentally recorded and shared private conversations with third parties. 📊 Key Details: » Covers Siri-enabled devices from 2014 to 2024. » Claim up to $20 per device (max 5). » Apple introduced new privacy settings, but is it enough? 🔗 Get the full story: https://thehackernews.com/2025/01/apple-to-pay-siri-users-20-per-device.html
0 reply
0 recast
1 reaction

noname 🥸 pfp
noname 🥸
@n3rd
🚨 Three Russian-German nationals charged with espionage and sabotage by German prosecutors. One suspect, Dieter S., allegedly scouted military sites and planned attacks to disrupt Germany's support for Ukraine. Learn more: https://thehackernews.com/2025/01/three-russian-german-nationals-charged.html
0 reply
0 recast
0 reaction

noname 🥸 pfp
noname 🥸
@n3rd
🔒 A new npm package poses as a vulnerability detector for Ethereum smart contracts but silently installs Quasar RAT—a remote access trojan that gives attackers: 🖥️ Full control over your system 🛡️ Persistence via Windows Registry tweaks 📡 Command-and-Control connections to steal data 🔗 Read the full analysis: https://thehackernews.com/2025/01/malicious-obfuscated-npm-package.html
0 reply
0 recast
0 reaction

noname 🥸 pfp
noname 🥸
@n3rd
🔒 Department of Justice has finalized a rule blocking bulk transfers of Americans’ sensitive personal data to adversarial nations like China, Russia, and North Korea. » Data like Social Security numbers, geolocation, biometrics, and health information is now protected. » These countries have used such data for espionage, AI development, and suppressing freedoms. Read full story here 👉 https://thehackernews.com/2024/12/new-us-doj-rule-halts-bulk-data.html
0 reply
0 recast
0 reaction

noname 🥸 pfp
noname 🥸
@n3rd
💡🧅 OnionGPT - Have fun 🥸 http://oniongpt6lntsoztgylhju7nmqedlq6fjexe55z327lmxyae3nutlyad.onion/
0 reply
0 recast
0 reaction