Home Hacker News

Hacker News

Our Hacker News category delivers up-to-the-minute coverage on hacker activities, breaches, and exploits. Discover insights into the latest tactics used by cybercriminals, including ransomware attacks, phishing campaigns, and system vulnerabilities.

We provide expert analyses to help you understand these threats and protect your data. From ethical hacking advancements to malicious cyberattack reports, our comprehensive coverage ensures you’re always informed.

China-Linked Salt Typhoon Hackers Launched Cyber Attack on AT&T and Verizon

China-Linked Salt Typhoon Hackers Launched Cyber Attack on AT&T and Verizon

Major U.S. telecom companies AT&T Inc. and Verizon Communications Inc. confirmed they were targeted by the China-linked hacking group known as Salt Typhoon. Both companies stated that their networks are now secure and free...
XT Exchange Hack Leads to Withdrawal Suspension

XT Exchange Hacked, $1.7 Million Stolen in Cryptocurrency, Withdrawal Halted

A major cryptocurrency exchange, XT.com, suspended all withdrawals on November 28, 2024, following a suspected hack that resulted in the theft of approximately $1.7 million worth of digital assets. The Dubai-based exchange, which boasts a...
Teaching AI to Hack

Teaching AI to Hack: Researchers Demonstrate ChatGPT’s to Ethically Hack Linux & Windows

In a new study released today, researchers have demonstrated the significant potential of artificial intelligence (AI) in enhancing ethical hacking practices, particularly in Linux environments. The study, conducted by Haitham S. Al-Sinani from the...
SHARP Routers Vulnerabilities

Critical SHARP Routers Vulnerabilities Lets Attacker Trigger RCE to Gain Root Access

SHARP has issued an urgent security advisory regarding multiple vulnerabilities discovered in several of its router products. Customers using the affected devices are strongly urged to update their firmware immediately to secure their networks...
Rockstar 2FA

“Rockstar 2FA” Phishing-as-a-Service Steals Microsoft 365 Credentials Via AiTM Attacks

Cybersecurity researchers have identified a concerning link between the advanced phishing toolkit known as 'Rockstar 2FA' and a surge in adversary-in-the-middle (AiTM) phishing attacks. Highly advanced methods are used in these campaigns to trick people...
GPU DDK Vulnerabilities

Critical GPU DDK Vulnerabilities Allow Attackers to Execute Arbitrary Code in Physical Memory

A significant development for the tech community is the identification of 2 critical vulnerabilities in several versions of a widely-used GPU Driver Development Kit (DDK) that affect systems using Unified Memory Architecture (UMA). On...
WAF Vulnerability

WAF Vulnerability in Akamai, Cloudflare, and Imperva Affected 40% of Fortune 100 Companies

A recently discovered security vulnerability dubbed "BreakingWAF" in the configuration of web application firewall (WAF) services has left numerous Fortune 1000 companies vulnerable to cyberattacks, according to Zafran, a leading cybersecurity research team. The...
Ford Motors ‘X’ Account Hacked – Pro-Palestine Posts Appear Briefly

Ford Motors ‘X’ Account Hacked – Pro-Palestine Posts Appear Briefly

The official X (formerly Twitter) account of Ford Motor Company appeared to have been compromised on Monday, according to widespread reports based on posts circulating across social media platforms. Screenshots shared by users suggested...
Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations

Why Cybersecurity Leaders Trust the MITRE ATT&CK Evaluations

In today’s rapidly evolving threat landscape, security leaders must make informed decisions to protect their organizations effectively. The "MITRE Engenuity ATT&CK Evaluations: Enterprise" serve as an essential resource for cybersecurity decision-makers. These evaluations simulate...
Nikki-Universal Cyber Attack

Nikki-Universal Cyber Attack – Hackers Claim 761.8 GB of Data Stolen

Nikki-Universal Co. Ltd., a prominent chemical manufacturer, has fallen victim to a sophisticated ransomware attack. The incident, which the company confirmed on December 27, 2024, involved the encryption of electronic data on some of...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...