The Hacker News
βœ”
151K subscribers
1.86K photos
10 videos
3 files
7.77K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
Sophisticated phishing attacks are now routinely bypassing MFA, SSO, and multiple security layers across email, network, and endpoints.

Join the latest webinar from Push Security to learn why phishing attacks are more attractive than ever for attackers in 2025 β€” and what you can do to stop it.

Register here πŸ‘‰ https://thn.news/phishing-webinar-it
πŸ‘10😁2
⚠️ UNC5174 (aka Uteus), tied to China, is quietly breaching Linux & macOS systems using SNOWLIGHT malware + a fake Cloudflare app (VShell).

πŸ” Targets: 20+ nations | Sectors: Gov, finance, defense
πŸ›  Tactics: Open-source tools, fileless payloads, fake authenticator apps
πŸ‘€ Risk: Remote control, in-memory attacks, hard-to-trace

πŸ”— Full details: https://thehackernews.com/2025/04/chinese-hackers-target-linux-systems.html
πŸ‘21😁1
"Your firewall won’t save you."

Hackers are using ChatGPT to craft phishing lures & scan attack surfaces.

Meanwhile, most orgs still cling to VPNs & 30-year-old security models.

πŸ”₯ Zero Trust + AI isn’t hype β€” it’s survival.

Don’t fall behind: https://thehackernews.com/expert-insights/2025/04/rethinking-cyber-defense-with-zero.html
πŸ‘13😁7🀯3
πŸ›‘ CRITICAL ALERT β†’ U.S. funding for MITRE’s CVE vulnerability database program ends Wednesday.

MITRE warns: no funding = no new CVEs, degraded threat advisories, and slower incident response.

πŸ› οΈ CVEs power security tools, alerts, and patching across critical infrastructure.

πŸ” Without it, defenders lose a key part of their playbook.

πŸ”— Full story β†’ https://thehackernews.com/2025/04/us-govt-funding-for-mitres-cve-ends.html
🀯38πŸ€”7πŸ‘6πŸ‘4πŸ”₯3😱3⚑2😁1
🚨 New Android Phones, Pre-Loaded with Malware?!

Since June 2024, cheap Androids from Chinese brands like SHOWJI come with trojanized WhatsApp/Telegram apps out of the box.

πŸ“± Fake models: β€œS24 Ultra”, β€œNote 13 Pro”, etc.
πŸ’Έ Malware replaces your crypto wallet address in chats
🧠 Scans your images for mnemonic phrases
πŸ’° Hackers netted $1.6M+ via 40+ infected apps & 60+ C2 servers

πŸ”— Check the list & protect your crypto β†’ https://thehackernews.com/2025/04/chinese-android-phones-shipped-with.html
πŸ‘12😁6πŸ”₯3
🚨 BPFDoor is backβ€”with a stealthy new controller in play.

A fresh wave of BPFDoor attacks has hit telecom, finance & retail sectors in πŸ‡°πŸ‡·πŸ‡²πŸ‡ΎπŸ‡­πŸ‡°πŸ‡²πŸ‡²πŸ‡ͺπŸ‡¬ β€” using a stealth controller that opens reverse shells & moves laterally inside Linux networks.

πŸ”— Read β†’ https://thehackernews.com/2025/04/new-bpfdoor-controller-enables-stealthy.html
πŸ‘11πŸ”₯3
⚠️ Why hack in… when you can just log in?

80% of breaches stem from SaaS identity misconfigurations.

One compromised account can trigger a chain: Entra ID takeover β†’ GitHub exfiltration β†’ Slack leaks

Wing Security gives full SaaS visibilityβ€”no agents, no blind spots.

βœ… Identity & app mapping
βœ… Real-time threat detection
βœ… Full attack timeline

πŸ” See how it works: https://thehackernews.com/2025/04/product-walkthrough-look-inside-wing.html
πŸ‘9😁5
⚠️ Hackers are abusing AI tool Gamma to craft fake presentations that lead you to spoofed Microsoft SharePoint loginsβ€”and even fake CAPTCHA pages to dodge security scans.

πŸ”—Details: https://thehackernews.com/2025/04/ai-powered-gamma-used-to-host-microsoft.html
πŸ‘8😁5πŸ‘2πŸ”₯1πŸ€”1
🚨 Supply chain cyberattacks are exploding β€” and hitting where it hurts most: healthcare, retail, energy.

🦠 One breach = millions exposed.

The risk? Vendors are the backdoor. Hackers are walking right in.

Learn what’s driving this wave and how to stay ahead: https://thehackernews.com/2025/04/from-third-party-vendors-to-us-tariffs.html
πŸ‘10😁3πŸ”₯2🀯1
πŸ‘‡ Google blocked 5.1B bad ads and banned 39.2M advertiser accounts in 2024.

AI flagged scams, deepfakes, and fraud at scaleβ€”700K accounts suspended for impersonating public figures alone.

πŸ”’ 5.1B bad ads blocked
πŸ” 9.1B restricted
🚫 1.3B pages hit
πŸ‘€ 5M+ scam accounts suspended
πŸ€– AI flagged 700K deepfake scams

πŸ”— Full story: https://thehackernews.com/2025/04/google-blocked-51b-harmful-ads-and.html
πŸ‘20πŸ‘6πŸ”₯5⚑1πŸ€”1
Over 50% of vulnerabilities are exploited within 7 days of discovery.

Learn how to reduce MTTR and secure your apps with insights from ActiveState's 2025 State of Vulnerability Management & Remediation Report.

πŸ›‘οΈ Stay ahead of threatsβ€”download now! https://thn.news/vulnerability-management-2025

#DevSecOps #OpenSource
πŸ‘11πŸ‘8
πŸ”πŸŒ UPDATE β€” CISA extends funding to prevent a shutdown of the CVE Program.

A new CVE Foundation is also launched to ensure global, independent oversightβ€”just as ENISA rolls out the EU Vulnerability Database.

Read: https://thehackernews.com/2025/04/us-govt-funding-for-mitres-cve-ends.html#update-cisa-extends-cve-program-contract-amid-funding-crisis
πŸ‘25πŸ‘9πŸ”₯6🀯3😁1
πŸ”₯ One task away from total takeover?

4 local privilege escalation flaws found in schtasks.exeβ€”a core part of Windows Task Scheduler.

Attackers can:
β€’ Bypass UAC
β€’ Run SYSTEM-level commands
β€’ Erase security logs
β€’ Impersonate admins using known passwords.

Fix not yet available.

πŸ”— Full story β†’ https://thehackernews.com/2025/04/experts-uncover-four-new-privilege.html
πŸ”₯18πŸ‘12
🚨 Targeted iPhone attacks in the wild.

Apple just patched 2 new zero-daysβ€”bringing 2025’s total to 5 actively exploited flaws.

β†’ One lets hackers run code via malicious audio files
β†’ Another bypasses Pointer Authentication using memory tricks

πŸ”— Details here: https://thehackernews.com/2025/04/apple-patches-two-actively-exploited.html

Update now: iOS 18.4.1, macOS Sequoia 15.4.1, tvOS, visionOS
πŸ‘20😁4πŸ”₯2πŸ€”1
🚨 Actively Exploited SonicWall Flaw Hits CISA’s KEV List.

Remote attackers can execute code via SMA 100 Series bug (CVE-2021-20035, CVSS 7.2).

➑️ Injects OS commands as β€˜nobody’ user
➑️ Impacts SMA 200–500v on outdated firmware
➑️ FCEB agencies must patch by May 7, 2025

Your VPN gateway could be the backdoor. Patch it

Learn more: https://thehackernews.com/2025/04/cisa-flags-actively-exploited.html
πŸ‘20πŸ”₯2
🚨 Microsoft Alert: Node.js-Powered Malware Campaign Ongoing...

Since Oct 2024, fake Binance & TradingView installers have been used to deploy malware via Node.js and PowerShell.

Linked threats include ClickFix tricks, SectopRAT malware, fake PDF tools, and HR-themed phishing kits.

Learn more: https://thehackernews.com/2025/04/nodejs-malware-campaign-targets-crypto.html
🀯16πŸ‘11
🚨 CVSS 10.0 ALERT: Remote Code Execution in Erlang/OTP SSH (CVE-2025-32433)

No auth. Full control. Widespread impact.

Used in Cisco, Ericsson, OT/IoT, and edge systems, this bug lets attackers run code without logging in.

If SSH runs as root? Game over. πŸ‘€

πŸ”— Full details β†’ https://thehackernews.com/2025/04/critical-erlangotp-ssh-vulnerability.html

πŸ”₯ Fix now β†’ OTP-27.3.3 / 26.2.5.11 / 25.3.2.20 Block SSH ports as temp fix.
🀯15πŸ‘9πŸ”₯4
πŸ”₯ Blockchain won’t kill passwords yetβ€”but it may change how we authenticate.

Decentralized IDs + cryptographic keys = fewer breaches, no central targets.

Used in finance (KYC) & healthcare (patient data), it’s realβ€”and growing.

But until blockchain scales, passwords stay. Just make them strong.

➑️ Learn more: https://thehackernews.com/2025/04/blockchain-offers-security-benefits-but.html
πŸ‘17πŸ€”3
🚨 Copy. Paste. Get hacked.

North Korea, Iran & Russia are now pushing ClickFixβ€”a sneaky trick that fools users into running malware on their own devices.

Learn more β†’ https://thehackernews.com/2025/04/state-sponsored-hackers-weaponize.html
πŸ‘27😁6πŸ”₯3⚑2
🚨 AI isn’t just coding fasterβ€”it’s rewriting the rulebook.

LLMs have entered the threat landscape. From spear-phishing and voice fraud to malware with OCR, attackers are now using AI to scale, blend, and evolve.

Defenders use AI tooβ€”but GenAI interfaces expose a new attack surface.

πŸ”— Full deep dive in Security Navigator 2025: https://thehackernews.com/2025/04/artificial-intelligence-whats-all-fuss.html
πŸ€”15πŸ‘6😁3
🚨 China-backed hackers are deploying TONESHELL v3, StarProxy, and stealth tools like SplatCloak to breach Myanmar targetsβ€”dodging EDR, logging keystrokes, and hopping across networks with FakeTLS tricks.

β€’ 3 TONESHELL variants
β€’ 2 new keyloggers (PAKLOG, CorKLOG)
β€’ StarProxy – a lateral movement proxy over FakeTLS
β€’ SplatCloak – a Windows kernel-level EDR evasion driver

Details here πŸ‘‰ https://thehackernews.com/2025/04/mustang-panda-targets-myanmar-with.html
πŸ”₯17πŸ‘9😁5⚑1