The Hacker News
βœ”
151K subscribers
1.86K photos
10 videos
3 files
7.77K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
πŸ›‘ CRITICAL ALERT β†’ U.S. funding for MITRE’s CVE vulnerability database program ends Wednesday.

MITRE warns: no funding = no new CVEs, degraded threat advisories, and slower incident response.

πŸ› οΈ CVEs power security tools, alerts, and patching across critical infrastructure.

πŸ” Without it, defenders lose a key part of their playbook.

πŸ”— Full story β†’ https://thehackernews.com/2025/04/us-govt-funding-for-mitres-cve-ends.html
🀯38πŸ€”7πŸ‘6πŸ‘4πŸ”₯3😱3⚑2😁1
🚨 New Android Phones, Pre-Loaded with Malware?!

Since June 2024, cheap Androids from Chinese brands like SHOWJI come with trojanized WhatsApp/Telegram apps out of the box.

πŸ“± Fake models: β€œS24 Ultra”, β€œNote 13 Pro”, etc.
πŸ’Έ Malware replaces your crypto wallet address in chats
🧠 Scans your images for mnemonic phrases
πŸ’° Hackers netted $1.6M+ via 40+ infected apps & 60+ C2 servers

πŸ”— Check the list & protect your crypto β†’ https://thehackernews.com/2025/04/chinese-android-phones-shipped-with.html
πŸ‘12😁6πŸ”₯3
🚨 BPFDoor is backβ€”with a stealthy new controller in play.

A fresh wave of BPFDoor attacks has hit telecom, finance & retail sectors in πŸ‡°πŸ‡·πŸ‡²πŸ‡ΎπŸ‡­πŸ‡°πŸ‡²πŸ‡²πŸ‡ͺπŸ‡¬ β€” using a stealth controller that opens reverse shells & moves laterally inside Linux networks.

πŸ”— Read β†’ https://thehackernews.com/2025/04/new-bpfdoor-controller-enables-stealthy.html
πŸ‘11πŸ”₯3
⚠️ Why hack in… when you can just log in?

80% of breaches stem from SaaS identity misconfigurations.

One compromised account can trigger a chain: Entra ID takeover β†’ GitHub exfiltration β†’ Slack leaks

Wing Security gives full SaaS visibilityβ€”no agents, no blind spots.

βœ… Identity & app mapping
βœ… Real-time threat detection
βœ… Full attack timeline

πŸ” See how it works: https://thehackernews.com/2025/04/product-walkthrough-look-inside-wing.html
πŸ‘9😁5
⚠️ Hackers are abusing AI tool Gamma to craft fake presentations that lead you to spoofed Microsoft SharePoint loginsβ€”and even fake CAPTCHA pages to dodge security scans.

πŸ”—Details: https://thehackernews.com/2025/04/ai-powered-gamma-used-to-host-microsoft.html
πŸ‘8😁5πŸ‘2πŸ”₯1πŸ€”1
🚨 Supply chain cyberattacks are exploding β€” and hitting where it hurts most: healthcare, retail, energy.

🦠 One breach = millions exposed.

The risk? Vendors are the backdoor. Hackers are walking right in.

Learn what’s driving this wave and how to stay ahead: https://thehackernews.com/2025/04/from-third-party-vendors-to-us-tariffs.html
πŸ‘10😁3πŸ”₯2🀯1
πŸ‘‡ Google blocked 5.1B bad ads and banned 39.2M advertiser accounts in 2024.

AI flagged scams, deepfakes, and fraud at scaleβ€”700K accounts suspended for impersonating public figures alone.

πŸ”’ 5.1B bad ads blocked
πŸ” 9.1B restricted
🚫 1.3B pages hit
πŸ‘€ 5M+ scam accounts suspended
πŸ€– AI flagged 700K deepfake scams

πŸ”— Full story: https://thehackernews.com/2025/04/google-blocked-51b-harmful-ads-and.html
πŸ‘20πŸ‘6πŸ”₯5⚑1πŸ€”1
Over 50% of vulnerabilities are exploited within 7 days of discovery.

Learn how to reduce MTTR and secure your apps with insights from ActiveState's 2025 State of Vulnerability Management & Remediation Report.

πŸ›‘οΈ Stay ahead of threatsβ€”download now! https://thn.news/vulnerability-management-2025

#DevSecOps #OpenSource
πŸ‘11πŸ‘8
πŸ”πŸŒ UPDATE β€” CISA extends funding to prevent a shutdown of the CVE Program.

A new CVE Foundation is also launched to ensure global, independent oversightβ€”just as ENISA rolls out the EU Vulnerability Database.

Read: https://thehackernews.com/2025/04/us-govt-funding-for-mitres-cve-ends.html#update-cisa-extends-cve-program-contract-amid-funding-crisis
πŸ‘25πŸ‘9πŸ”₯6🀯3😁1
πŸ”₯ One task away from total takeover?

4 local privilege escalation flaws found in schtasks.exeβ€”a core part of Windows Task Scheduler.

Attackers can:
β€’ Bypass UAC
β€’ Run SYSTEM-level commands
β€’ Erase security logs
β€’ Impersonate admins using known passwords.

Fix not yet available.

πŸ”— Full story β†’ https://thehackernews.com/2025/04/experts-uncover-four-new-privilege.html
πŸ”₯18πŸ‘12
🚨 Targeted iPhone attacks in the wild.

Apple just patched 2 new zero-daysβ€”bringing 2025’s total to 5 actively exploited flaws.

β†’ One lets hackers run code via malicious audio files
β†’ Another bypasses Pointer Authentication using memory tricks

πŸ”— Details here: https://thehackernews.com/2025/04/apple-patches-two-actively-exploited.html

Update now: iOS 18.4.1, macOS Sequoia 15.4.1, tvOS, visionOS
πŸ‘20😁4πŸ”₯2πŸ€”1
🚨 Actively Exploited SonicWall Flaw Hits CISA’s KEV List.

Remote attackers can execute code via SMA 100 Series bug (CVE-2021-20035, CVSS 7.2).

➑️ Injects OS commands as β€˜nobody’ user
➑️ Impacts SMA 200–500v on outdated firmware
➑️ FCEB agencies must patch by May 7, 2025

Your VPN gateway could be the backdoor. Patch it

Learn more: https://thehackernews.com/2025/04/cisa-flags-actively-exploited.html
πŸ‘20πŸ”₯2
🚨 Microsoft Alert: Node.js-Powered Malware Campaign Ongoing...

Since Oct 2024, fake Binance & TradingView installers have been used to deploy malware via Node.js and PowerShell.

Linked threats include ClickFix tricks, SectopRAT malware, fake PDF tools, and HR-themed phishing kits.

Learn more: https://thehackernews.com/2025/04/nodejs-malware-campaign-targets-crypto.html
🀯16πŸ‘11
🚨 CVSS 10.0 ALERT: Remote Code Execution in Erlang/OTP SSH (CVE-2025-32433)

No auth. Full control. Widespread impact.

Used in Cisco, Ericsson, OT/IoT, and edge systems, this bug lets attackers run code without logging in.

If SSH runs as root? Game over. πŸ‘€

πŸ”— Full details β†’ https://thehackernews.com/2025/04/critical-erlangotp-ssh-vulnerability.html

πŸ”₯ Fix now β†’ OTP-27.3.3 / 26.2.5.11 / 25.3.2.20 Block SSH ports as temp fix.
🀯15πŸ‘9πŸ”₯4
πŸ”₯ Blockchain won’t kill passwords yetβ€”but it may change how we authenticate.

Decentralized IDs + cryptographic keys = fewer breaches, no central targets.

Used in finance (KYC) & healthcare (patient data), it’s realβ€”and growing.

But until blockchain scales, passwords stay. Just make them strong.

➑️ Learn more: https://thehackernews.com/2025/04/blockchain-offers-security-benefits-but.html
πŸ‘17πŸ€”3
🚨 Copy. Paste. Get hacked.

North Korea, Iran & Russia are now pushing ClickFixβ€”a sneaky trick that fools users into running malware on their own devices.

Learn more β†’ https://thehackernews.com/2025/04/state-sponsored-hackers-weaponize.html
πŸ‘27😁6πŸ”₯3⚑2
🚨 AI isn’t just coding fasterβ€”it’s rewriting the rulebook.

LLMs have entered the threat landscape. From spear-phishing and voice fraud to malware with OCR, attackers are now using AI to scale, blend, and evolve.

Defenders use AI tooβ€”but GenAI interfaces expose a new attack surface.

πŸ”— Full deep dive in Security Navigator 2025: https://thehackernews.com/2025/04/artificial-intelligence-whats-all-fuss.html
πŸ€”15πŸ‘6😁3
🚨 China-backed hackers are deploying TONESHELL v3, StarProxy, and stealth tools like SplatCloak to breach Myanmar targetsβ€”dodging EDR, logging keystrokes, and hopping across networks with FakeTLS tricks.

β€’ 3 TONESHELL variants
β€’ 2 new keyloggers (PAKLOG, CorKLOG)
β€’ StarProxy – a lateral movement proxy over FakeTLS
β€’ SplatCloak – a Windows kernel-level EDR evasion driver

Details here πŸ‘‰ https://thehackernews.com/2025/04/mustang-panda-targets-myanmar-with.html
πŸ”₯17πŸ‘9😁5⚑1
🚨 New NTLM flaw (CVE-2025-24054) is being actively exploited to steal Windows credentialsβ€”just by downloading a file. No clicks, no execution needed.

This "low-interaction" bug leaks NTLMv2 hashes via SMBβ€”perfect for pass-the-hash attacks.

πŸ”— Details here: https://thehackernews.com/2025/04/cve-2025-24054-under-active.html
πŸ‘22🀯16
🚨 New XorDDoS Variant Targets U.S. Servers!

The malware is now hijacking Docker and Linux systems via SSH brute-force attacks.

A new β€œVIP” controller spotted in 2024 suggests it’s being sold as a service, expanding botnet operations.

Full story β†’ https://thehackernews.com/2025/04/experts-uncover-new-xorddos-controller.html
πŸ‘14😁11πŸ€”2
AI is already in your SaaS. The real question: Do you know whereβ€”or how risky it is?

Employees are using ChatGPT, bots, and AI tools without security oversight. Shadow AI is realβ€”and your old playbook won’t catch it.

πŸ”₯ WEBINAR β€” Join AI security expert and learn:
πŸ“Œ Real breach cases
βš™οΈ Detection strategies that actually work
🚨 What to do before your next silent breach

Join the webinar β†’ https://thehackernews.com/2025/04/webinar-ai-is-already-inside-your-saas.html
🀯9πŸ”₯5πŸ‘4