The Hacker News
151K subscribers
1.86K photos
10 videos
3 files
7.78K links
Official THN Telegram Channel — A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

📨 Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
🚨 SOC burnout isn’t just a staffing issue—it’s a systems failure.

AI is now helping analysts escape alert fatigue, broken workflows & cognitive overload by automating the chaos intelligently—not just faster, but smarter.

Here’s how it’s changing the game ↓ https://thehackernews.com/2025/06/how-ai-enabled-workflow-automation-can.html
👏12🤯7
🚨 New jailbreak method "Echo Chamber" bypasses AI safety filters—90% success rate on hate, violence, porn prompts.

The twist? It doesn’t brute-force the model.

It coaxes it—slowly and indirectly—into breaking its own rules.

Learn more → https://thehackernews.com/2025/06/echo-chamber-jailbreak-tricks-llms-like.html
👏12😁10🔥84🤔2
🚨 Chinese state-backed hackers breached Canadian telecom gear using a 10.0-rated Cisco flaw.

They tunneled in, stayed hidden, and may have tapped global traffic.

Here’s what’s unfolding—and why it matters ↓ https://thehackernews.com/2025/06/china-linked-salt-typhoon-exploits.html
👍22😁11🔥8🤔2👏1
🚨 Russia-backed hackers used Signal chat to drop malware-laced Word docs on Ukrainian systems.

The twist? One image file secretly loads an in-memory attack chain that evades detection.

Learn what BEARDSHELL & COVENANT really do ↓ https://thehackernews.com/2025/06/apt28-uses-signal-chat-to-deploy.html
😁17🔥7👏5🤯5👍2🤔1
🚨 U.S. House just banned WhatsApp for all staff over major security concerns.

Lack of data transparency. No stored encryption. “High-risk,” says the memo.

Meta's furious—but it's official.

Full story → https://thehackernews.com/2025/06/us-house-bans-whatsapp-on-official.html
😁43👍12👏8🔥41
🚨 Hackers are hijacking misconfigured Docker APIs to run crypto miners—through the Tor network.

They mount the host OS, enable root SSH access, and drop XMRig—all while staying anonymous.

Here’s how it works → https://thehackernews.com/2025/06/hackers-exploit-misconfigured-docker.html
🔥21👏7
Even the best vulnerability management programs are missing devices—and most tools make it difficult to find out which ones.

Join Pete Constantine, CPO at Prelude, for a live session on how to uncover how 10–20% of endpoints often fall outside scan coverage.

In this session, you’ll learn:
Where blind spots in scan visibility typically hide
How to close gaps using aggregate inventory
How to automate this discovery process in Prelude

Save your seat: https://thn.news/vuln-gaps
👏10🤔1
🚨 Attackers are hijacking Microsoft Exchange login pages to steal passwords in plain text.

No malware download. No outbound traffic. Just invisible JavaScript keyloggers hiding in plain sight.

65 victims across 26 countries—and counting.

Details → https://thehackernews.com/2025/06/hackers-target-65-microsoft-exchange.html
👏14🔥4😁2
You patch CVEs. Hackers exploit what’s exposed—over-permissioned accounts, forgotten assets, weak logins.

Top CISOs explain why CTEM > vuln management—and how to make it work in the real world.

Here’s how they’re doing it → https://thehackernews.com/2025/06/between-buzz-and-reality-ctem.html
🔥3👏1
💥 Researchers just shut down a cryptominer making $26K/year, dropping its hashrate from 3.3M to zero in seconds using XMRogue and bad shares!

This method forced the attacker to lose 76% of revenue and disrupt their operation.

Details here → https://thehackernews.com/2025/06/researchers-find-way-to-shut-down.html
16👍7👏4🤯3
🚨 New U.S. visa rule: F, M, and J applicants must set social media privacy settings to public—or risk rejection.

Embassy says full visibility is needed to verify identities and screen for security risks.

Here’s what’s changing and why it matters → https://thehackernews.com/2025/06/new-us-visa-rule-requires-applicants-to.html
😁27😱17🤔9👍6🤯5🔥2
🚨 Windows 10 isn’t dead yet.

Microsoft is offering 1 more year of critical security updates—if you:
• Sync to the cloud
• Redeem points
• Or pay $30

But there's a catch: You must sign in with a Microsoft account.

Here’s what’s changing → https://thehackernews.com/2025/06/microsoft-extends-windows-10-security.html
🤔25😁21🤯9👍4🔥2
🚨 35 malicious npm packages linked to North Korea's “Contagious Interview” op exposed.

Hackers posed as recruiters, tricking devs into running spyware-laced job assignments. Some malware still live on npm.

The goal? Crypto theft & full device takeover.

Read now → https://thehackernews.com/2025/06/north-korea-linked-supply-chain-attack.html
😁12👏5🔥2🤯1
🚨 Hackers are abusing trusted tools to fly under the radar.

Fake SonicWall VPN apps are stealing credentials, while ConnectWise installers signed with valid certificates are dropping malware masked as AI tools or Windows updates.

How both attacks work → https://thehackernews.com/2025/06/sonicwall-netextender-trojan-and.html
👍18😁7
🚨 Thousands of passports, IDs & bank statements from Saudi Games 2024 leaked online by pro-Iranian hackers.

They broke into phpMyAdmin, dumped it all on a dark forum—and that’s just the start.

Here’s how this cyberwar is spiraling across borders ↓ https://thehackernews.com/2025/06/pro-iranian-hacktivist-group-leaks.html
😁26🤯74👏3😱3
🚨 Citrix Bleed 2 is here — CVE-2025-5777 lets attackers hijack sessions without logging in. Just like the 2023 CitrixBleed mess… but worse.

SAP users aren't safe either — input histories stored with weak/no encryption can leak SSNs, bank data.

Read → https://thehackernews.com/2025/06/citrix-bleed-2-flaw-enables-token-theft.html
👍9🔥5👏5😁2
🚨 Critical Citrix flaw is under active attack.

CVE-2025-6543 (CVSS 9.2) is being exploited in the wild—affecting NetScaler ADC VPN setups.

The catch? Many are still unpatched. And this follows another 9.3-rated bug just weeks ago.

Details + fixes you can’t ignore → https://thehackernews.com/2025/06/citrix-releases-emergency-patches-for.html
👍13
🚨 New research: 9% of Microsoft Entra SaaS apps vulnerable to stealth account takeover via nOAuth.

Just an email + tenant access—no password, no MFA.

No alerts. No fix unless vendors update their apps.

Details on nOAuth abuse → https://thehackernews.com/2025/06/noauth-vulnerability-still-affects-9-of.html
👏85👍1
🔍 UPDATE: The Havoc backdoor used by Iranian hackers is far more advanced than we thought.

Injected via conhost.dll, it supports BOFs, token theft, lateral movement, and runs fully in memory.

Find details here → https://thehackernews.com/2025/05/iranian-hackers-maintain-2-year-access.html
👏36🔥14🤔6😁2
This media is not supported in your browser
VIEW IN TELEGRAM
WhatsApp launches AI-generated message summaries using Meta AI—starting in the U.S.

It says messages stay private via encrypted “Private Processing,” but scrutiny is growing.

Details here → https://thehackernews.com/2025/06/whatsapp-adds-ai-powered-message.html
😁36🤔9😱9
🚨 A critical AMI firmware flaw (CVSS 10.0) is now under active attack.

CISA just added it—alongside unpatched D-Link and old Fortinet bugs—to its KEV list.

One enables full remote takeover. Another is tied to Akira ransomware.

Here’s what’s at risk → https://thehackernews.com/2025/06/cisa-adds-3-flaws-to-kev-catalog.html
😁16