The Hacker News
βœ”
153K subscribers
1.99K photos
11 videos
3 files
7.9K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
🚨 Thousands hacked after downloading what looked like β€œofficial” government apps.

They were fake versions of real banking apps, modified by hackers from GoldFactory to include malware.

So far, over 11,000 phones in Southeast Asia have been infected.

πŸ”— Details ↓ https://thehackernews.com/2025/12/goldfactory-hits-southeast-asia-with.html
🀯14πŸ‘5πŸ”₯3😁2
πŸ€–πŸ’₯ AI-built code just broke web security in 2025.

One bug in a β€œvibe coding” platform let anyone access private apps β€” no login needed.

⚠️ 45% of AI-written code had exploitable flaws.
🏒 Even big firms like Wix had to patch fast.

The fix? Treat all AI code as untrusted.

πŸ”— Read here β†’ https://thehackernews.com/2025/12/5-threats-that-reshaped-web-security.html
🀯7😁6⚑3
✈️ Hackers faking airport Wi-Fi.
πŸ’» Malware hiding inside coding tools.
πŸ€– AI rewriting security playbooks.

That’s just the start β€” and 15+ more stories inside.

πŸ“° This week’s ThreatsDay Bulletin uncovers the sneakiest hacks, scams, and β€œtoo-smart” malware out there.

πŸ”— Catch up before they catch you β†’ https://thehackernews.com/2025/12/threatsday-bulletin-wi-fi-hack-npm-worm.html
πŸ‘8πŸ€”4
🚨 AI tools are now running inside your browser β€” reading data, following hidden prompts, and moving info across tabs.

IT can’t see it. Security can’t stop it.

Seraphic Security’s Suresh Batchu calls this the next big blind spot: Shadow AI in the enterprise browser.

πŸ”— Read ↓ https://thehackernews.com/expert-insights/2025/12/shadow-ai-in-browser-next-enterprise.html
🀯12😁5πŸ€”3πŸ‘1
🚨 A fake Microsoft Teams installer is spreading malware in China.

Hackers called "Silver Fox" made it look like a Russian attack to hide their tracks.

It installs ValleyRAT, giving full remote access to victims.

πŸ”— Read: https://thehackernews.com/2025/12/silver-fox-uses-fake-microsoft-teams.html
😁14πŸ”₯11
⚠️ Hackers are exploiting a command injection bug in Array Networks AG Series gateways β€” active since August 2025.

It lets attackers run any command on systems using β€œDesktopDirect” remote access.

πŸ”— Details β†’ https://thehackernews.com/2025/12/jpcert-confirms-active-command.html
πŸ”₯9😁4πŸ‘3
🚨 CISA just warned about a new Chinese state-backed hack tool called BRICKSTORM β€” a backdoor found in VMware and Windows systems used by U.S. government and tech networks.

It can reinstall itself if removed, hide in normal traffic, and give hackers full remote control.

πŸ”—Read β†’ https://thehackernews.com/2025/12/cisa-reports-prc-hackers-using.html
🀯15πŸ”₯5πŸ‘2😁1
🚨 A lawyer in Pakistan was hacked with Predator β€” the first known spyware attack on a civil society member.

It started with a link on WhatsApp, but new leaks show Predator can also spread through ads β€” no click needed.

It can read chats, record audio, take photos β€” and Intellexa may still access customer systems remotely.

πŸ”— Read β†’ https://thehackernews.com/2025/12/intellexa-leaks-reveal-zero-days-and.html
😁7😱3
⚠️ Within HOURS of disclosure, two China-linked hacking groups weaponized a critical React flaw (CVE-2025-55182).

They’re already scanning the web for unpatched apps.

Update to React 19.0.1+ now.

πŸ”— Read ↓ https://thehackernews.com/2025/12/chinese-hackers-have-started-exploiting.html
🀯2πŸ”₯1
🚨 Critical Apache Tika flaw (CVE-2025-66516) just dropped β€” CVSS 10.0.

A single fake PDF can trigger an XXE attack, letting hackers read server files or run code.

πŸ”— Read ↓ https://thehackernews.com/2025/12/critical-xxe-bug-cve-2025-66516-cvss.html

Update to v3.2.2 now.
πŸ”₯8πŸ€”3
🧩 57% of SMBs say cybersecurity is a top priority β€” yet they still turn down MSPs.

➑ The issue isn’t interest. It’s confusion.
➑ They’re tired of jargon, fear, and hard selling.

β€œGetting to Yes” helps MSPs explain security in plain business terms β€” and win trust.

πŸ‘‰ See how it’s done β†’ https://thehackernews.com/2025/12/getting-to-yes-anti-sales-guide-for-msps.html
πŸ‘3
🚨 WARNING: A new attack can trick Perplexity’s Comet browser into deleting your Google Drive.

Just one normal-looking email with hidden cleanup instructions can make the AI agent erase real files β€” no exploit, no warning.

πŸ”— Details here β†’ https://thehackernews.com/2025/12/zero-click-agentic-browser-attack-can.html
🀯12😁5πŸ”₯4