The Hacker News
โœ”
154K subscribers
2.19K photos
13 videos
3 files
8.11K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: [email protected]

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿšจ Warning - Yet another n8n vulnerability.

n8n disclosed a CVSS 10.0 RCE flaw allowing authenticated users to execute untrusted code and fully compromise an instance.

CVE-2026-21877 affects cloud and self-hosted deployments running versions โ‰ฅ0.123.0 and <1.121.3.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/n8n-warns-of-cvss-100-rce-vulnerability.html
๐Ÿ˜16๐Ÿ‘1
๐Ÿค– Non-human accounts now rival humans in security risk. As AI and automation expand, service accounts and bots are gaining deep, unmanaged cloud access.

51% of security teams now rank non-human identity security as a top priority. Don't let machine identities become your biggest blind spot.

๐Ÿ”— Read more: https://thehackernews.com/2026/01/the-future-of-cybersecurity-includes.html
๐Ÿ‘8
๐Ÿ”ฅ WEBINAR ALERT - Most attacks today donโ€™t drop malware. They blend into tools your teams already trust.

Thatโ€™s why alerts stay quiet while real risk moves forward. Fileless and Living-off-the-Land attacks are now standard tradecraft.

๐Ÿ”— Join our next webinar on how teams are closing this gap. Register here โ†’ https://thehackernews.com/2026/01/webinar-learn-how-ai-powered-zero-trust.html
๐Ÿ‘8
๐Ÿšจ Another CVSS 10.0 n8n vulnerability disclosed.

Researchers found another critical flaw (CVE-2026-21858) in n8n that lets remote attackers take full control with no authentication required.

The bug abuses Content-Type handling in form webhooks to read local files, steal secrets, forge admin sessions, and achieve RCE.

๐Ÿ”— Details here โ†’ https://thehackernews.com/2026/01/critical-n8n-vulnerability-cvss-100.html
๐Ÿ”ฅ19๐Ÿ˜7๐Ÿ˜ฑ3
Black Cat is running an SEO poisoning campaign that ranks fake software sites in search results.

The group impersonates tools like Notepad++, tricking users into installing trojanized installers that drop a backdoor stealing browser data, keystrokes, clipboard contents, and enabling remote access.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/black-cat-behind-seo-poisoning-malware.html
๐Ÿ”ฅ15๐Ÿ˜ฑ7
๐Ÿฅ OpenAI launched ChatGPT Health, a sandboxed space for health chats.

Users can link medical records and wellness apps. Data uses purpose-built ๐Ÿ”’ encryption, stays siloed, isnโ€™t used to train models, and doesnโ€™t affect other chats.

๐Ÿ”— Details here โ†’ https://thehackernews.com/2026/01/openai-launches-chatgpt-health-with.html
๐Ÿ”ฅ10๐Ÿ‘5๐Ÿ˜ฑ5๐Ÿ˜2
CISA added two flaws to its KEV list, citing evidence of exploitation.

๐Ÿงฉ PowerPoint RCE (CVSS 8.8) โ€” memory corruption enables remote code execution
๐Ÿšจ HPE OneView RCE (CVSS 10.0) โ€” unauthenticated, affects all versions before 11.00

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/cisa-flags-microsoft-office-and-hpe.html

๐Ÿ—“๏ธ Federal agencies must patch by Jan 28, 2026.
๐Ÿ‘10
Ransomware has moved past simple extortion.

Stolen data is now auctioned when ransoms fail, turning breaches into repeat revenue. Data auctions expand profits, attract more actors, and scale attacks faster.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/weekly-recap-iot-exploits-wallet.html#:~:text=Ransomware%20Turns%20Breaches%20into%20Bidding%20Wars
๐Ÿ”ฅ16๐Ÿ‘2
Large enterprises now run 45 security tools on average, yet 52% of executives say complexity blocks effective security. Vendor consolidation cut costs, not operational results.

That gap is driving a rethink of what a security โ€œplatformโ€ should actually deliver.

๐Ÿ”— Read โ†’ https://thehackernews.com/expert-insights/2026/01/the-security-platform-is-dead-long-live.html
๐Ÿ‘9
Researchers disclosed multiple critical flaws in Coolify that let authenticated users run commands as root, enabling full server compromise.

The issues span 11 CVEs rated up to 10.0 and impact 52,890 internet-exposed hosts.

๐Ÿ”— Details here โ†’ https://thehackernews.com/2026/01/coolify-discloses-11-critical-flaws.html
๐Ÿ‘4๐Ÿ”ฅ4๐Ÿ‘1
๐Ÿšจ Three npm pkgs posing as bitcoinjs tools found spreading NodeCordRAT.

Postinstall scripts chained a 2nd pkg to drop the payload, steal Chrome creds, API tokens, and crypto wallet seed phrases, and run commands via Discord C2 on Win/Linux/macOS.

๐Ÿ”— Details โ†’ https://thehackernews.com/2026/01/researchers-uncover-nodecordrat-hidden.html
๐Ÿ‘7๐Ÿ˜4โšก1
๐Ÿ›‘ Cisco released patches for CVE-2026-20029 in Identity Services Engine and ISE-PIC.

The XML parsing flaw allows an authenticated admin to upload a malicious file and read restricted OS files.

A public PoC exists. Patch Now.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/cisco-patches-ise-security.html
๐Ÿ‘8๐Ÿ”ฅ6
[๐Ÿ”ฅ] ThreatsDay Bulletin is live!

โš–๏ธ OpenAI โ€“ Court orders 20M ChatGPT logs.
๐Ÿ‡จ๐Ÿ‡ณ Chinaโ€“Taiwan โ€“ Cyberattacks surge tenfold.
๐Ÿ’Œ Microsoft โ€“ Exchange limit scrapped.
๐Ÿ•ต๏ธ pcTattletale โ€“ Spyware maker guilty.
๐Ÿ”‘ RustFS โ€“ Hardcoded token flaw fixed.
๐ŸŽญ pkr_mtsi โ€“ Loader spreads malware.
๐Ÿ’ฅ Open WebUI โ€“ RCE via CVE-2025-64496.
๐Ÿ‡ฎ๐Ÿ‡ท MuddyWater โ€“ New backdoors active.
โ˜๏ธ ownCloud โ€“ MFA urged after breaches.
๐Ÿ GravityRAT โ€“ Cross-platform RAT exposed.

๐Ÿ”— Read the full edition โžœ https://thehackernews.com/2026/01/threatsday-bulletin-rustfs-flaw-iranian.html
๐Ÿ‘12
Most production risk sits outside the top 20 images.

Chainguard data shows 98% of CVEs were remediated in the longtail, where about half of workloads run. Thatโ€™s where security focus needs to move.

๐Ÿ”— See where real supply-chain risk accumulates โ†’ https://thehackernews.com/2026/01/the-state-of-trusted-open-source.html
๐Ÿ‘6
๐Ÿ‡จ๐Ÿ‡ณ China-linked UAT-7290 targets telecoms in South Asia, now expanding into Southeastern Europe.

Cisco Talos links the group to deep recon, edge device exploits, SSH brute force, ๐Ÿง Linux malware, and shared ORB relay infrastructure.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/china-linked-uat-7290-targets-telecoms.html
๐Ÿ‘10๐Ÿ”ฅ5
The future of AI is exciting, but securing it is essential. Risks like Shadow AI, vulnerabilities, and data exposure are growing.

Weโ€™re excited to join Zscalerโ€™s virtual event with CEO Jay Chaudhry to learn how to secure AI systemsโ€”hope youโ€™ll join too!

๐Ÿ” Identify AI risks
โš™๏ธ Automate remediation
๐Ÿ›ก๏ธ Protect AI systems
โœ… Ensure compliance

Register โ†’ https://thn.news/ai-zero-trust
๐Ÿ‘6๐Ÿค”1
โš ๏ธ Astaroth banking malware is now using WhatsApp as its main delivery channel in Brazil.

Researchers report a new Python-based module that steals a victimโ€™s contact list and auto-sends malicious ZIP files, spreading the infection chat to chat.

๐Ÿ”— How the campaign works and spreads โ†’ https://thehackernews.com/2026/01/whatsapp-worm-spreads-astaroth-banking.html
๐Ÿ”ฅ11๐Ÿคฏ7๐Ÿ˜6๐Ÿค”1
๐Ÿ›ก๏ธ The FBI warns North Koreaโ€“linked Kimsuky is using QR codes in spear-phishing emails.

The โ€œquishingโ€ tactic pushes victims onto unmanaged phones ๐Ÿ“ฑ, enabling session token theft, MFA bypass, and cloud takeover.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/fbi-warns-north-korean-hackers-using.html
๐Ÿ”ฅ17๐Ÿค”5๐Ÿ˜4โšก2
โš ๏ธ CISA closed 10 Emergency Directives issued between 2019โ€“2024.

The required security actions for risks such as SolarWinds, Microsoft Exchange, and VMware were completed or are now enforced under Binding Operational Directive 22-01.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/cisa-retires-10-emergency-cybersecurity.html
๐Ÿ˜ฑ8๐Ÿ”ฅ5
๐Ÿšจ Trend Micro patched a critical flaw in on-prem Apex Central for Windows that can lead to SYSTEM-level code execution.

CVE-2025-69258 (CVSS 9.8) allows a remote, unauthenticated attacker with endpoint access to load a malicious DLL via MsgReceiver.exe.

On-prem builds below 7190 are affected.

๐Ÿ”— Details โ†’ https://thehackernews.com/2026/01/trend-micro-apex-central-rce-flaw.html
๐Ÿ˜9๐Ÿ”ฅ6๐Ÿคฏ2
๐Ÿ‡ท๐Ÿ‡บ Russian state-linked APT28 targeted Turkish energy and nuclear staff, a European think tank, and organizations in North Macedonia and Uzbekistan.

๐ŸŽฃ Fake Microsoft, Google, and VPN login pages harvested credentials, then redirected victims to real sites to stay hidden.

๐Ÿ”— Details โ†’ https://thehackernews.com/2026/01/russian-apt28-runs-credential-stealing.html
๐Ÿ”ฅ11๐Ÿคฏ5๐Ÿ˜4๐Ÿค”1