The Hacker News
โœ”
154K subscribers
2.19K photos
13 videos
3 files
8.11K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: [email protected]

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿ›‘ Chinese-speaking attackers hijacked a SonicWall VPN to escape VMware ESXi guest VMs.

Huntress stopped it before ransomware, but the chain abused 3 VMware zero-days now on CISAโ€™s KEV list.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/chinese-linked-hackers-exploit-vmware.html
๐Ÿ‘14๐Ÿ”ฅ8๐Ÿ˜4๐Ÿคฏ3๐Ÿ˜ฑ2
Europol says Spanish police arrested 34 suspects linked to Black Axe, a Nigeria-origin crime syndicate.

The ๐Ÿ•ต๏ธโ€โ™‚๏ธ group is tied to cyber fraud, trafficking, and violent crime worldwide. Investigators estimate โ‚ฌ5.93M in fraud losses, with cash and bank funds seized in Spain.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/europol-arrests-34-black-axe-members-in.html
๐Ÿ”ฅ31๐Ÿ˜ฑ7๐Ÿ˜6๐Ÿคฏ6๐Ÿ‘5
โš ๏ธ Chinese crime groups are running ๐Ÿท pig-butchering scams like a startup.

Researchers found $2,500 turnkey kits with fake trading sites, apps, hosting, and launderingโ€”built to scale fast, no skills needed.

๐Ÿ”— Read details here โ†’ https://thehackernews.com/2026/01/researchers-uncover-service-providers.html
๐Ÿ‘15
๐Ÿฅ๐Ÿค– Anthropic just rolled out Claude for Healthcare.

U.S. users can connect lab results and health records, get plain-English explanations, spot patterns, and prep for doctor visits.

Data sharing is opt-in and not used for training

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/anthropic-launches-claude-ai-for.html
๐Ÿ˜12๐Ÿ˜ฑ10๐Ÿค”7๐Ÿคฏ6
๐Ÿšจ New GoBruteforcer wave is hijacking crypto and blockchain databases to expand a password-brute-forcing botnet.

Researchers link the spike to AI-generated setup guides and reused defaults in legacy stacks like XAMPP. These servers are easy to take over, stay online 24/7, and scale attacks fast.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/gobruteforcer-botnet-targets-crypto.html
๐Ÿ”ฅ18โšก5๐Ÿ˜2๐Ÿ‘1
โžก๏ธ๐Ÿ›‘ Pentesting in 2026 isnโ€™t failing at testing. Itโ€™s failing at what happens after.

In a new analysis, Dan DeCloss explains why static reports slow real progressโ€”and why teams that actually reduce risk treat findings as living inputs to daily work, not PDFs that get forgotten.

Why execution, not output, now defines pentest success โ†’ https://thehackernews.com/expert-insights/2026/01/the-2026-state-of-pentesting-how-modern.html
๐Ÿค”4๐Ÿ‘3๐Ÿคฏ3
๐Ÿšจ This weekโ€™s cyber risk moved fast and wide.

โš™๏ธ Automation abused
๐Ÿ“ฑ Mobile botnets scaled
๐Ÿ“ก Telecoms mapped
๐Ÿ’ธ Crypto crime surged
๐Ÿงช Exploits outpaced patches
๐Ÿ—‚๏ธ Crime forums leaked
๐Ÿงฉ AI chats stolen
๐Ÿ› Bugs weaponized
๐Ÿ‡ฎ๐Ÿ‡ณ Policy pushback
๐Ÿ“ฉ Political inboxes hit

One pattern. Many fronts.

Hereโ€™s the full recap of what mattered most โ†“ https://thehackernews.com/2026/01/weekly-recap-ai-automation-exploits.html
๐Ÿ‘6โšก5๐Ÿค”3๐Ÿ‘2
๐Ÿšจ Attackers uploaded fake n8n community nodes to npm to steal OAuth tokens from live workflows.

The packages mimicked real integrations, ran with full n8n access, decrypted credentials during execution, and exfiltrated them.

Eight were removed, but activity appears ongoing.

๐Ÿ”— Read about it here โ†’ https://thehackernews.com/2026/01/n8n-supply-chain-attack-abuses.html
๐Ÿ‘18๐Ÿ”ฅ11๐Ÿคฏ9
๐Ÿšจ CISA confirms active exploitation of a Gogs flaw now added to the KEV list.

CVE-2025-8110 (CVSS 8.7) abuses symlink handling to write outside repositories, enabling code execution. Around 700 exposed instances are already compromised.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/cisa-warns-of-active-exploitation-of.html
๐Ÿ‘8๐Ÿ‘4๐Ÿคฏ3โšก1
Researchers uncovered SHADOW#REACTOR, a multi-stage campaign delivering Remcos RAT.

It starts with an obfuscated VBS launcher, moves through PowerShell, and rebuilds fragmented text payloads in memory. The defining trait is text-only stagers and LOLBin abuse to reduce detection.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/new-malware-campaign-delivers-remcos.html
๐Ÿ”ฅ11๐Ÿ‘4๐Ÿ‘2๐Ÿ˜2
Annual pentests are too slow and narrow for today's threats.
Stop chasing every vulnerability and start validating whatโ€™s actually exploitable. Exposure Validation filters your list down to the risks that matter most.

Check out the guide: https://thn.news/exposure-validation-intro
๐Ÿ‘7๐Ÿ˜5
๐Ÿšจ ServiceNow patched a critical AI Platform flaw enabling unauthenticated user impersonation and actions as the victim.

CVE-2025-12420 (CVSS 9.3) affects Now Assist and Virtual Agent. Fixed Oct 30. No known exploitation.

๐Ÿ”— Details here โ†’ https://thehackernews.com/2026/01/servicenow-patches-critical-ai-platform.html
๐Ÿ‘10
Researchers disclosed VoidLink, a modular Linux malware built for long-term, stealthy cloud access.

It detects AWS, Azure, GCP, Docker, and Kubernetes, adapts its behavior, steals credentials, and enables lateral movement using rootkit-style techniques ๐Ÿงฉ

๐Ÿ”— Read here โ†’ https://thehackernews.com/2026/01/new-advanced-linux-voidlink-malware.html
๐Ÿ‘8๐Ÿ”ฅ7
๐Ÿšจ The most effective attacks in 2025 still rely on 2015-era tacticsโ€”just at far greater scale.

Supply-chain abuse remains central, from npm package takeovers to long-term trust attacks like XZ Utils. AI didnโ€™t change attacker strategy; it automated execution, reducing time, cost, and manpower.

๐Ÿ”— Why fundamentals still fail โ†’ https://thehackernews.com/2026/01/what-should-we-learn-from-how-attackers.html
๐Ÿ‘12๐Ÿคฏ5๐Ÿค”2โšก1
๐Ÿค– AI agents now build, test, and deploy code on their own. The real risk isnโ€™t the modelโ€”itโ€™s who controls what the agent can run, call, and access.

This WEBINAR breaks down MCPs, permissions, and practical controls to secure agentic AI without slowing teams.

โณ Save your seat โ†’ https://thehackernews.com/2026/01/webinar-t-from-mcps-and-tool-access-to.html
๐Ÿ‘6๐Ÿ”ฅ5โšก3
๐Ÿšจ Malicious Chrome extension targeted MEXC users by abusing an already logged-in browser session.

It auto-created new API keys, secretly enabled withdrawals, hid that permission in the UI, and sent the keys to a Telegram bot.

Uninstalling the extension didnโ€™t revoke ๐Ÿ”‘ access.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/malicious-chrome-extension-steals-mexc.html
๐Ÿ‘6๐Ÿ˜5
๐Ÿšจ A web skimming campaign active since January 2022 is still stealing checkout data from compromised e-commerce sites.

Researchers found Magecart-style JavaScript that hides from admins, swaps real Stripe forms with fakes, steals card and personal data, then erases itself.

๐Ÿ”— How the skimmer works โ†’ https://thehackernews.com/2026/01/long-running-web-skimming-campaign.html
โšก9๐Ÿ‘7
๐Ÿšจ Ukraineโ€™s CERT reports PLUGGYAPE malware attacks on defense forces from Octโ€“Dec 2025.

Hackers used Signal and WhatsApp, posing as charities to deliver password-protected archives. New variants add stealth and flexible C2 via external services.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/pluggyape-malware-uses-signal-and.html
๐Ÿคฏ10๐Ÿ˜7โšก5๐Ÿ”ฅ3
๐Ÿšจ Node.js fixed a DoS bug where apps crash instead of throwing a catchable error.

๐Ÿงฉ CVE-2025-59466 impacts Next.js, React Server Components, and most APM tools via AsyncLocalStorage. When async_hooks is enabled, deep recursion can force a hard process exit, dropping services.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/critical-nodejs-vulnerability-can-cause.html
๐Ÿ‘15๐Ÿค”2
โš ๏ธ Microsoftโ€™s first Patch Tuesday of 2026 fixes 114 Windows flaws, including one exploited in the wild.

CVE-2026-20805 is a local info-leak in Desktop Window Manager that can expose memory addresses and weaken ASLR.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/microsoft-fixes-114-windows-flaws-in.html
๐Ÿ‘17๐Ÿ‘6๐Ÿ˜4
๐Ÿšจ Fortinet fixed a CVSS 9.4 bug in FortiSIEM that allows unauthenticated code execution.

The issue is in the phMonitor service on TCP port 7900. Crafted requests can trigger OS command injection, enabling file writes as admin and escalation to root via a scheduled task.

๐Ÿ”— Details โ†’ https://thehackernews.com/2026/01/fortinet-fixes-critical-fortisiem-flaw.html

๐Ÿ” Patch now. Restrict access to port 7900.
โšก9