The Hacker News
βœ”
154K subscribers
2.23K photos
13 videos
3 files
8.15K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
⚑ Cybersecurity Recap: From critical exploits to cloud missteps and AI-driven attacks, the threat surface keeps expanding.

See how defenders are adaptingβ€”and where the next wave is forming.

πŸ”— Read the full Weekly Recap β†’ https://thehackernews.com/2026/01/weekly-recap-fortinet-exploits-redline.html
⚑3πŸ‘2
⚠️ DevOps SaaS isn’t β€œalways on.” In 2024, GitHub, Jira, and Azure DevOps logged 502 incidents, causing 4,755 hours of outages or degraded service.

Early 2025 data shows a 69% YoY rise in major incidents. Shared responsibility leaves data protection with you.

πŸ”— Read β†’ https://thehackernews.com/2026/01/high-costs-of-devops-saas-downtime.html
⚑4
🚨 Researchers found an indirect prompt injection flaw abusing Google Gemini via calendar invites.

A hidden prompt in an event could trigger Gemini, when asked about a schedule, to summarize private meetings into a new calendar entryβ€”visible to attackers in some enterprise setups.

No user action required.

πŸ”— Read β†’ https://thehackernews.com/2026/01/google-gemini-prompt-injection-flaw.html
😱13πŸ‘5🀯5πŸ‘1
🚨 A major Telegram scam marketplace may be winding down.

Elliptic reports Tudou Guarantee has largely halted transactions in its public channels after processing $12B+ in illicit activity.

πŸ”— Read β†’ https://thehackernews.com/2026/01/tudou-guarantee-marketplace-halts.html
😁11πŸ‘1πŸ‘1
Thousands of fake banking sites are quietly pulling users in via Google.

CTM360 tracked 11,000+ fake bank domains targeting the U.S. and UK, many ranking next to real institutions. These sites run full onboarding and fake approvals before charging β€œfees” via crypto or PayPal.

πŸ”— How SEO is weaponized for fraud β†’ https://thehackernews.com/expert-insights/2026/01/ctm360-analysis-shows-how-fake-banks.html
😁8πŸ‘5
🚨 Cloudflare fixed a flaw in its ACME HTTP-01 handling that could conditionally disable WAF and allow requests to reach origin servers.

The issue was missing checks that the token matched an active challenge for the hostname.

πŸ”— Learn more β†’ https://thehackernews.com/2026/01/cloudflare-fixes-acme-validation-bug.html
πŸ‘9
Leaked API keys aren’t rare πŸ”‘ The blind spot is where teams look.

Intruder scanned 5M apps and found 42K+ exposed tokens embedded in JavaScript bundlesβ€”most in SPAs. Many scanners never load front-end assets, so these leaks go unseen πŸ‘€

πŸ”— How secrets slip past scanners β†’ https://thehackernews.com/2026/01/why-secrets-in-javascript-bundles-are.html
😁11
This media is not supported in your browser
VIEW IN TELEGRAM
⚠️ Most enterprises have a hidden risk: orphan accounts. They still log in, but no one owns them.

IAM only controls what’s connected. Service accounts, legacy apps, and AI agents are often missed.

Inactive access stays activeβ€”and attackers use it.

πŸ”— How continuous identity audits close this gap β†’ https://thehackernews.com/2026/01/the-hidden-risk-of-orphan-accounts.html
πŸ‘7
🚨 Uncharted: The AI Safety & Security Summit from Fuel iX 🚨

Hidden vulnerabilities and compliance challenges are emerging faster than ever. Access 9 expert-led sessions and a comprehensive report revealing risks in 24 generative AI models.

πŸ”’ Uncover hidden dangers in frontier AI models
βš–οΈ Learn legal frameworks balancing innovation with responsibility
πŸ›‘οΈ Get proactive defense strategies from top CISOs
πŸ“„ Receive a detailed report on vulnerabilities and actionable strategies

Access it now, on-demand: https://thn.news/uncharted-summit
πŸ‘3πŸ€”3😁1😱1
🚨 Researchers found a malware campaign abusing VS Code extensions to infect developers with Evelyn Stealer.

It injects into a legit Windows process to quietly steal credentials, browser cookies, and crypto data.

πŸ”— Find how the extensions worked and what was stolen β†’ https://thehackernews.com/2026/01/evelyn-stealer-malware-abuses-vs-code.html
πŸ”₯8πŸ‘4
🚨 Anthropic’s official Git MCP server had three vulnerabilities enabling file read/delete and potential RCE.

Researchers showed prompt injectionβ€”via AI-read contentβ€”can trigger the chain without direct system access.

πŸ”— Exploit chain and CVEs β†’ https://thehackernews.com/2026/01/three-flaws-in-anthropic-mcp-git-server.html
😁7⚑4
Cybersecurity in 2026 isn't a knowledge problem. It's an execution problem. πŸ“‰

The big 3:
β€’ AI-driven attacks
β€’ Shadow agents
β€’ Identity abuse

Stop reading, start executing!

Full Forecast: https://thn.news/tech-security-outlook
πŸ”₯14🀯3⚑2πŸ‘2πŸ‘2
πŸ‡°πŸ‡΅ North Korea–linked actors are luring developers with fake job repos.

Simply opening a malicious VS Code project can auto-run hidden tasks that fetch JavaScript from Vercel and deploy a backdoor enabling remote code execution.

πŸ”— Learn how it works β†’ https://thehackernews.com/2026/01/north-korea-linked-hackers-target.html
πŸ”₯12πŸ‘7😁7
🚨 npm binary-parser flaw enables arbitrary JavaScript execution in some Node.js apps.

Affects versions < 2.3.0 and only hits apps that build parsers from untrusted input via dynamic code generation.

πŸ”— Exploit path explained β†’ https://thehackernews.com/2026/01/certcc-warns-binary-parser-bug-allows.html
πŸ‘7πŸ‘3
🚨 LastPass is warning users about an active phishing campaign.

Fake β€œmaintenance” emails create 24-hour urgency and redirect victims to spoofed LastPass sites designed to steal master passwords.

πŸ”— How the scam works and how to spot it β†’ https://thehackernews.com/2026/01/lastpass-warns-of-fake-maintenance.html
πŸ‘10
πŸ” Containers now power core production systems, but security is lagging behind.

ActiveState data shows 82% of orgs suffered a container breach last yearβ€”and many leaders now treat incidents as expected, not preventable.

πŸ”— Why container security is becoming β€œinevitable” β†’ https://thehackernews.com/expert-insights/2026/01/the-great-container-disconnect-security.html
πŸ‘5
πŸ€–βš οΈ One developer. 88,000+ lines of code.

Researchers say an advanced Linux malware framework was built in weeks with AI help, guided by a single skilled developer using an AI agentβ€”resetting expectations for what one actor can build.

πŸ”— Read β†’ https://thehackernews.com/2026/01/voidlink-linux-malware-framework-built.html
πŸ”₯11😱3😁2
🚨 Security researchers found two high-severity flaws in Chainlit, an open-source AI chatbot framework.

The bugs enable file reads and SSRF, exposing API keys and internal data and enabling lateral movement. Fixed in v2.9.4.

πŸ”— Read β†’ https://thehackernews.com/2026/01/chainlit-ai-framework-flaws-enable-data.html
😁7πŸ‘4πŸ”₯4
πŸ›‘οΈ Security teams don’t fail by missing bugs. They fail by fixing the wrong ones.

Gartner’s EAP category shifts focus from CVE volume to real attack paths across cloud and identity. Most alerts never reach critical assets. EAPs show what actually matters.

πŸ”— Read β†’ https://thehackernews.com/2026/01/exposure-assessment-platforms-signal.html
πŸ‘7
πŸ›‘ RCE flaws found in widely used AI Python libraries.

Researchers report bugs in Apple FlexTok, NVIDIA NeMo, and Salesforce Uni2TS that trigger when malicious model metadata is loaded.

These tools power popular AI models. Patches are out, no active exploitation seen yet.

πŸ”— Read β†’ https://thehackernews.com/2026/01/threatsday-bulletin-ai-voice-cloning.html#rce-via-ai-libraries
😱6πŸ”₯5
Static pentest reports create unnecessary delays.

Today’s security teams need real-time visibility, automated handoffs, and continuous workflows. Not PDFs that stall remediation.

This step-by-step guide explains how automation modernizes pentest delivery so findings move from discovery to remediation immediately.

Download the guide πŸ‘‰ https://thn.news/pentest-delivery-guide
😁6πŸ‘5