The Hacker News
โœ”
151K subscribers
1.86K photos
10 videos
3 files
7.77K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: [email protected]

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿ’ป Your weakest link could cost you everything!

Hackers donโ€™t need big bugsโ€”small oversights cause massive breaches.

Intruder found:
๐Ÿ”ธA 302 redirect = AWS key theft
๐Ÿ”ธAn exposed .git = DB takeover
๐Ÿ”ธMetadata flaw = Remote access

Scan before they strike โ†’ https://thehackernews.com/2025/04/how-breaches-start-breaking-down-5-real.html
๐Ÿ‘12๐Ÿ‘3๐Ÿ˜2
โšก What keeps CISOs awake at night this week?

๐Ÿ”ธ 0-days exploited before patches hit.
๐Ÿ”ธ AI turning low-skill attackers into high-impact threats.
๐Ÿ”ธ Identity systems being used against us โ€” again.

Security today demands strategic clarity.
Every vulnerability is an opportunity for attackers.
Every delay? A risk.

We have summarized last weekโ€™s top threats.

Read โ€” https://thehackernews.com/2025/04/weekly-recap-critical-sap-exploit-ai.html
๐Ÿ‘8โšก7๐Ÿ”ฅ5๐Ÿ˜3๐Ÿค”1
๐Ÿšจ CISA Alert: Two critical flaws โ€” in Broadcom Fabric OS (CVE-2025-1976) and Commvault Web Server (CVE-2025-3928) โ€” are now on the Known Exploited Vulnerabilities (KEV) list.

๐Ÿ”น Both bugs are actively exploited.
๐Ÿ”น Admin access can lead to full system compromise.
๐Ÿ”น Patching deadlines: May 17โ€“19, 2025.

๐Ÿ‘‰ Details: https://thehackernews.com/2025/04/cisa-adds-actively-exploited-broadcom.html
๐Ÿ‘19
๐Ÿ”ฅ New Cyber Attack Alert!

Senior members of the World Uyghur Congress were targeted by malware hidden in a fake UyghurEdit++ app, Citizen Lab reports (Mar 2025).

โ€” Custom-made spyware
โ€” Links to China
โ€” Started as early as May 2024

Learn more: https://thehackernews.com/2025/04/malware-attack-targets-world-uyghur.html
๐Ÿ‘15๐Ÿค”9๐Ÿ˜3๐Ÿคฏ2
๐Ÿ”’ Still trusting VPNs to secure remote access?

Recent critical flaws exposed thousands. Every open port and IP address is now a target, not a tool.

Legacy network security can't keep up with AI-driven attacks.

Zero Trust isnโ€™t optional anymore โ€” itโ€™s survival.

Learn why it matters โ†’ https://thehackernews.com/expert-insights/2025/04/its-time-to-rethink-your-security-for.html
๐Ÿ‘15๐Ÿค”7๐Ÿ˜ฑ5
๐Ÿ”ฅ 75 zero-day exploits hit in 2024 | 44% aimed at enterprise tools.

While browser & mobile attacks fell sharply, threat actors shifted focus โ€” hitting Ivanti, Palo Alto, Cisco & others.

๐Ÿ“Š Top targets: Microsoft (26), Google (11), Ivanti (7), Apple (5)
๐ŸŽฏ 20 zero-days hit security appliances
๐Ÿ•ต๏ธโ€โ™‚๏ธ State hackers, spyware firms & cybercrime crews all involved

Read the full story โ†’ https://thehackernews.com/2025/04/google-reports-75-zero-days-exploited.html
๐Ÿ‘10๐Ÿ˜2๐Ÿค”1
โšก Your AI Copilot could leak your secrets โ€” without you even knowing.

Microsoft 365 Copilot boosts productivity, but opens the door to massive data risks. Reco spots risky prompts, flags hidden attacks, and locks down your SaaS ecosystem.

Learn how: https://thehackernews.com/2025/04/product-walkthrough-securing-microsoft.html
โšก16๐Ÿ‘6๐Ÿ˜ฑ3
๐Ÿšจ Cybersecurity firms are under attack!

๐Ÿ‡จ๐Ÿ‡ณ Chinaโ€™s PurpleHaze hackers targeted SentinelOneโ€™s systems and high-value customers.

๐ŸŽญ 360+ fake North Korean IT workers tried to infiltrate the company.

๐Ÿ‡ท๐Ÿ‡บ Russian ransomware gangs are buying real security products to beat defenses.

Read ๐Ÿ‘‰https://thehackernews.com/2025/04/sentinelone-uncovers-chinese-espionage.html
๐Ÿ˜16๐Ÿ‘6๐Ÿ”ฅ5๐Ÿ‘3
๐Ÿšจ New jailbreaks ("Inception", "Do-Not-Reply"), memory hacks, tool poisoning, unsafe model upgrades โ€” CERT, METR, and others warn:

โšก ChatGPT, Claude, Copilot, Gemini, Grok, Meta AI can leak code, malware, data.
โšก GPT-4.1 is 3X riskier than before.
โšก MCP protocols, Chrome extensions now exploited.

The AI arms race is outpacing safety.

Read: https://thehackernews.com/2025/04/new-reports-uncover-jailbreaks-unsafe.html
๐Ÿ‘16โšก2
๐Ÿ”ฅ Privacy vs AI?

WhatsApp just dropped Private Processingโ€”letting you use AI features like message summaries without Meta (or anyone) seeing your chats.

๐Ÿ›ก๏ธ Encrypted. Auditable. Anonymous.

โ€” Confidential Virtual Machine
โ€” Oblivious HTTP
โ€” Forward Security

๐Ÿ”— Learn how it works: https://thehackernews.com/2025/04/whatsapp-launches-private-processing-to.html
๐Ÿค”23๐Ÿ‘11๐Ÿ˜9โšก1
๐Ÿšจ Proton Mail faces nationwide ban in India ๐Ÿ‡ฎ๐Ÿ‡ณ

Karnataka High Court has ordered the govโ€™t to block the encrypted email provider after a legal complaint tied to AI deepfakes and obscene messages sent via the platform.

๐Ÿ”’ Still accessibleโ€”for now.

Read: https://thehackernews.com/2025/04/indian-court-orders-action-to-block.html
๐Ÿ˜33๐Ÿ˜ฑ19๐Ÿ‘6๐Ÿค”5๐Ÿ‘3๐Ÿคฏ3
๐Ÿ”ฅ Meta just dropped a firewall for AI.

LlamaFirewall is open-sourceโ€”and built to stop jailbreaks, prompt injections, and insecure code in real time.

Itโ€™s modular. Itโ€™s fast. Itโ€™s made for the LLM era.

๐Ÿ›ก๏ธ Also out:
๐Ÿ”น CyberSecEval 4 with AutoPatchBench to test AI-powered vuln fixes
๐Ÿ”น Llama for Defenders to help fight scams, fraud & phishing
๐Ÿ”น Private Processing to run AI features without leaking user data

๐Ÿ”— Full details here: https://thehackernews.com/2025/04/meta-launches-llamafirewall-framework.html
๐Ÿ‘27๐Ÿ”ฅ7๐Ÿ˜5๐Ÿค”4๐Ÿ‘3๐Ÿ˜ฑ1
๐Ÿšจ RansomHub's empire just vanished.

After stealing data from 200+ victims, its dark web site mysteriously went offline on April 1, 2025โ€”triggering panic among affiliates.

Qilin's leaks doubled. DragonForce claims a takeover.

๐Ÿ”— Read More: https://thehackernews.com/2025/04/ransomhub-went-dark-april-1-affiliates.html
๐Ÿ‘11๐Ÿ˜5
๐Ÿšจ China-linked APT โ€œTheWizardsโ€ caught hijacking trusted Chinese apps to deploy malware updates.

Uses IPv6/DNS to turn Sogou Pinyin & Tencent QQ into WizardNet backdoor delivery for users in ๐Ÿ‡จ๐Ÿ‡ณ๐Ÿ‡ญ๐Ÿ‡ฐ๐Ÿ‡ฐ๐Ÿ‡ญ๐Ÿ‡ต๐Ÿ‡ญ๐Ÿ‡ฆ๐Ÿ‡ช.

๐Ÿ‘€ Their tool Spellbinder quietly captures traffic, reroutes updates to attacker servers.

๐Ÿ”— Full story: https://thehackernews.com/2025/04/chinese-hackers-abuse-ipv6-slaac-for.html
๐Ÿ”ฅ8๐Ÿ‘5๐Ÿ˜4
๐Ÿ‘€ โ€œAll my shows were in Spanish. I didnโ€™t change anything.โ€

Thatโ€™s not a glitchโ€”itโ€™s an account takeover.

๐Ÿ”’ 100K+ accounts/mo exposed on major platforms.
๐ŸŽฎ Streaming, gaming, SaaS vulnerable.
๐Ÿง  MFA fails vs. stolen session cookies.

Act now: Monitor infostealers. Reset risk. Rebuild trust.

๐Ÿ”— ReadfFull story + Flareโ€™s ATO report: https://thehackernews.com/2025/04/customer-account-takeovers-multi.html
๐Ÿ‘7๐Ÿคฏ3
๐Ÿšจ New Espionage Alert!

A Russian-speaking APT group, Nebulous Mantis, is deploying the stealthy RomCom RAT to target NATO-linked entities, gov agencies, and critical infra โ€” using bulletproof hosting, IPFS, and over 40 remote commands.

๐Ÿ”— See how it works, whoโ€™s behind it, and why it matters now: https://thehackernews.com/2025/04/nebulous-mantis-targets-nato-linked.html
๐Ÿ‘14๐Ÿ˜6
Itโ€™s back! XPOSURE 2025 returns for its fourth year, focused on what matters most: reducing cyber risk exposure.

Join Pentera and top cybersecurity leaders at the National Exposure Management vSummit to discover how leading security teams are taking a proactive approach to managing enterprise-wide exposure.

๐ŸŽ Bonus: The first 150 registrants will receive an Uber Eats voucher upon registration!

๐Ÿ“… June 18 | 11 AM ET | Virtual

๐Ÿ”— Register now: https://thn.news/xposure2025-pentera

#XPOSURE2025 #ExposureManagement #CyberSecurityLeadership #EnterpriseSecurity
๐Ÿ‘10๐Ÿ˜4๐Ÿ”ฅ1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿšจ AI tools are learning too fastโ€”and so are attackers.

New report reveals how MCP & A2A protocols can be hijacked to leak emails, spoof agents, and silently override tool logic.

๐Ÿ” Tool poisoning
๐Ÿง  Prompt injection
๐Ÿ•ต๏ธ Agent impersonation

Even benign tools can flip maliciousโ€”no warning, no second prompt.

๐Ÿ‘‰ Learn about this new AI attack surface โ†’ https://thehackernews.com/2025/04/experts-uncover-critical-mcp-and-a2a.html
๐Ÿ‘15
๐Ÿ‘ค Hackers arenโ€™t cracking passwords anymoreโ€”theyโ€™re impersonating you.

From AI deepfakes to social engineering, attackers now exploit weak links before and after loginโ€”like during account recovery or onboarding.

๐Ÿ” Orgs secure login, but not full identity lifecycle. Join free webinar to learn:

โœ… Enforce phishing-resistant MFA
โœ… Secure device trust
โœ… Protect identity from onboarding to recovery

๐Ÿ‘‰ Register now โ€” https://thehackernews.com/2025/04/free-webinar-guide-to-securing-your.html
๐Ÿ”ฅ20๐Ÿ‘9๐Ÿ˜1๐Ÿ˜ฑ1
๐Ÿšจ SonicWall SMA Devices Under Attack!

2 critical flaws (CVEs 2023-44221 & 2024-38475) are being actively exploited in the wild. One allows OS command injection, the other enables session hijacking via Apache rewrite abuse.

SonicWall urges admins:
๐Ÿ” Check for unauthorized logins
๐Ÿ›ก๏ธ Patch immediately

๐Ÿ‘‰ Details: https://thehackernews.com/2025/05/sonicwall-confirms-active-exploitation.html
๐Ÿ˜8๐Ÿ‘4๐Ÿ‘1