The Hacker News
โœ”
151K subscribers
1.86K photos
10 videos
3 files
7.77K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: [email protected]

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿ”ฅ New Cyber Attack Alert!

Senior members of the World Uyghur Congress were targeted by malware hidden in a fake UyghurEdit++ app, Citizen Lab reports (Mar 2025).

โ€” Custom-made spyware
โ€” Links to China
โ€” Started as early as May 2024

Learn more: https://thehackernews.com/2025/04/malware-attack-targets-world-uyghur.html
๐Ÿ‘15๐Ÿค”9๐Ÿ˜3๐Ÿคฏ2
๐Ÿ”’ Still trusting VPNs to secure remote access?

Recent critical flaws exposed thousands. Every open port and IP address is now a target, not a tool.

Legacy network security can't keep up with AI-driven attacks.

Zero Trust isnโ€™t optional anymore โ€” itโ€™s survival.

Learn why it matters โ†’ https://thehackernews.com/expert-insights/2025/04/its-time-to-rethink-your-security-for.html
๐Ÿ‘15๐Ÿค”7๐Ÿ˜ฑ5
๐Ÿ”ฅ 75 zero-day exploits hit in 2024 | 44% aimed at enterprise tools.

While browser & mobile attacks fell sharply, threat actors shifted focus โ€” hitting Ivanti, Palo Alto, Cisco & others.

๐Ÿ“Š Top targets: Microsoft (26), Google (11), Ivanti (7), Apple (5)
๐ŸŽฏ 20 zero-days hit security appliances
๐Ÿ•ต๏ธโ€โ™‚๏ธ State hackers, spyware firms & cybercrime crews all involved

Read the full story โ†’ https://thehackernews.com/2025/04/google-reports-75-zero-days-exploited.html
๐Ÿ‘10๐Ÿ˜2๐Ÿค”1
โšก Your AI Copilot could leak your secrets โ€” without you even knowing.

Microsoft 365 Copilot boosts productivity, but opens the door to massive data risks. Reco spots risky prompts, flags hidden attacks, and locks down your SaaS ecosystem.

Learn how: https://thehackernews.com/2025/04/product-walkthrough-securing-microsoft.html
โšก16๐Ÿ‘6๐Ÿ˜ฑ3
๐Ÿšจ Cybersecurity firms are under attack!

๐Ÿ‡จ๐Ÿ‡ณ Chinaโ€™s PurpleHaze hackers targeted SentinelOneโ€™s systems and high-value customers.

๐ŸŽญ 360+ fake North Korean IT workers tried to infiltrate the company.

๐Ÿ‡ท๐Ÿ‡บ Russian ransomware gangs are buying real security products to beat defenses.

Read ๐Ÿ‘‰https://thehackernews.com/2025/04/sentinelone-uncovers-chinese-espionage.html
๐Ÿ˜16๐Ÿ‘6๐Ÿ”ฅ5๐Ÿ‘3
๐Ÿšจ New jailbreaks ("Inception", "Do-Not-Reply"), memory hacks, tool poisoning, unsafe model upgrades โ€” CERT, METR, and others warn:

โšก ChatGPT, Claude, Copilot, Gemini, Grok, Meta AI can leak code, malware, data.
โšก GPT-4.1 is 3X riskier than before.
โšก MCP protocols, Chrome extensions now exploited.

The AI arms race is outpacing safety.

Read: https://thehackernews.com/2025/04/new-reports-uncover-jailbreaks-unsafe.html
๐Ÿ‘16โšก2
๐Ÿ”ฅ Privacy vs AI?

WhatsApp just dropped Private Processingโ€”letting you use AI features like message summaries without Meta (or anyone) seeing your chats.

๐Ÿ›ก๏ธ Encrypted. Auditable. Anonymous.

โ€” Confidential Virtual Machine
โ€” Oblivious HTTP
โ€” Forward Security

๐Ÿ”— Learn how it works: https://thehackernews.com/2025/04/whatsapp-launches-private-processing-to.html
๐Ÿค”23๐Ÿ‘11๐Ÿ˜9โšก1
๐Ÿšจ Proton Mail faces nationwide ban in India ๐Ÿ‡ฎ๐Ÿ‡ณ

Karnataka High Court has ordered the govโ€™t to block the encrypted email provider after a legal complaint tied to AI deepfakes and obscene messages sent via the platform.

๐Ÿ”’ Still accessibleโ€”for now.

Read: https://thehackernews.com/2025/04/indian-court-orders-action-to-block.html
๐Ÿ˜33๐Ÿ˜ฑ19๐Ÿ‘6๐Ÿค”5๐Ÿ‘3๐Ÿคฏ3
๐Ÿ”ฅ Meta just dropped a firewall for AI.

LlamaFirewall is open-sourceโ€”and built to stop jailbreaks, prompt injections, and insecure code in real time.

Itโ€™s modular. Itโ€™s fast. Itโ€™s made for the LLM era.

๐Ÿ›ก๏ธ Also out:
๐Ÿ”น CyberSecEval 4 with AutoPatchBench to test AI-powered vuln fixes
๐Ÿ”น Llama for Defenders to help fight scams, fraud & phishing
๐Ÿ”น Private Processing to run AI features without leaking user data

๐Ÿ”— Full details here: https://thehackernews.com/2025/04/meta-launches-llamafirewall-framework.html
๐Ÿ‘27๐Ÿ”ฅ7๐Ÿ˜5๐Ÿค”4๐Ÿ‘3๐Ÿ˜ฑ1
๐Ÿšจ RansomHub's empire just vanished.

After stealing data from 200+ victims, its dark web site mysteriously went offline on April 1, 2025โ€”triggering panic among affiliates.

Qilin's leaks doubled. DragonForce claims a takeover.

๐Ÿ”— Read More: https://thehackernews.com/2025/04/ransomhub-went-dark-april-1-affiliates.html
๐Ÿ‘11๐Ÿ˜5
๐Ÿšจ China-linked APT โ€œTheWizardsโ€ caught hijacking trusted Chinese apps to deploy malware updates.

Uses IPv6/DNS to turn Sogou Pinyin & Tencent QQ into WizardNet backdoor delivery for users in ๐Ÿ‡จ๐Ÿ‡ณ๐Ÿ‡ญ๐Ÿ‡ฐ๐Ÿ‡ฐ๐Ÿ‡ญ๐Ÿ‡ต๐Ÿ‡ญ๐Ÿ‡ฆ๐Ÿ‡ช.

๐Ÿ‘€ Their tool Spellbinder quietly captures traffic, reroutes updates to attacker servers.

๐Ÿ”— Full story: https://thehackernews.com/2025/04/chinese-hackers-abuse-ipv6-slaac-for.html
๐Ÿ”ฅ8๐Ÿ‘5๐Ÿ˜4
๐Ÿ‘€ โ€œAll my shows were in Spanish. I didnโ€™t change anything.โ€

Thatโ€™s not a glitchโ€”itโ€™s an account takeover.

๐Ÿ”’ 100K+ accounts/mo exposed on major platforms.
๐ŸŽฎ Streaming, gaming, SaaS vulnerable.
๐Ÿง  MFA fails vs. stolen session cookies.

Act now: Monitor infostealers. Reset risk. Rebuild trust.

๐Ÿ”— ReadfFull story + Flareโ€™s ATO report: https://thehackernews.com/2025/04/customer-account-takeovers-multi.html
๐Ÿ‘7๐Ÿคฏ3
๐Ÿšจ New Espionage Alert!

A Russian-speaking APT group, Nebulous Mantis, is deploying the stealthy RomCom RAT to target NATO-linked entities, gov agencies, and critical infra โ€” using bulletproof hosting, IPFS, and over 40 remote commands.

๐Ÿ”— See how it works, whoโ€™s behind it, and why it matters now: https://thehackernews.com/2025/04/nebulous-mantis-targets-nato-linked.html
๐Ÿ‘14๐Ÿ˜6
Itโ€™s back! XPOSURE 2025 returns for its fourth year, focused on what matters most: reducing cyber risk exposure.

Join Pentera and top cybersecurity leaders at the National Exposure Management vSummit to discover how leading security teams are taking a proactive approach to managing enterprise-wide exposure.

๐ŸŽ Bonus: The first 150 registrants will receive an Uber Eats voucher upon registration!

๐Ÿ“… June 18 | 11 AM ET | Virtual

๐Ÿ”— Register now: https://thn.news/xposure2025-pentera

#XPOSURE2025 #ExposureManagement #CyberSecurityLeadership #EnterpriseSecurity
๐Ÿ‘10๐Ÿ˜4๐Ÿ”ฅ1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿšจ AI tools are learning too fastโ€”and so are attackers.

New report reveals how MCP & A2A protocols can be hijacked to leak emails, spoof agents, and silently override tool logic.

๐Ÿ” Tool poisoning
๐Ÿง  Prompt injection
๐Ÿ•ต๏ธ Agent impersonation

Even benign tools can flip maliciousโ€”no warning, no second prompt.

๐Ÿ‘‰ Learn about this new AI attack surface โ†’ https://thehackernews.com/2025/04/experts-uncover-critical-mcp-and-a2a.html
๐Ÿ‘15
๐Ÿ‘ค Hackers arenโ€™t cracking passwords anymoreโ€”theyโ€™re impersonating you.

From AI deepfakes to social engineering, attackers now exploit weak links before and after loginโ€”like during account recovery or onboarding.

๐Ÿ” Orgs secure login, but not full identity lifecycle. Join free webinar to learn:

โœ… Enforce phishing-resistant MFA
โœ… Secure device trust
โœ… Protect identity from onboarding to recovery

๐Ÿ‘‰ Register now โ€” https://thehackernews.com/2025/04/free-webinar-guide-to-securing-your.html
๐Ÿ”ฅ20๐Ÿ‘9๐Ÿ˜1๐Ÿ˜ฑ1
๐Ÿšจ SonicWall SMA Devices Under Attack!

2 critical flaws (CVEs 2023-44221 & 2024-38475) are being actively exploited in the wild. One allows OS command injection, the other enables session hijacking via Apache rewrite abuse.

SonicWall urges admins:
๐Ÿ” Check for unauthorized logins
๐Ÿ›ก๏ธ Patch immediately

๐Ÿ‘‰ Details: https://thehackernews.com/2025/05/sonicwall-confirms-active-exploitation.html
๐Ÿ˜8๐Ÿ‘4๐Ÿ‘1
๐Ÿšจ UPDATE: Outlaw Botnet Returns After 3-Month Silence ๐Ÿ‘€

Kaspersky confirms: Outlaw, a Perl-based crypto-mining botnet, is backโ€”targeting Linux systems in Brazil with brute-force SSH attacks.

๐Ÿงช New tactics spotted:
Deploys XMRig miner & IRC-based backdoor
Kills rival miners & high-CPU processes
Masquerades as rsync, evades termination
Allows DDoS, remote control, file exfiltration

๐Ÿ“Š Victims detected in ๐Ÿ‡บ๐Ÿ‡ธ๐Ÿ‡ง๐Ÿ‡ท๐Ÿ‡ฉ๐Ÿ‡ช๐Ÿ‡ฎ๐Ÿ‡น๐Ÿ‡น๐Ÿ‡ญ๐Ÿ‡ธ๐Ÿ‡ฌ๐Ÿ‡น๐Ÿ‡ผ๐Ÿ‡จ๐Ÿ‡ฆ

๐Ÿ‘‰ Full report + latest update (May 1): https://thehackernews.com/2025/04/outlaw-group-uses-ssh-brute-force-to.html
๐Ÿค”10๐Ÿ‘4
๐Ÿ‘€ The tools are evolving. So is the intent.

A stealthy phishing wave is slamming key Russian industries with DarkWatchman malware. It evades detection and vanishes on command.

Meanwhile, a new backdoor called Sheriff breached a major Ukrainian platform to spy on defense targetsโ€”quiet, persistent, and dangerous.

๐Ÿ”— Learn more: https://thehackernews.com/2025/05/darkwatchman-sheriff-malware-hit-russia.html
๐Ÿค”11๐Ÿ‘8๐Ÿ”ฅ3๐Ÿ‘1
๐Ÿšจ AI meets Influence-as-a-Service with chilling implications.

Anthropic's Claude chatbot was hijacked to run a botnet that:

โ€ข Created 100+ fake personas
โ€ข Engaged thousands of users
โ€ข Spread pro-UAE, anti-EU, and political propaganda in ๐Ÿ‡ฎ๐Ÿ‡ท, ๐Ÿ‡ช๐Ÿ‡บ, ๐Ÿ‡ฐ๐Ÿ‡ช

Worse, it aided criminals in writing malware, scraping security cam passwords, and running job scams.

๐Ÿ”— Read: https://thehackernews.com/2025/05/claude-ai-exploited-to-operate-100-fake.html
๐Ÿ‘12๐Ÿ‘2