The Hacker News
152K subscribers
1.87K photos
10 videos
3 files
7.78K links
Official THN Telegram Channel — A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

📨 Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
💀 Most breaches begin with identity.

Issue isn’t firewall—it's login. You invest in EDR, NDR, ITDR, but attackers use valid credentials.

🔥 ITP stops attacks pre-access.

👉 Learn more: https://thehackernews.com/expert-insights/2025/05/breach-fatalism-is-over-why-identity.html
👍11😁3
💥 75 security tools, 2,000+ alerts/week — Still breached.

This new "2025 State of Pentesting" report reveals what’s really working (and what’s not) in modern security testing.

🔗 Get the key insights: https://thehackernews.com/2025/05/the-crowded-battle-key-insights-from.html
👍9
🚨 One default IAM role can expose your entire AWS account.

Experts found overly permissive roles in AWS services like SageMaker & Glue—granting attackers wide access, including full S3 control.

It’s not just misconfig—it's a silent backdoor.

Details: https://thehackernews.com/2025/05/aws-default-iam-roles-found-to-enable.html
9👍8
⚠️ Old flaws—new threat!

A new SideWinder campaign hit gov’t agencies in 🇱🇰 Sri Lanka, 🇧🇩 Bangladesh & 🇵🇰 Pakistan using geofenced malware and old MS Office flaws.

🔗 Details just dropped: https://thehackernews.com/2025/05/south-asian-ministries-hit-by.html
👍20
🚨 Over 100 malicious Chrome extensions slipped through Google’s radar since Feb 2024.

They looked legit—VPNs, AI tools, banking apps—but secretly stole data, hijacked sessions, and redirected traffic.

👀 Even bad reviews were filtered.

🔗 Read: https://thehackernews.com/2025/05/100-fake-chrome-extensions-found.html
👍15😱5🤔4🔥2
⚠️ Trusted domains. Abandoned cloud assets. Hijacked by a ghost.

A threat actor called Hazy Hawk is hijacking unused domains from big names like CDC & PwC—turning trusted URLs into malware traps via DNS misconfig.

See how it works ➝ https://thehackernews.com/2025/05/hazy-hawk-exploits-dns-records-to.html
👍19👏1🤔1
This media is not supported in your browser
VIEW IN TELEGRAM
🔥 Google Chrome just got SMARTER!!!

It now auto-changes compromised passwords—in one click.

🔐 Detects hacked passwords
🤖 Auto-generates a strong password
Instantly updates them

See it in action: https://thehackernews.com/2025/05/google-chrome-can-now-auto-change.html
🔥24👍11😁7🤔6👏3
This media is not supported in your browser
VIEW IN TELEGRAM
“SaaS is quietly breaking everything we knew about security.” — JPMorgan’s CISO just sounded the alarm.

From invisible AI agents to risky OAuth tokens, the stakes are rising fast.

👉 4th-party risk is exploding
👉 Non-human identities outnumber users
👉 Admin backdoors + invisible AI agents

👀 What now? Read the analysis → https://thehackernews.com/expert-insights/2025/05/jpmorgan-ciso-spotlights-saas-security.html
👍16😱3
🚨 Mobile users, beware.

PWAs Weaponized in Adult-Content Scam.

Hackers are using full Progressive Web Apps (PWAs) to launch a redirection attack—targeting only Android & iOS users while bypassing desktops entirely.

Learn more ➤ https://thehackernews.com/2025/05/researchers-expose-pwa-javascript.html
😁11😱5👍3👏1
🚨 One email = FULL BREACH.

Phishing kits like Tycoon2FA bypass filters, trick users & steal creds in seconds.

See every click, every redirect, every fake login—live—inside this sandbox. Verdicts in <40 seconds. IOC-rich reports.

🔗 Learn how → https://thehackernews.com/2025/05/how-to-detect-phishing-attacks-faster.html
👍13😁3
👀 WATCH OUT — If it’s trending, it’s bait.

Cybercriminals are hijacking Facebook ads to impersonate Kling AI—tricking users into downloading malware via fake image generators.

Crypto wallets. Remote access. 70+ spoofed pages.

🔗 Details → https://thehackernews.com/2025/05/fake-kling-ai-facebook-ads-deliver-rat.html
👍9😁5
🚨 CI/CD pipelines move fast—but security often lags behind.

Misconfigs, weak containers, and unchecked code can open real attack paths.

Wazuh spots what others miss—and stops it cold.

🔍 See the risks + how to fix them → https://thehackernews.com/2025/05/securing-cicd-workflows-with-wazuh.html
👍7😱5
🚨 From Inbox to Full Compromise:

Hackers are hitting Russian businesses with phishing emails disguised as docs, delivering PureRAT malware for full-system access, password theft & crypto hijacking.

🎯 Attacks have quadrupled in early 2025.

🔗 Details: https://thehackernews.com/2025/05/purerat-malware-spikes-4x-in-2025.html
🔥8😱3🤔2
⚠️ Russia’s cyber war isn’t just on the battlefield—it’s hitting inboxes across the West.

APT28 (Fancy Bear) is targeting logistics, defense & IT firms in 14 countries to track aid to Ukraine.

Outlook, Roundcube, VPNs—even border cameras compromised.

🔗 Learn more: https://thehackernews.com/2025/05/russian-hackers-exploit-email-and-vpn.html
👍21🔥14😁7🤔6🤯2
🔥 Biggest Info-Stealer Takedown of 2025!

🚨 2,300+ domains seized | 10M+ infections cut off.

Lumma Stealer—the world’s top info-stealer—just got dismantled by a global strike led by Microsoft, FBI, and Europol.

🔗 Read this story → https://thehackernews.com/2025/05/fbi-and-europol-disrupt-lumma-stealer.html
🤯11👏8👍6🔥1
Most companies think their identity security is under control—It’s not.

🚨 <4% have fully automated ID workflows
🔑 89% depend on users to manually enable MFA
📉 52% faced breaches from manual ID tasks

Read latest 2025 report → https://thehackernews.com/2025/05/identity-security-has-automation.html
👍10🔥1👏1😁1
🚨 3 Critical Flaws. 1 Exploit Chain. No Fix.

Versa Concerto's SD-WAN platform has 3 severe CVEs—one rated 10.0—that can let attackers bypass auth, escalate privileges & gain full system control via reverse shell.

🔗 Read this story → https://thehackernews.com/2025/05/unpatched-versa-concerto-flaws-let.html
🤔6🔥3👏3😁2👍1
🚨 China-linked UNC5221 hackers exploited Ivanti EPMM zero-days (CVE-2025-4427 & 4428) immediately after disclosure, targeting mobile endpoints in defense, healthcare, and finance sectors.

Full report → https://thehackernews.com/2025/05/chinese-hackers-exploit-ivanti-epmm.html
👍7🔥3👏2
Webinar ALERT!

Cybersecurity isn't enough—you must prove it.

Courts, regulators, and insurers demand "reasonable" programs, and vague efforts won't suffice. Learn what this means and how to comply.

📅 Register for this free session now → https://thehackernews.com/2025/05/webinar-learn-how-to-build-reasonable.html
🤔6👍1👏1
🛑 WARNING — Any user to Domain Admin?

Akamai researchers demoed BadSuccessor, an attack abusing the new dMSA feature—enabled by default—to escalate privileges in Active Directory.

Works in 91% of orgs.
No patch yet

Details here → https://thehackernews.com/2025/05/critical-windows-server-2025-dmsa.html
😱12😁2👏1