The Hacker News
โœ”
152K subscribers
1.87K photos
10 videos
3 files
7.79K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: [email protected]

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿ‘€ โ€œWe never drop tools. We use yours.โ€ โ€” BlackBasta ransomware.

A new Bitdefender analysis of 700,000 incidents reveals this chilling truth: 84% of major cyberattacks use Living Off the Land tools like netsh.exe, powershell.exe, wmic.exe.

๐Ÿ”— Read the report: https://thehackernews.com/expert-insights/2025/05/living-off-land-what-we-learned-from.html
๐Ÿ‘16๐Ÿค”6๐Ÿ”ฅ2
โ€œHealthcare loves to walk backwards into the future.โ€ โ€“ Jason Elrod, CISO, MultiCare Health System.

Legacy IT nearly broke care delivery. But with identity-based microsegmentation, Elrod flipped the script:
โœ… 30K staff
โœ… 14 hospitals
โœ… Zero downtime
โœ… 238% ROI

Security shouldn't be a roadblockโ€”it should be a bridge.

See how MultiCare did it โ†’ https://thehackernews.com/2025/05/from-department-of-no-to-culture-of-yes.html
โšก8๐Ÿ‘5
๐Ÿšจ โ€œProve you're not a robotโ€ โ€” turns into full system breach!

Hackers are using fake CAPTCHA checks to deploy a stealthy new Rust malware, EDDIESTEALER, via ClickFixโ€”a social engineering trick abusing PowerShell on Windows.

๐ŸŽฏ Targets: Passwords, crypto wallets, cookies, and more.

๐Ÿ”— Full report: https://thehackernews.com/2025/05/eddiestealer-malware-uses-clickfix.html
๐Ÿคฏ25๐Ÿ˜19๐Ÿ”ฅ4๐Ÿ‘4๐Ÿค”3โšก1
๐Ÿšจ Global cybercrime tool taken down.

On May 27, 2025, U.S., Dutch, and Finnish authorities seized domains like AvCheck[.]net, used by hackers to hide malware from antivirus tools.

๐Ÿ‘€ The twist? These โ€œsecurity checkersโ€ claimed to detect threatsโ€”but were secretly helping cybercriminals stay invisible.

๐Ÿ”— Details: https://thehackernews.com/2025/05/us-doj-seizes-4-domains-supporting.html
๐Ÿ‘26๐Ÿ”ฅ8๐Ÿ‘4๐Ÿ˜4๐Ÿคฏ3โšก1
๐Ÿ” Two Linux flaws let local attackers steal secrets from crash dumps โ€” including password hashes.

Found in Ubuntu, RHEL & Fedora, the bugs (CVE-2025-5054 & CVE-2025-4598) exploit SUID crash handling.

A simple raceโ€”triggered at just the right timeโ€”can leak /etc/shadow data.

PoC is public. Mitigations exist.

Read: https://thehackernews.com/2025/05/new-linux-flaws-allow-password-hash.html
๐Ÿค”16๐Ÿ˜ฑ10๐Ÿ‘7๐Ÿ”ฅ7๐Ÿ‘7๐Ÿคฏ7๐Ÿ˜4โšก3
๐Ÿ‘€ โ€œStrategic Opportunityโ€ or Silent Backdoor?

CFOs across Europe, Africa, & Asia are being hunted in a stealth phishing op impersonating Rothschild recruiters. Victims solve a CAPTCHAโ€”then unknowingly install NetBird & OpenSSH, giving attackers remote access.

Itโ€™s legit software. Weaponized.

Learn more: https://thehackernews.com/2025/06/fake-recruiter-emails-target-cfos-using.html
๐Ÿ”ฅ29๐Ÿ‘10โšก1
Cyberattacks are getting smarterโ€”not louder.

APTs, AI malware, and browser hijacks are slipping in through trusted tools.

Weโ€™ve cut through the noiseโ€”here are the key exploits, CVEs, and tactics to know.

๐Ÿ”— Read latest weekly recap: https://thehackernews.com/2025/06/weekly-recap-apt-intrusions-ai-malware.html
๐Ÿ”ฅ21๐Ÿ˜6๐Ÿ‘3๐Ÿ‘2๐Ÿค”1
๐Ÿšจ EDR alone wonโ€™t cut it anymore.

Todayโ€™s threats bypass traditional toolsโ€”using stealth, encryption, and insider tactics.

Thatโ€™s why banks, energy firms, and governments are turning to Network Detection & Response (NDR) to catch what SIEM and EDR canโ€™t.

From Volt Typhoon to hidden data theftโ€”NDR sees what others miss.

Find out how โ†’ https://thehackernews.com/2025/06/the-secret-defense-strategy-of-four.html
๐Ÿ‘13๐Ÿ˜3๐Ÿ‘1
๐Ÿšจ Qualcomm just patched 3 zero-days actively exploited in the wildโ€”two rated CVSS 8.6.

โ–ถ CVE-2025-21479
โ–ถ CVE-2025-21480
โ–ถ CVE-2025-27038

๐Ÿ‘€ A twist? Similar bugs were used by spyware vendors like Variston and Cy4Gate.

More here: https://thehackernews.com/2025/06/qualcomm-fixes-3-zero-days-used-in.html
๐Ÿคฏ10๐Ÿ‘8๐Ÿ‘1
๐Ÿšจ JINX-0132 is hijacking DevOps servers for cryptominingโ€”no malware, no staging.

Theyโ€™re exploiting Docker, Gitea, Consul & Nomad (first known wild exploit) using tools straight from GitHub.

๐Ÿ” First known exploit of Nomad misconfigs in the wild
๐Ÿ’ฐ $10K+ in compute stolen/month
๐ŸŒ 5,700+ exposed servers (US, China, EU...)

๐Ÿ”— Full story: https://thehackernews.com/2025/06/cryptojacking-campaign-exploits-devops.html
๐Ÿค”9๐Ÿ‘4๐Ÿคฏ2
๐Ÿšจ WARNING: Another Chrome zero-day exploited in the wild.

Google just patched CVE-2025-5419 โ€” a high-severity V8 engine flaw found by its own Threat Analysis Group.

Attackers are already using it via malicious HTML pages.

Update Chrome NOW | Read: https://thehackernews.com/2025/06/new-chrome-zero-day-actively-exploited.html
๐Ÿ”ฅ25๐Ÿ‘8๐Ÿ‘2
๐Ÿ•ต๏ธโ€โ™‚๏ธ APT29? Cozy Bear? Midnight Blizzard?

Same hacker. Different names.

๐Ÿ”ฅ Microsoft and CrowdStrike are finally fixing the naming mess. Faster attribution. Better defense.

Check it out โ†’ https://thehackernews.com/2025/06/microsoft-and-crowdstrike-launch-shared.html
๐Ÿ˜14๐Ÿ‘5
๐Ÿšจ Chrome to Block TLS Certificates from Two Major Certificate Authorities.

Why? Repeated security failures. Broken promises. No real progress.

Read: https://thehackernews.com/2025/06/google-chrome-to-distrust-two.html

โš ๏ธ Switch CAs now to avoid disruptions.
๐Ÿ”ฅ21๐Ÿ‘5๐Ÿ‘4
๐Ÿšจ New Android malware 'Crocodilus' spreads worldwide.

First seen in Spain & Turkey, it now targets users in ๐Ÿ‡ต๐Ÿ‡ฑ Poland, ๐Ÿ‡ง๐Ÿ‡ท Brazil, ๐Ÿ‡ฆ๐Ÿ‡ท Argentina, ๐Ÿ‡ฎ๐Ÿ‡ณ India & more.

It:
๐Ÿ”ธ Steals crypto seed phrases
๐Ÿ”ธ Poses as " Bank Support " to evade Google alerts
๐Ÿ”ธ Spreads via Facebook ads

๐Ÿ”— Details: https://thehackernews.com/2025/06/android-trojan-crocodilus-now-active-in.html
๐Ÿ‘12๐Ÿ”ฅ4
New GenAI Security Best Practices Bundle

3-in-1 AI security guides. Get access to 3 resources that will help secure your AI pipeline and mitigate critical risks.

Unlock the Bundle: https://thehackernews.uk/wiz-genai-sec-bundle
๐Ÿค”8๐Ÿ”ฅ4๐Ÿ‘1
โ€œHey, I got a new phoneโ€”can you reset my MFA?โ€

Thatโ€™s how $100M+ breaches begin.

Scattered Spider isnโ€™t new โ€” theyโ€™ve been hijacking accounts using help desk scams, deepfakes & AiTM phishing kits since 2022.

Learn how to fight back โ†’ https://thehackernews.com/2025/06/scattered-spider-understanding-help.html
๐Ÿค”8๐Ÿ˜5๐Ÿคฏ5๐Ÿ‘1
XPOSURE is back! The National Exposure Management Virtual Summit returns for its fourth year, focused on what matters most: reducing cyber exposure and risk.

Join top cybersecurity leaders from Pentera, Forrester, AWS, Armis, Recorded Future, and SecurityScorecard to learn how leading security teams are taking a proactive approach to exposure across the enterprise.

Featuring Jen Easterly, former Director of the Cybersecurity and Infrastructure Security Agency (CISA), as the XPOSURE 2025 keynote.

If youโ€™re building toward a more proactive security model, this is where you need to be.

๐Ÿ“… June 18 | ๐Ÿ•š 11 AM ET
๐ŸŽ“ Up to 3.5 CPE credits
๐Ÿ”— https://thn.news/xposure2025

#XPOSURE2025 #CTEM #CyberSecurityLeadership #EnterpriseSecurity
๐Ÿ‘2
๐Ÿšจ A 10-year-old flaw (CVE-2025-49113 / CVSS 9.9) in Roundcube Webmail could let hackers take over your system.

Nation-state groups like APT28 have already exploited Roundcube before.

๐Ÿ”— Read: https://thehackernews.com/2025/06/critical-10-year-old-roundcube-webmail.html

๐Ÿ”ง Patch to 1.6.11 or 1.5.10 LTS now.
๐Ÿ“Œ PoC coming soon.
๐Ÿ‘11๐Ÿ”ฅ5๐Ÿค”5๐Ÿ‘4
๐Ÿšจ Watch your clipboard!

A fake DocuSign site tricks users into running malware with a sneaky PowerShell scriptโ€”copied via CAPTCHA.

โœ”๏ธ Clipboard poisoning
โœ”๏ธ Fake Gitcode & DocuSign sites
โœ”๏ธ NetSupport RAT deployed

๐Ÿ‘€ Learn how it works โ†’ https://thehackernews.com/2025/06/fake-docusign-gitcode-sites-spread.html
๐Ÿ”ฅ7๐Ÿ‘6๐Ÿคฏ4
๐Ÿšจ Critical bugs in HPE StoreOnce | 9.8 CVSS flaw allows auth bypass + RCE as root.

๐Ÿ‘€ One bug (CVE-2025-37093) lets attackers skip loginโ€”then chain others for full takeover.

Patch now if you're running pre-4.3.11 versions.

๐Ÿ”— Full details: https://thehackernews.com/2025/06/hpe-issues-security-patch-for-storeonce.html
๐Ÿ‘11๐Ÿ”ฅ4