The Hacker News
152K subscribers
1.88K photos
10 videos
3 files
7.79K links
Official THN Telegram Channel — A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

📨 Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
🚨 China-linked cyber groups are upgrading their weapons:

• PlugX: hides in the Mobile Popup app, decrypts payloads in memory with XOR-RC4-RtlDecompressBuffer, packs a keylogger.

• Bookworm: slips shellcode in UUID strings to dodge detection.

Full story → https://thehackernews.com/2025/09/china-linked-plugx-and-bookworm-malware.html
🔥23🤯6🤔2😱2👍1
🚨 First real-world MCP server backdoor spotted!

A fake npm package postmark-mcp silently BCC’d every email to an attacker—over 1,600 downloads before removal.

⚠️ One line of code. Thousands of stolen emails.

Read now → https://thehackernews.com/2025/09/first-malicious-mcp-server-found.html
👏11😁3👍1🔥1🤔1
🚨 Microsoft warns — Hackers used LLM-generated code to hide malware in an SVG file disguised as a business dashboard, bypassing defenses with self-addressed emails + invisible scripts.

Details → https://thehackernews.com/2025/09/microsoft-flags-ai-driven-phishing-llm.html
😁19🤯5👍1🔥1
🕵️‍♀️ Missed the action? Hackers didn’t rest—neither should you.

See the key security stories you might have missed.

Check full recap → https://thehackernews.com/2025/09/weekly-recap-cisco-0-day-record-ddos.html
👏11👍1
🚨 SOCs are drowning: 40% of security alerts go uninvestigated, and 61% of the ones ignored later turn out to be critical.

Teams face 3,000+ daily alerts and 70-minute investigations—far slower than the 48 minutes attackers need to compromise.

Read → https://thehackernews.com/2025/09/the-state-of-ai-in-soc-2025-insights.html
🔥16👍1
🚨 EvilAI is live and global: Malware hidden inside “legit” AI & productivity apps is quietly invading manufacturing, healthcare, gov & tech across 🇮🇳 🇺🇸 🇫🇷 🇧🇷 and more.

🕵️‍♂️ Uses real code-signing certs, AES-encrypted C2, even NeutralinoJS tricks to slip past detection.

Read → https://thehackernews.com/2025/09/evilai-malware-masquerades-as-ai-tools.html
👏17😁61👍1🔥1
🚨 Linux/Unix alert: CISA just flagged a critical Sudo flaw (CVE-2025-32463, CVSS 9.3) now exploited in the wild.

Attackers can hijack sudo’s --chroot option to run arbitrary commands as root—even if not in sudoers.

Details → https://thehackernews.com/2025/09/cisa-sounds-alarm-on-critical-sudo-flaw.html
👍16🤯12👏2😱2
🚨 U.K. police just seized £5.5B ($7.4B) in crypto—the largest Bitcoin confiscation in history.

A Chinese fraudster duped 128,000 victims, laundered funds into 61,000 BTC, and tried to hide in London with fake IDs.

The twist? She was caught buying property.

Full story → https://thehackernews.com/2025/09/uk-police-just-seized-55-billion-in.html
🤯16👍5🔥4😁4
🚨 Shadow AI is exploding inside enterprises. Employees are adopting LLM-powered apps without oversight—creating blind spots, supply chain risks, and data leaks.

Wing Security says traditional defenses can’t keep up. The fix? Real-time discovery + AI supply chain governance.

Read → https://thehackernews.com/2025/09/evolving-enterprise-defense-to-secure.html
🔥7👍1
🚨 A new Android banking trojan is here: Datzbro.

It doesn’t just steal logins—it recreates your screen in real time for full device takeover.

Victims? Seniors lured via fake “active trip” groups on Facebook.

Details → https://thehackernews.com/2025/09/new-android-trojan-datzbro-tricking.html
😱12🔥6👍1🤯1
🔥 [New] VMware zero-day (CVE-2025-41244) exploited in the wild!

UNC5174 popped root by abusing a regex bug in get_version() — drop /tmp/httpd, open a socket, and you’re root.

Already active since Oct ’24.

Details → https://thehackernews.com/2025/09/urgent-china-linked-hackers-exploit-new.html
🔥25👍1
🛠 AI won’t fix your workflows—it might break them.

Learn how top teams actually blend humans + LLMs without over-engineering.

Secure, auditable, scalable.

📅 Join the webinar → https://thehacker.news/ai-automating-cybersecurity
😁5
🚨 Microsoft just made Sentinel an agentic SIEM.

Now GA: Sentinel data lake + preview of Graph & MCP server.

AI agents can retro-hunt, trace attack paths & plug into VS Code. From reactive to predictive defense.

Details → https://thehackernews.com/2025/09/microsoft-expands-sentinel-into-agentic.html
🤯9
🚨 Google’s Gemini AI had a “Trifecta” of flaws that let attackers steal user data + hijack cloud assets.

The wildest part? Hackers could smuggle prompts inside HTTP headers to make Gemini expose IAM misconfigs & query Cloud APIs on their behalf.

Read → https://thehackernews.com/2025/09/researchers-disclose-google-gemini-ai.html
👏13👍2
Containers boost speed and scale, but they also introduce risks that can be overlooked.

In this 30-minute session, we’ll challenge the biggest myths surrounding container security.

Save your spot now: https://thn.news/tech-stack-defense
🔥6
💡 SOC alert chaos isn’t a volume problem—it’s the model.

Conifers’ CognitiveSOC turns raw alerts into context-rich stories: false positives drop, MTTR shrinks from hours → minutes.

More context, less chaos → https://thehackernews.com/2025/09/stop-alert-chaos-context-is-key-to.html
👍6
🚨 New China-linked hacking group uncovered: Phantom Taurus.

Targets: foreign ministries, embassies, & military ops across Africa, the Middle East, & Asia.

Their weapon? A custom .NET malware suite (NET-STAR) that hijacks IIS servers, timestomps files, & evades AMSI/ETW.

Read → https://thehackernews.com/2025/09/phantom-taurus-new-china-linked-hacker.html
😁11👏4🤯1
🔥 A $50 hardware hack just broke Intel SGX & AMD SEV-SNP—the backbone of confidential cloud computing.

Researchers built a cheap DDR4 interposer that slips past trust checks, then flips a switch to rewrite encrypted memory on the fly.

The kicker? Fixing it would require redesigning memory encryption itself.

Details → https://thehackernews.com/2025/10/50-battering-ram-attack-breaks-intel.html
😁12🔥65
CISOs are done buying shiny tools.

The new playbook? Threat-Informed Defense—using intel + adversary emulation to prove if your controls actually stop real attacker TTPs.

From poisoned CI/CD pipelines to identity-based API attacks—here’s how to operationalize it ↓ https://thehackernews.com/expert-insights/2025/09/turning-intelligence-into-action-with.html
😁6👍2
⚠️ CERT-UA: Hackers are sneaking a new CABINETRAT backdoor into Ukraine via Excel XLL add-ins shared on Signal.

Shellcode is hidden inside a PNG (“Office.png”), launched by excel.exe /e in stealth mode.

Details here → https://thehackernews.com/2025/10/ukraine-warns-of-cabinetrat-backdoor.html
🤔14🔥3😱2😁1