The Hacker News
152K subscribers
1.87K photos
10 videos
3 files
7.79K links
Official THN Telegram Channel — A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

📨 Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
🚨 U.K. police just seized £5.5B ($7.4B) in crypto—the largest Bitcoin confiscation in history.

A Chinese fraudster duped 128,000 victims, laundered funds into 61,000 BTC, and tried to hide in London with fake IDs.

The twist? She was caught buying property.

Full story → https://thehackernews.com/2025/09/uk-police-just-seized-55-billion-in.html
🤯16👍5🔥4😁4
🚨 Shadow AI is exploding inside enterprises. Employees are adopting LLM-powered apps without oversight—creating blind spots, supply chain risks, and data leaks.

Wing Security says traditional defenses can’t keep up. The fix? Real-time discovery + AI supply chain governance.

Read → https://thehackernews.com/2025/09/evolving-enterprise-defense-to-secure.html
🔥7👍1
🚨 A new Android banking trojan is here: Datzbro.

It doesn’t just steal logins—it recreates your screen in real time for full device takeover.

Victims? Seniors lured via fake “active trip” groups on Facebook.

Details → https://thehackernews.com/2025/09/new-android-trojan-datzbro-tricking.html
😱12🔥6👍1🤯1
🔥 [New] VMware zero-day (CVE-2025-41244) exploited in the wild!

UNC5174 popped root by abusing a regex bug in get_version() — drop /tmp/httpd, open a socket, and you’re root.

Already active since Oct ’24.

Details → https://thehackernews.com/2025/09/urgent-china-linked-hackers-exploit-new.html
🔥25👍1
🛠 AI won’t fix your workflows—it might break them.

Learn how top teams actually blend humans + LLMs without over-engineering.

Secure, auditable, scalable.

📅 Join the webinar → https://thehacker.news/ai-automating-cybersecurity
😁5
🚨 Microsoft just made Sentinel an agentic SIEM.

Now GA: Sentinel data lake + preview of Graph & MCP server.

AI agents can retro-hunt, trace attack paths & plug into VS Code. From reactive to predictive defense.

Details → https://thehackernews.com/2025/09/microsoft-expands-sentinel-into-agentic.html
🤯9
🚨 Google’s Gemini AI had a “Trifecta” of flaws that let attackers steal user data + hijack cloud assets.

The wildest part? Hackers could smuggle prompts inside HTTP headers to make Gemini expose IAM misconfigs & query Cloud APIs on their behalf.

Read → https://thehackernews.com/2025/09/researchers-disclose-google-gemini-ai.html
👏13👍2
Containers boost speed and scale, but they also introduce risks that can be overlooked.

In this 30-minute session, we’ll challenge the biggest myths surrounding container security.

Save your spot now: https://thn.news/tech-stack-defense
🔥6
💡 SOC alert chaos isn’t a volume problem—it’s the model.

Conifers’ CognitiveSOC turns raw alerts into context-rich stories: false positives drop, MTTR shrinks from hours → minutes.

More context, less chaos → https://thehackernews.com/2025/09/stop-alert-chaos-context-is-key-to.html
👍6
🚨 New China-linked hacking group uncovered: Phantom Taurus.

Targets: foreign ministries, embassies, & military ops across Africa, the Middle East, & Asia.

Their weapon? A custom .NET malware suite (NET-STAR) that hijacks IIS servers, timestomps files, & evades AMSI/ETW.

Read → https://thehackernews.com/2025/09/phantom-taurus-new-china-linked-hacker.html
😁11👏4🤯1
🔥 A $50 hardware hack just broke Intel SGX & AMD SEV-SNP—the backbone of confidential cloud computing.

Researchers built a cheap DDR4 interposer that slips past trust checks, then flips a switch to rewrite encrypted memory on the fly.

The kicker? Fixing it would require redesigning memory encryption itself.

Details → https://thehackernews.com/2025/10/50-battering-ram-attack-breaks-intel.html
😁12🔥65
CISOs are done buying shiny tools.

The new playbook? Threat-Informed Defense—using intel + adversary emulation to prove if your controls actually stop real attacker TTPs.

From poisoned CI/CD pipelines to identity-based API attacks—here’s how to operationalize it ↓ https://thehackernews.com/expert-insights/2025/09/turning-intelligence-into-action-with.html
😁6👍2
⚠️ CERT-UA: Hackers are sneaking a new CABINETRAT backdoor into Ukraine via Excel XLL add-ins shared on Signal.

Shellcode is hidden inside a PNG (“Office.png”), launched by excel.exe /e in stealth mode.

Details here → https://thehackernews.com/2025/10/ukraine-warns-of-cabinetrat-backdoor.html
🤔14🔥3😱2😁1
🚨 New Android banking trojan spotted — Klopatra has hijacked 3,000+ devices in Spain & Italy.

It hides with Virbox-grade protection (never seen before in Android malware), uses hidden VNC to drain bank accounts at night—while victims think their phone is off.

Details here → https://thehackernews.com/2025/10/new-android-banking-trojan-klopatra.html
😁9🤔6😱5👏4
🚨 Attackers are hijacking industrial routers to blast out smishing texts across Europe.

Milesight routers expose an API that lets anyone send SMS without authentication. At least 572 devices remain wide open.

Find details here → https://thehackernews.com/2025/10/hackers-exploit-milesight-routers-to.html
🔥83😁2
🚨 58% of security pros were told to hide a breach this year — a 38% spike since 2023.

The irony? While execs boast “confidence,” 84% of real attacks slip in through tools already inside your network.

The part no one’s talking about ↓ https://thehackernews.com/2025/10/2025-cybersecurity-reality-check.html
😁12👍2
🚨 A single Jupyter notebook user could hijack an entire AI platform.

Red Hat OpenShift AI flaw (CVE-2025-10725) lets low-privileged accounts escalate to full cluster admin—total takeover possible.

That’s not the scariest part ↓ https://thehackernews.com/2025/10/critical-red-hat-openshift-ai-flaw.html
😁9👏6🤔4👍1
⚠️ Automation alone won’t save you.

Too much AI = black-box risk.
Too many rules = brittle systems.
Too much human = bottlenecks.

The strongest workflows blend all three—intentionally.

See how in our next webinar ↓ https://thehackernews.com/2025/10/how-leading-security-teams-blend-ai.html
😁135👍3
🚨 New CVE in OneLogin (7.7 CVSS): API flaw exposed all OIDC client secrets.

Any attacker with valid keys could impersonate apps + move laterally.

Patched in 2025.3.0 — details here ↓ https://thehackernews.com/2025/10/onelogin-bug-let-attackers-use-api-keys.html
😁6🤔3👍1
This media is not supported in your browser
VIEW IN TELEGRAM
🚨 Researchers just cracked Intel SGX on DDR4.

Attackers can now steal enclave keys with a $1k device bought online.

They can masquerade as genuine SGX hardware—while spying on your data.

The exploit: “WireTap.” Details ↓ https://thehackernews.com/2025/10/new-wiretap-attack-extracts-intel-sgx.html
😁186🤯4👍1🔥1