The Hacker News
Ir al canal en Telegram
⭐ Official THN Telegram Channel — A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking. 📨 Contact: admin@thehackernews.com 🌐 Website: https://thehackernews.com
Mostrar más153 033
Suscriptores
+6424 horas
+3297 días
+1 41630 días
Archivo de publicaciones
Photo unavailableShow in Telegram
🛑 Amazon flagged a new AWS crypto-mining campaign using custom persistence techniques.
Attackers validate permissions with DryRun, deploy miners across ECS and EC2, then enable instance termination protection to block cleanup.
🔗 Learn more: https://thehackernews.com/2025/12/compromised-iam-credentials-power-large.html
🔥 13🤔 5😁 2😱 2
Photo unavailableShow in Telegram
💰 A fake NuGet package stole crypto wallets for more than five years.
It copied a popular .NET tracing library and hid as a normal dependency. One extra letter in the author name led to about 2,000 downloads since 2020.
It exfiltrated Stratis wallet JSON files and passwords to a Russian IP.
🔗 Read: https://thehackernews.com/2025/12/rogue-nuget-package-poses-as-tracerfody.html
🤯 6👍 2👏 2😁 2🤔 2
00:02
Video unavailableShow in Telegram
⚡ Amazon confirms a Russian GRU unit hacked Western energy and infrastructure networks for years.
The threat wasn’t malware, it was silent credential theft from live traffic.
From 2021–2025, APT44 relied less on zero-days and more on exposed routers and VPN gateways.
🔗 Read → https://thehackernews.com/2025/12/amazon-exposes-years-long-gru-cyber.html
russian.gif.mp40.15 KB
👍 13🤯 5😁 4🤔 3🔥 2
Photo unavailableShow in Telegram
⚠️ Most privacy risks aren't malicious.
It’s accidental.
A log statement. A helper function. An AI SDK someone added on Friday.
If you only look in production, you’re blind by design.
Read more → https://thehackernews.com/2025/12/why-data-security-and-privacy-need-to.html
🔥 5👏 3⚡ 1
Photo unavailableShow in Telegram
🚨 Fortinet FortiGate devices are under active attack via SSO authentication bypass flaws.
CVE-2025-59718 and CVE-2025-59719 both have CVSS scores of 9.8 and exploit the FortiCloud SSO feature.
Disable FortiCloud SSO until systems are fully updated.
🔗 Details → https://thehackernews.com/2025/12/fortinet-fortigate-under-active-attack.html
😁 12🤯 4👍 3🔥 1
Photo unavailableShow in Telegram
Attackers are abusing React2Shell to plant Linux backdoors like KSwapDoor and ZnDoor.
This hits orgs that left React and Next.js servers unpatched.
Microsoft saw reverse shells, Cobalt Strike, and stolen cloud tokens tied to CVE-2025-55182, and Shadowserver tracks over 111,000 exposed IPs.
🔗 Details → https://thehackernews.com/2025/12/react2shell-vulnerability-actively.html
🤯 6😱 4😁 1🤔 1
Photo unavailableShow in Telegram
🔐 Google is shutting down its dark web monitoring tool less than two years after launch.
Google admitted the tool surfaced breached data but didn’t give people clear next steps. Alerts without action paths don’t change outcomes.
🔗 Read here: https://thehackernews.com/2025/12/google-to-shut-down-dark-web-monitoring.html
😁 23🤯 10🔥 4👍 1
Photo unavailableShow in Telegram
🚨 WARNING: A “Featured” Chrome extension was silently copying everything users typed into ChatGPT and other AI tools.
Prompts. Responses. Sent off-device by default after an auto-update.
It even warned users about sharing sensitive info, while exporting the full chats itself.
🔗 Read: https://thehackernews.com/2025/12/featured-chrome-browser-extension.html
😁 18🔥 11🤯 10👍 3⚡ 2
Photo unavailableShow in Telegram
FreePBX’s worst flaw isn’t a bug — it’s a legacy setting.
If AUTHTYPE is set to webserver, attackers can fake a login header and get admin access. From there, they can add their own user and run code on the system.
Default configs are safe. Old tweaks aren’t.
🔗 Read: https://thehackernews.com/2025/12/freepbx-authentication-bypass-exposed.html
🤯 11😁 6
Photo unavailableShow in Telegram
Sensitive data is everywhere: SaaS, cloud, AI pipelines, and most teams can’t see it.
That’s why DSPM is becoming a top security priority for 2026.
Next-gen DSPM goes beyond visibility→ real-time context, automation, and AI-aware protection.
Learn more: https://thn.news/dspm-top-tools
👍 6😁 5
Photo unavailableShow in Telegram
⚡ Your SaaS wasn’t hacked. It was impersonated via the browser.
Attackers ran clean, verified Chrome and Edge extensions for years. Millions of installs. One silent update flipped them into spyware.
Not a device attack. Not a cloud breach. Both at once. The browser sat in the middle, unseen, holding the keys.
🔗 Learn more: https://thehackernews.com/2025/12/a-browser-extension-risk-guide-after.html
⚡ 7🔥 4👍 1
Photo unavailableShow in Telegram
🚨 Active phishing attacks in Russia spread Phantom Stealer.
Fake bank transfer emails use ISO attachments. The malware steals browser data, crypto wallets, passwords, and files, then sends them out via Telegram or Discord.
Finance, payroll, accounting, and legal teams are the main targets.
🔗 Read: https://thehackernews.com/2025/12/phantom-stealer-spread-by-iso-phishing.html
😁 12🔥 4
Photo unavailableShow in Telegram
🤦 Hackers built #ransomware — then left the key behind.
CyberVolk’s new VolkLocker targets 💻 Windows and 🐧 Linux.
The flaw? the lock key is hard-coded and saved as a plain file on the system.
Files can be unlocked for free — but after 48 hours, it can wipe 🗑️ personal folders.
🔗 Read: https://thehackernews.com/2025/12/volklocker-ransomware-exposed-by-hard.html
😁 37🤯 6⚡ 5
Photo unavailableShow in Telegram
⚠️ Notepad++ fixes a bug that was actively abused.
Notepad++ released version 8.8.9 to patch a critical updater flaw. Attackers hijacked update traffic and tricked users into installing malware instead of real updates.
🔗 Read: https://thehackernews.com/2025/12/threatsday-bulletin-spyware-alerts.html#update-closes-hijack-flaw
👍 27🤯 21🔥 9👏 5😱 3😁 2
Photo unavailableShow in Telegram
🚨 Poland Police detained three Ukrainian nationals after finding hacking 💻 and spying tools in their car.
Authorities say the gear could be used to attack key IT and telecom 📡 systems tied to national defense.
Charges include fraud and computer-related crimes.
🔗 Read: https://thehackernews.com/2025/12/threatsday-bulletin-spyware-alerts.html#vaas-crackdown-nets-193-arrests
🔥 16😁 13🤯 7👍 3
Photo unavailableShow in Telegram
🖥️⚠️ A six-year-old router flaw is being used right now.
U.S. cyber officials warn that hackers are actively attacking Sierra Wireless AirLink routers. The bug lets attackers upload a bad file and take full control of the device.
🔗 Read → https://thehackernews.com/2025/12/cisa-adds-actively-exploited-sierra.html
🔥 6😁 4🤯 4👍 3
Photo unavailableShow in Telegram
Apple patched two bugs hackers were already using. New updates fix active attacks across iPhone, iPad, Mac, Safari, Watch, TV, and Vision Pro.
⚠️ One bug lets attackers run code from bad web pages.
⚠️ Another breaks memory.
🌐 All iPhone and iPad browsers were affected.
🕵️ Apple says the attacks were highly targeted.
This is Apple’s 9th zero-day fix in 2025.
🔗 Update now — read here ↓ https://thehackernews.com/2025/12/apple-issues-security-updates-after-two.html
😱 15👍 6🔥 5⚡ 3😁 3
Photo unavailableShow in Telegram
🖥️ Researchers found fake Python tools on GitHub spreading a new trojan called PyStoreRAT.
The repos look real, gain stars ⭐, and run hidden malware using a Windows tool.
The malware can steal crypto wallet files 💰 and stay hidden by pretending to be an NVIDIA update.
🔗 Read: https://thehackernews.com/2025/12/fake-osint-and-gpt-utility-github-repos.html
🤯 32👍 4😁 2
Photo unavailableShow in Telegram
🚨 Hackers are attacking CentreStack and Triofox right now using a built-in key that never changes.
It lets them break in, read the web-config file, and run code on the server.
At least 9 companies have already been hit.
🔗 Read: https://thehackernews.com/2025/12/new-advanced-phishing-kits-use-ai-and.html
🔥 8🤯 6😁 3
Photo unavailableShow in Telegram
⚠️ Your browser is now the biggest GenAI risk.
Every day, workers paste code, emails, and files into AI tools—right inside the browser. That data can leak, get stored, or even shared outside your company.
The fix isn’t banning AI. It’s securing how it’s used—in the browser session itself.
🔗 Read: https://thehackernews.com/2025/12/securing-genai-in-browser-policy.html
🔥 20👍 9
