ru
Feedback
The Hacker News

The Hacker News

Открыть в Telegram

⭐ Official THN Telegram Channel — A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking. 📨 Contact: admin@thehackernews.com 🌐 Website: https://thehackernews.com

Больше
153 033
Подписчики
+6424 часа
+3297 дней
+1 41630 день
Архив постов
Фото недоступноПоказать в Telegram
🛑 Amazon flagged a new AWS crypto-mining campaign using custom persistence techniques. Attackers validate permissions with DryRun, deploy miners across ECS and EC2, then enable instance termination protection to block cleanup. 🔗 Learn more: https://thehackernews.com/2025/12/compromised-iam-credentials-power-large.html
Показать все...
🔥 13🤔 5😁 2😱 2
Фото недоступноПоказать в Telegram
💰 A fake NuGet package stole crypto wallets for more than five years. It copied a popular .NET tracing library and hid as a normal dependency. One extra letter in the author name led to about 2,000 downloads since 2020. It exfiltrated Stratis wallet JSON files and passwords to a Russian IP. 🔗 Read: https://thehackernews.com/2025/12/rogue-nuget-package-poses-as-tracerfody.html
Показать все...
🤯 6👍 2👏 2😁 2🤔 2
00:02
Видео недоступноПоказать в Telegram
⚡ Amazon confirms a Russian GRU unit hacked Western energy and infrastructure networks for years. The threat wasn’t malware, it was silent credential theft from live traffic. From 2021–2025, APT44 relied less on zero-days and more on exposed routers and VPN gateways. 🔗 Read → https://thehackernews.com/2025/12/amazon-exposes-years-long-gru-cyber.html
Показать все...
russian.gif.mp40.15 KB
👍 13🤯 5😁 4🤔 3🔥 2
Фото недоступноПоказать в Telegram
⚠️ Most privacy risks aren't malicious. It’s accidental. A log statement. A helper function. An AI SDK someone added on Friday. If you only look in production, you’re blind by design. Read more → https://thehackernews.com/2025/12/why-data-security-and-privacy-need-to.html
Показать все...
🔥 5👏 3 1
Фото недоступноПоказать в Telegram
🚨 Fortinet FortiGate devices are under active attack via SSO authentication bypass flaws. CVE-2025-59718 and CVE-2025-59719 both have CVSS scores of 9.8 and exploit the FortiCloud SSO feature. Disable FortiCloud SSO until systems are fully updated. 🔗 Details → https://thehackernews.com/2025/12/fortinet-fortigate-under-active-attack.html
Показать все...
😁 12🤯 4👍 3🔥 1
Фото недоступноПоказать в Telegram
Attackers are abusing React2Shell to plant Linux backdoors like KSwapDoor and ZnDoor. This hits orgs that left React and Next.js servers unpatched. Microsoft saw reverse shells, Cobalt Strike, and stolen cloud tokens tied to CVE-2025-55182, and Shadowserver tracks over 111,000 exposed IPs. 🔗 Details → https://thehackernews.com/2025/12/react2shell-vulnerability-actively.html
Показать все...
🤯 6😱 4😁 1🤔 1
Фото недоступноПоказать в Telegram
🔐 Google is shutting down its dark web monitoring tool less than two years after launch. Google admitted the tool surfaced breached data but didn’t give people clear next steps. Alerts without action paths don’t change outcomes. 🔗 Read here: https://thehackernews.com/2025/12/google-to-shut-down-dark-web-monitoring.html
Показать все...
😁 23🤯 10🔥 4👍 1
Фото недоступноПоказать в Telegram
🚨 WARNING: A “Featured” Chrome extension was silently copying everything users typed into ChatGPT and other AI tools. Prompts. Responses. Sent off-device by default after an auto-update. It even warned users about sharing sensitive info, while exporting the full chats itself. 🔗 Read: https://thehackernews.com/2025/12/featured-chrome-browser-extension.html
Показать все...
😁 18🔥 11🤯 10👍 3 2
Фото недоступноПоказать в Telegram
FreePBX’s worst flaw isn’t a bug — it’s a legacy setting. If AUTHTYPE is set to webserver, attackers can fake a login header and get admin access. From there, they can add their own user and run code on the system. Default configs are safe. Old tweaks aren’t. 🔗 Read: https://thehackernews.com/2025/12/freepbx-authentication-bypass-exposed.html
Показать все...
🤯 11😁 6
Фото недоступноПоказать в Telegram
Sensitive data is everywhere: SaaS, cloud, AI pipelines, and most teams can’t see it. That’s why DSPM is becoming a top security priority for 2026. Next-gen DSPM goes beyond visibility→ real-time context, automation, and AI-aware protection. Learn more: https://thn.news/dspm-top-tools
Показать все...
👍 6😁 5
Фото недоступноПоказать в Telegram
⚡ Your SaaS wasn’t hacked. It was impersonated via the browser. Attackers ran clean, verified Chrome and Edge extensions for years. Millions of installs. One silent update flipped them into spyware. Not a device attack. Not a cloud breach. Both at once. The browser sat in the middle, unseen, holding the keys. 🔗 Learn more: https://thehackernews.com/2025/12/a-browser-extension-risk-guide-after.html
Показать все...
7🔥 4👍 1
Фото недоступноПоказать в Telegram
🚨 Active phishing attacks in Russia spread Phantom Stealer. Fake bank transfer emails use ISO attachments. The malware steals browser data, crypto wallets, passwords, and files, then sends them out via Telegram or Discord. Finance, payroll, accounting, and legal teams are the main targets. 🔗 Read: https://thehackernews.com/2025/12/phantom-stealer-spread-by-iso-phishing.html
Показать все...
😁 12🔥 4
Фото недоступноПоказать в Telegram
🤦 Hackers built #ransomware — then left the key behind. CyberVolk’s new VolkLocker targets 💻 Windows and 🐧 Linux. The flaw? the lock key is hard-coded and saved as a plain file on the system. Files can be unlocked for free — but after 48 hours, it can wipe 🗑️ personal folders. 🔗 Read: https://thehackernews.com/2025/12/volklocker-ransomware-exposed-by-hard.html
Показать все...
😁 37🤯 6 5
Фото недоступноПоказать в Telegram
⚠️ Notepad++ fixes a bug that was actively abused. Notepad++ released version 8.8.9 to patch a critical updater flaw. Attackers hijacked update traffic and tricked users into installing malware instead of real updates. 🔗 Read: https://thehackernews.com/2025/12/threatsday-bulletin-spyware-alerts.html#update-closes-hijack-flaw
Показать все...
👍 27🤯 21🔥 9👏 5😱 3😁 2
Фото недоступноПоказать в Telegram
🚨 Poland Police detained three Ukrainian nationals after finding hacking 💻 and spying tools in their car. Authorities say the gear could be used to attack key IT and telecom 📡 systems tied to national defense. Charges include fraud and computer-related crimes. 🔗 Read: https://thehackernews.com/2025/12/threatsday-bulletin-spyware-alerts.html#vaas-crackdown-nets-193-arrests
Показать все...
🔥 16😁 13🤯 7👍 3
Фото недоступноПоказать в Telegram
🖥️⚠️ A six-year-old router flaw is being used right now. U.S. cyber officials warn that hackers are actively attacking Sierra Wireless AirLink routers. The bug lets attackers upload a bad file and take full control of the device. 🔗 Read → https://thehackernews.com/2025/12/cisa-adds-actively-exploited-sierra.html
Показать все...
🔥 6😁 4🤯 4👍 3
Фото недоступноПоказать в Telegram
Apple patched two bugs hackers were already using. New updates fix active attacks across iPhone, iPad, Mac, Safari, Watch, TV, and Vision Pro. ⚠️ One bug lets attackers run code from bad web pages. ⚠️ Another breaks memory. 🌐 All iPhone and iPad browsers were affected. 🕵️ Apple says the attacks were highly targeted. This is Apple’s 9th zero-day fix in 2025. 🔗 Update now — read here ↓ https://thehackernews.com/2025/12/apple-issues-security-updates-after-two.html
Показать все...
😱 15👍 6🔥 5 3😁 3
Фото недоступноПоказать в Telegram
🖥️ Researchers found fake Python tools on GitHub spreading a new trojan called PyStoreRAT. The repos look real, gain stars ⭐, and run hidden malware using a Windows tool. The malware can steal crypto wallet files 💰 and stay hidden by pretending to be an NVIDIA update. 🔗 Read: https://thehackernews.com/2025/12/fake-osint-and-gpt-utility-github-repos.html
Показать все...
🤯 32👍 4😁 2
Фото недоступноПоказать в Telegram
🚨 Hackers are attacking CentreStack and Triofox right now using a built-in key that never changes. It lets them break in, read the web-config file, and run code on the server. At least 9 companies have already been hit. 🔗 Read: https://thehackernews.com/2025/12/new-advanced-phishing-kits-use-ai-and.html
Показать все...
🔥 8🤯 6😁 3
Фото недоступноПоказать в Telegram
⚠️ Your browser is now the biggest GenAI risk. Every day, workers paste code, emails, and files into AI tools—right inside the browser. That data can leak, get stored, or even shared outside your company. The fix isn’t banning AI. It’s securing how it’s used—in the browser session itself. 🔗 Read: https://thehackernews.com/2025/12/securing-genai-in-browser-policy.html
Показать все...
🔥 20👍 9