The Hacker News
Відкрити в Telegram
⭐ Official THN Telegram Channel — A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking. 📨 Contact: admin@thehackernews.com 🌐 Website: https://thehackernews.com
Показати більше153 046
Підписники
+6424 години
+3297 днів
+1 41630 день
Архів дописів
Фото недоступнеДивитись в Telegram
🚨 Critical Apache Tika flaw (CVE-2025-66516) just dropped — CVSS 10.0.
A single fake PDF can trigger an XXE attack, letting hackers read server files or run code.
🔗 Read ↓ https://thehackernews.com/2025/12/critical-xxe-bug-cve-2025-66516-cvss.html
Update to v3.2.2 now.
🔥 13🤔 5😱 1
Фото недоступнеДивитись в Telegram
⚠️ Within HOURS of disclosure, two China-linked hacking groups weaponized a critical React flaw (CVE-2025-55182).
They’re already scanning the web for unpatched apps.
Update to React 19.0.1+ now.
🔗 Read ↓ https://thehackernews.com/2025/12/chinese-hackers-have-started-exploiting.html
🤯 7🔥 4
Фото недоступнеДивитись в Telegram
🚨 A lawyer in Pakistan was hacked with Predator — the first known spyware attack on a civil society member.
It started with a link on WhatsApp, but new leaks show Predator can also spread through ads — no click needed.
It can read chats, record audio, take photos — and Intellexa may still access customer systems remotely.
🔗 Read → https://thehackernews.com/2025/12/intellexa-leaks-reveal-zero-days-and.html
😁 9😱 5🔥 2👏 1
Фото недоступнеДивитись в Telegram
🚨 CISA just warned about a new Chinese state-backed hack tool called BRICKSTORM — a backdoor found in VMware and Windows systems used by U.S. government and tech networks.
It can reinstall itself if removed, hide in normal traffic, and give hackers full remote control.
🔗Read → https://thehackernews.com/2025/12/cisa-reports-prc-hackers-using.html
🤯 20🔥 6👏 3😁 2
Фото недоступнеДивитись в Telegram
⚠️ Hackers are exploiting a command injection bug in Array Networks AG Series gateways — active since August 2025.
It lets attackers run any command on systems using “DesktopDirect” remote access.
🔗 Details → https://thehackernews.com/2025/12/jpcert-confirms-active-command.html
🔥 9😁 4👍 3
Фото недоступнеДивитись в Telegram
🚨 A fake Microsoft Teams installer is spreading malware in China.
Hackers called "Silver Fox" made it look like a Russian attack to hide their tracks.
It installs ValleyRAT, giving full remote access to victims.
🔗 Read: https://thehackernews.com/2025/12/silver-fox-uses-fake-microsoft-teams.html
😁 14🔥 12
Фото недоступнеДивитись в Telegram
🚨 AI tools are now running inside your browser — reading data, following hidden prompts, and moving info across tabs.
IT can’t see it. Security can’t stop it.
Seraphic Security’s Suresh Batchu calls this the next big blind spot: Shadow AI in the enterprise browser.
🔗 Read ↓ https://thehackernews.com/expert-insights/2025/12/shadow-ai-in-browser-next-enterprise.html
🤯 13😁 6🤔 3👍 2
Фото недоступнеДивитись в Telegram
✈️ Hackers faking airport Wi-Fi.
💻 Malware hiding inside coding tools.
🤖 AI rewriting security playbooks.
That’s just the start — and 15+ more stories inside.
📰 This week’s ThreatsDay Bulletin uncovers the sneakiest hacks, scams, and “too-smart” malware out there.
🔗 Catch up before they catch you → https://thehackernews.com/2025/12/threatsday-bulletin-wi-fi-hack-npm-worm.html
👏 9🤔 4
Фото недоступнеДивитись в Telegram
🤖💥 AI-built code just broke web security in 2025.
One bug in a “vibe coding” platform let anyone access private apps — no login needed.
⚠️ 45% of AI-written code had exploitable flaws.
🏢 Even big firms like Wix had to patch fast.
The fix? Treat all AI code as untrusted.
🔗 Read here → https://thehackernews.com/2025/12/5-threats-that-reshaped-web-security.html
😁 10🤯 8⚡ 4👍 1
Фото недоступнеДивитись в Telegram
🚨 Thousands hacked after downloading what looked like “official” government apps.
They were fake versions of real banking apps, modified by hackers from GoldFactory to include malware.
So far, over 11,000 phones in Southeast Asia have been infected.
🔗 Details ↓ https://thehackernews.com/2025/12/goldfactory-hits-southeast-asia-with.html
🤯 14👏 5🔥 3😁 2
Фото недоступнеДивитись в Telegram
🚨 Cloudflare just stopped the largest DDoS attack ever — a 29.7 Tbps strike from the AISURU botnet that used up to 4 million hacked devices.
It hit 15,000 ports every second for 69 seconds before being blocked.
🔗 Details: https://thehackernews.com/2025/12/record-297-tbps-ddos-attack-linked-to.html
🔥 37😱 13😁 8👍 7
Фото недоступнеДивитись в Telegram
⚠️ URGENT: A 10.0-severity bug just hit React Server Components and Next.js.
It lets anyone run code on your server — even without logging in.
🔗 Details → https://thehackernews.com/2025/12/critical-rsc-bugs-in-react-and-nextjs.html
⚙️ Fix: update to patched versions now.
👏 12🤯 7😁 5😱 3⚡ 2
Фото недоступнеДивитись в Telegram
⚠️ Microsoft just fixed a Windows flaw hackers have used since 2017.
The bug let malicious shortcut (.LNK) files hide long commands that users couldn’t see — used by groups from China, Iran, North Korea, and Russia.
Patched in Nov 2025 update.
🔗 Read: https://thehackernews.com/2025/12/microsoft-silently-patches-windows-lnk.html
🤯 21😁 10🔥 3😱 1
Фото недоступнеДивитись в Telegram
🚨 A major WordPress flaw is being exploited right now.
The King Addons for Elementor plugin let anyone sign up as an admin — no login needed.
Over 48,000 attack attempts have been blocked since October.
Full details → https://thehackernews.com/2025/12/wordpress-king-addons-flaw-under-active.html
👍 11😁 3👏 1
Фото недоступнеДивитись в Telegram
⚡ A 16-year-old with a $200 allowance can now outsmart your email security.
Tools like WormGPT, FraudGPT, and SpamGPT are automating cybercrime — writing perfect CEO emails, building fake sites, and scaling attacks faster than filters can react.
In this live session, experts will break down how these tools work and how to stop them after someone clicks.
🔗 Secure your seat → https://thehackernews.com/2025/12/discover-ai-tools-fueling-next.html
😱 9😁 5🔥 1🤔 1
Фото недоступнеДивитись в Telegram
⚠️ Brazil under dual attack.
Water Saci is spreading a banking trojan through a WhatsApp-based worm, while RelayNFC is running an Android NFC relay campaign that steals contactless payment data.
Both threats use social engineering and target Brazilian users.
🔗 Read details: https://thehackernews.com/2025/12/brazil-hit-by-banking-trojan-spread-via.html
😁 15⚡ 7🤔 2🔥 1
Фото недоступнеДивитись в Telegram
ShinyHunters. Salesloft Drift. Gainsight.
Different breaches — same playbook:
• Abused OAuth trust
• Exploited integrations
• Targeted non-human identities
Still think Salesforce is “just another app”?
Attackers don’t — they’re hitting the entire SaaS supply chain.
👉 Read the white paper → https://thn.news/enterprise-security-2026
👍 9
Фото недоступнеДивитись в Telegram
⚙️ AI is already making security decisions inside most tools — from SIEMs to endpoint protection.
It uses math, not context.
That means risk calls you didn’t make can still land on you.
Here’s how to build and tune your own AI workflows for control ↓ https://thehackernews.com/2025/12/chopping-ai-down-to-size-turning.html
⚡ 8👍 1
Фото недоступнеДивитись в Telegram
🚨 Warning: businesses are facing a new threat!
#Salty2FA and #Tycoon2FA are now attacking together. The #phishing campaign that's just been discovered is stealing corporate logins at scale.
See the breakdown and key IOCs for your SOC ⬇️ https://thn.news/tycoon-cyber-phish
⚡ 7😱 3
Фото недоступнеДивитись в Telegram
⚡Pentests expire fast.
☁️ Cloud setups change daily—so reports age out in weeks.
Gaurav Kulkarni of Sprocket Security shows how Continuous Penetration Testing finds and verifies issues as they appear, giving real proof your fixes work.
Read more ↓ https://thehackernews.com/expert-insights/2025/12/beyond-point-in-time-roi-case-for.html
👍 2🔥 2⚡ 1👏 1
