The Hacker News
βœ”
163K subscribers
2.81K photos
18 videos
4 files
8.75K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
πŸ›‘ WARNING: Bitwarden CLI was compromised in a supply chain attack.

@bitwarden/cli@2026.4.0 included malicious code after attackers hijacked GitHub Actions, stole secrets, and pushed a tampered version to npm.

πŸ”— Learn how the attack worked β†’ https://thehackernews.com/2026/04/bitwarden-cli-compromised-in-ongoing.html
😱28πŸ‘4😁3⚑2πŸ”₯1
The math doesn't add up anymore.
AI finds vulnerabilities in ⚑ milliseconds.
Manual patching takes ⏳ weeks.

Learn how to beat the bots at their own game.

πŸŽ™οΈ Featuring: Ofer Gayer (VP Product, Miggo Security)
πŸ“ Webinar: Rethinking Prioritization

Secure your spot β†’ https://thehackernews.com/2026/04/webinar-mythos-reality-check-beating.html
πŸ‘11
⚠️ Hackers are breaching companies through Microsoft Teams, posing as IT helpdesk staff.

They flood inboxes, then send a Teams message with a β€œfix” link. One click installs malware, steals credentials, and gives full remote access.

πŸ”— Learn more β†’ https://thehackernews.com/2026/04/unc6692-impersonates-it-helpdesk-via.html
😁15πŸ‘6πŸ”₯6🀯6😱5⚑1
⚠️ LMDeploy flaw exploited within 12.5 hours of disclosure.

The SSRF bug let attackers hit AWS metadata, Redis, and internal services via the image loader to scan networks and access data.

WordPress plugin bugs are also being used for full site takeovers.

πŸ”— Read β†’ https://thehackernews.com/2026/04/lmdeploy-cve-2026-33626-flaw-exploited.html
πŸ‘6πŸ”₯6
macOS attacks are now hiding in system features.

Payloads stored in Spotlight metadata let attackers run code without suspicious files, using native scripting and protocols to move and persist outside standard monitoring.

πŸ”— Learn how macOS built-ins are being weaponized β†’ https://thehackernews.com/2026/04/threatsday-bulletin-290m-defi-hack.html#macos-stealth-execution-abuse
πŸ”₯7😁5πŸ‘2🀯2
πŸ›‘ A fake PDF reader is being used to quietly take over systems.

Tropic Trooper spreads a trojanized app that runs AdaptixC2 via GitHub-based control, then uses Microsoft Visual Studio Code tunnels for access on high-value targets.

πŸ”— Read β†’ https://thehackernews.com/2026/04/tropic-trooper-uses-trojanized.html
πŸ”₯9😱5😁2🀯2
πŸ›‘ 26 fake wallet apps on Apple’s App Store stole recovery phrases and private keys.

They mimicked MetaMask and Coinbase, worked via China-region accounts, and used phishing, OCR, or injected code to capture seed phrases.

πŸ”— Read β†’ https://thehackernews.com/2026/04/26-fakewallet-apps-found-on-apple-app.html
😁10😱8πŸ”₯5πŸ‘3
This media is not supported in your browser
VIEW IN TELEGRAM
AI agents don’t create risk. They expose it.

The real problem is delegated authority. Most orgs still don’t see or control who is granting that power. If the source is broken, agents will scale the risk fast.

πŸ”— Learn why AI security starts with fixing delegation β†’ https://thehackernews.com/2026/04/bridging-ai-agent-authority-gap.html
πŸ€”7
⚑ NASA staff unknowingly shared defense tech with China.

A fake U.S. researcher spent years tricking agencies and universities into sending sensitive aerospace software used in weapons development.

πŸ”— Learn what investigators found in the case β†’ https://thehackernews.com/2026/04/nasa-employees-duped-in-chinese.html
😁22😱11🀯8πŸ”₯7πŸ‘1
πŸ”₯ A U.S. federal agency was hacked via Cisco firewall.

Attackers used ASA flaws to install FIRESTARTER, a backdoor that stays even after patches and normal reboots.

Fix requires full reimage or hard power cycle, not just updating software.

πŸ”— Read β†’ https://thehackernews.com/2026/04/firestarter-backdoor-hit-federal-cisco.html
😱28πŸ”₯15😁9⚑2
🚨 Four actively exploited flaws flagged.

CISA warns SimpleHelp, Samsung, and D-Link bugs are already used for ransomware and botnets, including admin takeovers and remote command execution.

πŸ”— See what to patch or replace β†’ https://thehackernews.com/2026/04/cisa-adds-4-exploited-flaws-to-kev-sets.html
😁12πŸ‘6⚑3πŸ”₯2
⚠️ This cyberweapon existed before Stuxnet in 2005

Called "fast16," it sabotaged systems by quietly altering engineering calculations instead of destroying code.

πŸ”— Full report and findings β†’ https://thehackernews.com/2026/04/researchers-uncover-pre-stuxnet-fast16.html
πŸ”₯20πŸ‘5⚑2
⚠️ WARNING - Fake CAPTCHA pages are now triggering up to 60 hidden SMS charges per victim.

Users are tricked into texting premium international numbers, quietly adding charges to their phone bills.

πŸ”— See how the scam runs β†’ https://thehackernews.com/2026/04/fake-captcha-irsf-scam-and-120-keitaro.html
🀯12πŸ€”6⚑1πŸ‘1
🚨 11,000+ fake government portals found.

A global scam called GovTrap is copying real public service sites to steal personal data and payments from citizens worldwide.

πŸ”— See how the operation works β†’ https://thehackernews.com/expert-insights/2026/04/ctm360-exposes-global-govtrap-campaign.html
⚑8🀯5πŸ‘2😁2
🚨 73 VS Code extensions flagged as malicious.

Researchers say some are sleeper packages that later update to steal data and install backdoors across developer tools.

πŸ”— Full details: https://thehackernews.com/2026/04/researchers-uncover-73-fake-vs-code.html
πŸ‘10😁4πŸ”₯2
⚠️ Hackers breached TrueConf servers across Russia.

PhantomCore chained 3 privately developed bugs to skip login, run commands, and move inside networks. Attacks started weeks after patches.

πŸ”— See how the attacks worked β†’ https://thehackernews.com/2026/04/phantomcore-exploits-trueconf.html
⚑5πŸ”₯3πŸ‘1😁1😱1
🚨 AI finds bugs faster than teams fix them...

More tools = more alerts, but most never get fixed in time.

πŸ”— See what’s breaking β†’ https://thehackernews.com/2026/04/mythos-changed-math-on-vulnerability.html
😁9
⚑ This week’s #cybersecurity recap is ugly in the usual way.

β€’ Poisoned password manager CLI
β€’ Fake Teams help desks
β€’ Federal firewall backdoor
β€’ Energy wiper
β€’ Booby-trapped AI pages
β€’ Fake Authenticator extensions
β€’ and many more...

Read β†’ https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html
πŸ‘5πŸ”₯1😁1
⚑ Checkmarx data is on the dark web...

Company links it to a GitHub repo breach from its March supply chain attack. Scope still under review, no customer data confirmed.

πŸ”— See what’s known so far β†’ https://thehackernews.com/2026/04/checkmarx-confirms-github-repository.html
πŸ‘5😱2
This media is not supported in your browser
VIEW IN TELEGRAM
βš™οΈ Your AI agents are only as smart as the context they operate on❗Most security teams are racing to deploy AI, autonomous workflows, self-healing environments, and agents that triage before a human even sees the alert. But underneath all of it? Context that's fragmented, stale, and contradictor

The technology is ready. The foundation isn't.

The team at Axonius is hosting a live webinar on Tuesday, May 26 at 12 PM ET to dig into exactly this.

πŸ—“ AI is Only as Smart as Its Context: Building a Foundation for Trusted Automation. This webinar will cover:

β€’ Why conflicting data causes AI agents to hallucinate, and how to fix it
β€’ How to build multi-source consensus with verifiable provenance
β€’ What decision-grade asset intelligence actually looks like in practice

If your team is serious about making AI-driven security actually work, this one is for you!

Register here: https://thn.news/trusted-automation
😁5🀯2😱1