The Hacker News
βœ”
163K subscribers
2.83K photos
18 videos
4 files
8.77K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
βš™οΈ Your AI agents are only as smart as the context they operate on❗Most security teams are racing to deploy AI, autonomous workflows, self-healing environments, and agents that triage before a human even sees the alert. But underneath all of it? Context that's fragmented, stale, and contradictor

The technology is ready. The foundation isn't.

The team at Axonius is hosting a live webinar on Tuesday, May 26 at 12 PM ET to dig into exactly this.

πŸ—“ AI is Only as Smart as Its Context: Building a Foundation for Trusted Automation. This webinar will cover:

β€’ Why conflicting data causes AI agents to hallucinate, and how to fix it
β€’ How to build multi-source consensus with verifiable provenance
β€’ What decision-grade asset intelligence actually looks like in practice

If your team is serious about making AI-driven security actually work, this one is for you!

Register here: https://thn.news/trusted-automation
😁8🀯5πŸ‘3😱2
🚨 WARNING: Microsoft confirmed active exploitation of a Windows flaw β†’ CVE-2026-32202.

The bug stems from an incomplete fix, allowing attackers to steal credentials via SMB authentication when a malicious file is opened.

πŸ”— Read details β†’ https://thehackernews.com/2026/04/microsoft-confirms-active-exploitation.html
πŸ”₯8😁6πŸ‘2
😳 Entra ID Agent ID Administrator role flaw enabled service principal takeover.

Users could take over non-agent service principals, add credentials, and escalate privileges before Microsoft’s April 9, 2026 patch.

πŸ”— See how the attack worked β†’ https://thehackernews.com/2026/04/microsoft-patches-entra-id-role-flaw.html
😁12πŸ‘3
A user ran malware and no alerts fired...

As Ryan Boerner, Founder and CEO at Keep Aware, shows, the browser is now the real OS, but tools below it miss in-session actions where AI and scripts act as the user, breaking identity trust.

πŸ”— Learn how browser-based attacks bypass modern security stacks β†’ https://thehackernews.com/expert-insights/2026/04/work-moved-into-browser-security-didnt.html
😁11πŸ‘2πŸ‘2πŸ”₯1
A Chinese national linked to Silk Typhoon has been extradited to the U.S. over alleged COVID-19 research cyberattacks.

Prosecutors say Xu Zewei exploited zero-days to breach vaccine research systems under direction of China’s MSS.

πŸ”— Details β†’ https://thehackernews.com/2026/04/chinese-silk-typhoon-hacker-extradited.html
🀯11😱6😁4πŸ‘3πŸ€”2πŸ”₯1
AI has erased the patch window.

Exploit discovery now takes minutes, not weeksβ€”leaving organizations exposed before fixes exist. Security shifts from prevention to real-time containment.

πŸ”— How AI-driven exploits are forcing an assume-breach model β†’ https://thehackernews.com/2026/04/after-mythos-new-playbooks-for-zero.html
😱9πŸ”₯7😁6πŸ‘1
⚠️ An unpatched critical flaw in Hugging Face’s LeRobot enables remote code execution (CVSS 9.3).

Untrusted pickle over unauthenticated gRPC (no TLS) lets attackers take over servers, steal keys and models, and impact connected robots.

πŸ”— Details β†’ https://thehackernews.com/2026/04/critical-cve-2026-25874-leaves-hugging.html
πŸ‘3⚑2πŸ”₯1😁1
Security teams treat data as trusted once it crosses domains. That’s the ⚠️ flaw.

53% still rely on manual processes, even as attacks hit 137 times a week and πŸ€– AI drives response speeds on both sides. The gap isn’t identity. It’s how data moves.

πŸ”— Why data movement is the weakest layer in Zero Trust β†’ https://thehackernews.com/2026/04/why-secure-data-movement-is-zero-trust.html
πŸ‘3πŸ”₯2
🚨 9 days ago, a compromised OAuth token resulted in a breach at Vercel.

This is the reality facing security teams:

πŸ₯· An infostealer hits a vendor in your SaaS ecosystem, the attacker works backwards from stolen access, and an old consent becomes the front door. πŸšͺ

If you haven't made OAuth grant reviews a regular part of your on-going security program, you should.

Here's a step-by-step guide from Nudge Security to help you β†’ https://thn.news/oauth-checklist
πŸ‘7πŸ”₯1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ›‘ VECT 2.0 ransomware can’t restore what it destroys.

Files over 131 KB are permanently destroyed, not encryptedβ€”because required nonces are discarded during execution.

No attacker can recover the data, even after payment.

πŸ”— Read β†’ https://thehackernews.com/2026/04/vect-20-ransomware-irreversibly.html
πŸ”₯14πŸ‘3😁1πŸ€”1
Google flags indirect prompt injection as a primary attack vector for AI agents.

Attackers embed hidden commands in websites and documentsβ€”seen by AI, not humansβ€”redirecting execution away from user intent. Detections rose 32% in recent scans.

The risk sits in what models consume.

πŸ”— How web content is being weaponized against AI systems β†’ https://thehackernews.com/2026/04/weekly-recap-fast16-malware-xchat.html#:~:text=Turning%20the%20Web%20Into%20a%20Trap%20for%20LLMs
😁4🀯4πŸ”₯2πŸ‘1
⚠️ A Brazilian cybercrime group is back, targeting Minecraft players with a fake mod.

LofyStealer runs directly in memory, stealing passwords, tokens, and banking data across major browsers after a single install.

πŸ”— Read more β†’ https://thehackernews.com/2026/04/brazilian-lofygang-resurfaces-after.html
😁13πŸ”₯3πŸ€”3
πŸ”₯ GitHub RCE via single git push!

CVE-2026-3854: Unsanitized push options let attackers run commands on backend servers, bypassing sandboxing (cross-tenant risk).

πŸ”— Learn how header injection led to full compromise β†’ https://thehackernews.com/2026/04/researchers-discover-critical-github.html

Patched within hours.
πŸ”₯18😁7πŸ‘2⚑1
πŸ›‘ LiteLLM CVE-2026-42208 exploited in ~36 hours.

A pre-auth SQL injection exposed credential tables with LLM and cloud keysβ€”turning a simple flaw into account-level risk.

No PoC needed; advisory and schema were enough.

πŸ”— Read details β†’ https://thehackernews.com/2026/04/litellm-cve-2026-42208-sql-injection.html
😁7⚑1
⚠️ CISA added two actively exploited vulnerabilities to KEV, affecting Windows and ScreenConnect.

A Windows flaw links to an incomplete patch tied to APT28 campaigns. ScreenConnect bugs are now used in Medusa ransomware attacks.

πŸ”— Read β†’ https://thehackernews.com/2026/04/cisa-adds-actively-exploited.html
😁3
🚨 WARNING: cPanel patched an auth flaw affecting all supported versionsβ€”forcing providers to restrict access.

Namecheap blocked ports 2083/2087, disabling control panel access until patches deployed.

πŸ”— Read β†’ https://thehackernews.com/2026/04/critical-cpanel-authentication.html
πŸ‘6😁5πŸ€”2⚑1
Security teams close hundreds of vulnerabilities and still can’t prove they’re safer.

Only ~2% of exposures matter when mapped to real attack paths and critical assets. The rest is noise from tools that miss context and exploitability.

πŸ”— Why most platforms miss real risk β†’ https://thehackernews.com/2026/04/what-to-look-for-in-exposure-management.html
😁2
BeyondTrust’s latest Microsoft Vulnerabilities Report is out, and the numbers should concern every security leader.

Critical vulnerabilities doubled, Azure & Dynamics surged 9x, and 40% of all flaws were tied to Elevation of Privilege.

More insights: https://thn.news/msft-vuln-report

#MVR2026 #LeastPrivilege
πŸ›‘ A wave of attacks is using layered npm dependencies to deliver hidden malware.

Fake SDKs, AI-assisted commits, and job scams all route through packages that pull second-stage payloads, stealing crypto wallets, credentials, and source code. Linked to North Korean campaigns targeting developers.

πŸ”— Learn how these attacks connect across npm, PyPI, and GitHub β†’ https://thehackernews.com/2026/04/new-wave-of-dprk-attacks-uses-ai.html
😱6⚑3πŸ‘3
⚠️ ALERT β€” SAP related npm packages were just found shipping credential-stealing malware.

A preinstall script runs on install, steals tokens, and injects GitHub Actions to self-propagate, exfiltrating encrypted secrets via victim-owned repos.

πŸ”— Read β†’ https://thehackernews.com/2026/04/sap-npm-packages-compromised-by-mini.html
😱3