The Hacker News
βœ”
163K subscribers
2.81K photos
18 videos
4 files
8.74K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
πŸ›‘ Supply chain attacks are stacking across npm, PyPI, and GitHub.

CanisterSprawl worm steals npm tokens via postinstall scripts, republishes infected packages, and spreads across ecosystems.

Other campaigns add backdoored packages, LLM proxy abuse, and GitHub Actions exploits.

πŸ”— Read β†’ https://thehackernews.com/2026/04/self-propagating-supply-chain-worm.html
πŸ”₯7😁6πŸ‘1
⚠️ WARNING: Checkmarx KICS Docker repo breachedβ€”malicious images replaced trusted tags.

The modified images could encrypt and exfiltrate scan data, risking exposure of credentials in IaC files. Related VS Code extensions also ran unverified remote code.

πŸ”— Details β†’ https://thehackernews.com/2026/04/malicious-kics-docker-images-and-vs.html
😁7πŸ”₯6😱5πŸ‘1
⚑ Apple fixed an iOS bug where deleted notifications stayed stored on devices.

The flaw let message data persist after apps like Signal were removed. It surfaced after forensic extraction. The patch now clears and prevents retention.

πŸ”— Details β†’ https://thehackernews.com/2026/04/apple-patches-ios-flaw-that-stored.html
πŸ‘15πŸ”₯9😁5⚑3πŸ‘1πŸ€”1
πŸ”₯ Vercel found more compromised accounts, some predating the breach.

Attackers used malware β†’ Google Workspace β†’ Vercel access, then mapped systems and decrypted environment variables. OAuth trust enabled lateral movement.

πŸ”— Details here β†’ https://thehackernews.com/2026/04/vercel-finds-more-compromised-accounts.html
⚑7πŸ”₯4πŸ‘3
⚠️ A China-aligned APT, GopherWhisper, targeted Mongolian government systems.

It uses Slack, Discord, Outlook, and file-io for control and data theft, deploying Go-based backdoors across at least 12 confirmed systems.

πŸ”— Details β†’ https://thehackernews.com/2026/04/china-linked-gopherwhisper-infects-12.html
⚑8πŸ‘4πŸ”₯4
Anthropic delayed its new AI after it proved too effective at finding and exploiting bugs.

It uncovered decades-old flaws and built working exploitsβ€”but under 1% were patched. The bottleneck is no longer discovery. It’s fixing at speed.

πŸ”— Learn how AI is overwhelming vulnerability patching β†’ https://thehackernews.com/2026/04/project-glasswing-proved-ai-can-find.html
πŸ”₯13😁5⚑4πŸ€”4
Move from AI ethics to AI execution. Here’s how to secure your AI deployment. Join Uncharted on May 5 for a technical deep dive.

Register here: https://thn.news/ai-summit-x
πŸ”₯7πŸ‘2😁2πŸ‘1
πŸ”₯ Internet’s on fire again...

πŸ’Έ $290 million DeFi hack
⚠️ Live RCE exploits
πŸ“¦ Rogue npm packages
πŸ€– AI prompt attacks
πŸ•΅οΈ App data grab
πŸ”‘ Passkey push
🧠 Backdoor claims
πŸ’€ Ransomware feud
🧩 Cryptor kits
πŸ“© Blank phishing
βš™οΈ Binary hijack
πŸ€ RAT bundle
🍏 macOS abuse
πŸ“‘ SIM farms
πŸ‡ͺπŸ‡Ί EU sanctions
πŸͺ€ Bot farm bust
🎭 StealTok extensions
🌐 Joomla backdoor
πŸ›’ Leak Bazaar
🌍 RDP scan spike
🧨 Perforce leak

πŸ”— Catch the full ThreatsDay Bulletin for this week β†’ https://thehackernews.com/2026/04/threatsday-bulletin-290m-defi-hack.html
πŸ”₯15πŸ‘4⚑1
πŸ›‘ WARNING: Bitwarden CLI was compromised in a supply chain attack.

@bitwarden/cli@2026.4.0 included malicious code after attackers hijacked GitHub Actions, stole secrets, and pushed a tampered version to npm.

πŸ”— Learn how the attack worked β†’ https://thehackernews.com/2026/04/bitwarden-cli-compromised-in-ongoing.html
😱27πŸ‘4😁3⚑2πŸ”₯1
The math doesn't add up anymore.
AI finds vulnerabilities in ⚑ milliseconds.
Manual patching takes ⏳ weeks.

Learn how to beat the bots at their own game.

πŸŽ™οΈ Featuring: Ofer Gayer (VP Product, Miggo Security)
πŸ“ Webinar: Rethinking Prioritization

Secure your spot β†’ https://thehackernews.com/2026/04/webinar-mythos-reality-check-beating.html
πŸ‘11
⚠️ Hackers are breaching companies through Microsoft Teams, posing as IT helpdesk staff.

They flood inboxes, then send a Teams message with a β€œfix” link. One click installs malware, steals credentials, and gives full remote access.

πŸ”— Learn more β†’ https://thehackernews.com/2026/04/unc6692-impersonates-it-helpdesk-via.html
😁14πŸ‘6🀯6πŸ”₯5😱4⚑1
⚠️ LMDeploy flaw exploited within 12.5 hours of disclosure.

The SSRF bug let attackers hit AWS metadata, Redis, and internal services via the image loader to scan networks and access data.

WordPress plugin bugs are also being used for full site takeovers.

πŸ”— Read β†’ https://thehackernews.com/2026/04/lmdeploy-cve-2026-33626-flaw-exploited.html
πŸ‘6πŸ”₯6
macOS attacks are now hiding in system features.

Payloads stored in Spotlight metadata let attackers run code without suspicious files, using native scripting and protocols to move and persist outside standard monitoring.

πŸ”— Learn how macOS built-ins are being weaponized β†’ https://thehackernews.com/2026/04/threatsday-bulletin-290m-defi-hack.html#macos-stealth-execution-abuse
πŸ”₯5😁5πŸ‘2🀯2
πŸ›‘ A fake PDF reader is being used to quietly take over systems.

Tropic Trooper spreads a trojanized app that runs AdaptixC2 via GitHub-based control, then uses Microsoft Visual Studio Code tunnels for access on high-value targets.

πŸ”— Read β†’ https://thehackernews.com/2026/04/tropic-trooper-uses-trojanized.html
πŸ”₯9😱5😁2🀯2
πŸ›‘ 26 fake wallet apps on Apple’s App Store stole recovery phrases and private keys.

They mimicked MetaMask and Coinbase, worked via China-region accounts, and used phishing, OCR, or injected code to capture seed phrases.

πŸ”— Read β†’ https://thehackernews.com/2026/04/26-fakewallet-apps-found-on-apple-app.html
😁9πŸ”₯5😱5πŸ‘3
This media is not supported in your browser
VIEW IN TELEGRAM
AI agents don’t create risk. They expose it.

The real problem is delegated authority. Most orgs still don’t see or control who is granting that power. If the source is broken, agents will scale the risk fast.

πŸ”— Learn why AI security starts with fixing delegation β†’ https://thehackernews.com/2026/04/bridging-ai-agent-authority-gap.html
πŸ€”6
⚑ NASA staff unknowingly shared defense tech with China.

A fake U.S. researcher spent years tricking agencies and universities into sending sensitive aerospace software used in weapons development.

πŸ”— Learn what investigators found in the case β†’ https://thehackernews.com/2026/04/nasa-employees-duped-in-chinese.html
😁21😱9πŸ”₯7🀯7πŸ‘1
πŸ”₯ A U.S. federal agency was hacked via Cisco firewall.

Attackers used ASA flaws to install FIRESTARTER, a backdoor that stays even after patches and normal reboots.

Fix requires full reimage or hard power cycle, not just updating software.

πŸ”— Read β†’ https://thehackernews.com/2026/04/firestarter-backdoor-hit-federal-cisco.html
😱25πŸ”₯14😁8⚑2
🚨 Four actively exploited flaws flagged.

CISA warns SimpleHelp, Samsung, and D-Link bugs are already used for ransomware and botnets, including admin takeovers and remote command execution.

πŸ”— See what to patch or replace β†’ https://thehackernews.com/2026/04/cisa-adds-4-exploited-flaws-to-kev-sets.html
😁10πŸ‘4⚑2πŸ”₯2
⚠️ This cyberweapon existed before Stuxnet in 2005

Called "fast16," it sabotaged systems by quietly altering engineering calculations instead of destroying code.

πŸ”— Full report and findings β†’ https://thehackernews.com/2026/04/researchers-uncover-pre-stuxnet-fast16.html
πŸ”₯16πŸ‘3⚑1