The Hacker News
βœ”
151K subscribers
1.86K photos
10 videos
3 files
7.78K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
🚨 Researchers uncovered 175 malicious npm packages used to host phishing redirects β€” downloaded 26,000+ times.

The campaign, dubbed Beamglea, abused npm + UNPKG to target 135 tech and energy firms worldwide.

No exploit. Just clever infrastructure abuse.

Read β†’ https://thehackernews.com/2025/10/175-malicious-npm-packages-with-26000.html
🀯10πŸ€”7
⚠️ A zero-day in GoAnywhere MFT has been actively exploited since Sept 11.

Attackers bypassed cryptographic checks β€” no password, no auth. Microsoft says Storm-1175 used it to drop Medusa ransomware.

Full timeline + exploit details ↓ https://thehackernews.com/2025/10/from-detection-to-patch-fortra-reveals.html
πŸ‘11
πŸ”΄ ALERT: Your next β€œHR alert” email might not be from HR.

Storm-2657 is phishing employees, taking over Workday accounts, and swapping bank details to steal salaries β€” no malware, just manipulation.

Inside Microsoft’s latest findings ↓ https://thehackernews.com/2025/10/microsoft-warns-of-payroll-pirates.html
😁13πŸ”₯4
⚠️ New β€œStealit” malware is using Node.js’ experimental SEA feature to slip full payloads into fake game & VPN installers β€” already spreading via Mediafire and Discord.

Read how β†’ https://thehackernews.com/2025/10/stealit-malware-abuses-nodejs-single.html
😁20
🚨 Signal just threatened to leave the EU.

Why? The proposed β€œChat Control” law would force apps to scan every private message before it’s sent.

The catch: even encrypted chats would be exposed. Experts call it β€œmass surveillance in disguise.”

The details you need to see ↓ https://thehackernews.com/2025/10/threatsday-bulletin-ms-teams-hack-mfa.html#opposition-to-e-u-chat-control
πŸ‘56🀯21πŸ”₯9😁9⚑4πŸ€”1
🚨 Hackers just turned a DFIR tool into a ransomware weapon.

Storm-2603 hijacked Velociraptor to deploy LockBit, Warlock & Babukβ€”even creating fake domain admins and disabling defenses.

Details here ↓ https://thehackernews.com/2025/10/hackers-turn-velociraptor-dfir-tool.html
😁16😱5πŸ”₯4
⚠️ Over 100 SonicWall SSL VPN accounts breached β€” not brute-forced.

Attackers used legit creds and traced back to a single IP.

Even patched devices are falling to Akira ransomware campaigns.

Learn more β†’ https://thehackernews.com/2025/10/experts-warn-of-widespread-sonicwall.html
πŸ”₯10😁4🀯4πŸ‘1
⚑ Apple’s Siri recordings are under criminal investigation in France.

A whistleblower says they captured β€œintimate” conversations β€” enough to identify users.

Apple denies misuse, but prosecutors aren’t convinced.

Read ↓ https://thehackernews.com/2025/10/threatsday-bulletin-ms-teams-hack-mfa.html#france-opens-probe-into-apple-siri-voice-recordings
πŸ”₯27😁10😱3
🐭 A $35 gaming mouse just became a spy tool.

UC Irvine researchers turned its optical sensor into a microphone that steals conversations from air-gapped PCs.

It hides inside legit apps like games. Read the PoC β†’ https://thehackernews.com/2025/10/threatsday-bulletin-ms-teams-hack-mfa.html#mic-e-mouse-attack-for-covert-data-exfiltration
😱46πŸ€”11πŸ‘5πŸ‘5
⚠️ WARNING: Oracle just confirmed a new vulnerability (CVE-2025-61884) in E-Business Suite.

No login required. Full data access possible.

Even worseβ€”similar flaws were just exploited by Cl0p-linked actors.

Read the latest news here β†’ https://thehackernews.com/2025/10/new-oracle-e-business-suite-bug-could.html
⚑11πŸ‘8πŸ‘3
🚨A new Rust-based backdoor called ChaosBot is hijacking corporate networks β€” and running its C2 over Discord.

It hides behind Microsoft Edge, abuses service accounts, and even checks for VMware to dodge analysis.

One slip β†’ full network access ↓ https://thehackernews.com/2025/10/new-rust-based-malware-chaosbot-hijacks.html
😁14πŸ‘6πŸ”₯4⚑2πŸ€”1
Hackers just turned GitHub into their command center.

When police take down their servers, the malware just… reboots itself from GitHub.

The twist? It hides configs inside images using steganography. This isn’t a glitch β€” it’s resilience by design.

Read how it works β†’ https://thehackernews.com/2025/10/astaroth-banking-trojan-abuses-github.html
πŸ”₯34πŸ€”10😱6😁4⚑1
⚠️ Microsoft just locked down Internet Explorer mode in Edge after real-world zero-day attacks.

Hackers abused the old IE engine (Chakra) to hijack devices β€” bypassing modern browser defenses.

Full story ↓ https://thehackernews.com/2025/10/microsoft-locks-down-ie-mode-after.html
πŸ”₯16😁6πŸ€”4πŸ‘2😱2
πŸŸ₯ RondoDox Botnet just went nuclear.

It’s now exploiting 56 vulnerabilities across 30+ vendors β€” from routers to web servers.

The irony? 18 of those flaws don’t even have CVEs yet.

Learn more β†’ https://thehackernews.com/2025/10/researchers-warn-rondodox-botnet-is.html
🀯10😱6πŸ‘2⚑1
Your WAF can’t see this.

Attackers are skimming payment data right now through unmonitored JavaScriptβ€”while your dashboards stay clean.

The worst part? It’s happening in your customers’ browsers.

See what every retailer must fix before Black Friday ↓ https://thehackernews.com/2025/10/why-unmonitored-javascript-is-your.html
πŸ”₯12
⚑ Latest Weekly Recap is out...

🚨 Oracle 0-Day exploited
πŸ€– Nation-state AI abuse on the rise
🎣 npm phishing spreading fast
πŸ’€ New ransomware cartel emerges

…and more

The threat landscape is moving fast β€” here’s what defenders need to know.

πŸ”— https://thehackernews.com/2025/10/weekly-recap-whatsapp-worm-critical.html
⚑8πŸ€”1
🚨 Threat Alert: A new group, TA585, is running end-to-end phishing campaigns delivering MonsterV2 malware.

No middlemen. Just pure, in-house cybercrime ops.

Phishing β†’ fake CAPTCHAs β†’ PowerShell payloads β†’ MonsterV2.

Learn how their stack works β†’ https://thehackernews.com/2025/10/researchers-expose-ta585s-monsterv2.html
😁15πŸ”₯1😱1
🚨 Attackers are turning Discord into a command center β€” using webhooks to steal API keys and config files right from npm, PyPI, and Ruby installs.

βš™οΈ North Korean actors even pushed 300+ fake packages with 50K+ downloads.

Details here β†’ https://thehackernews.com/2025/10/npm-pypi-and-rubygems-packages-found.html
😁15πŸ‘2
⚑ New Android exploit β€œPixnapping” steals 2FA codes via GPU side-channels.

β€” No special permissions
β€” Works across apps (Maps, Authenticator, etc.)
β€” Full 2FA capture in ~30s

Read the full story ↓ https://thehackernews.com/2025/10/new-pixnapping-android-flaw-lets-rogue.html
😱21😁5πŸ‘3πŸ€”2⚑1
🧩 AMD’s β€œsecure” virtualization can be broken with a single memory write.

A new flaw, RMPocalypse (CVE-2025-0033), lets attackers corrupt the Reverse Map Table and steal data from virtual machines β€” all through one 8-byte overwrite.

Read the details ↓ https://thehackernews.com/2025/10/rmpocalypse-single-8-byte-write.html
😁11πŸ€”7⚑1
πŸ€– AI lets attackers map your environment before sending a payload.

No exploits needed β€” your JS, APIs, and error logs are enough. Harmless data is now reconnaissance fuel.

See how it changes defense strategy ↓ https://thehackernews.com/2025/10/what-ai-reveals-about-web-applications.html
😁7😱5