The Hacker News
βœ”
151K subscribers
1.85K photos
10 videos
3 files
7.77K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
🚨Billions lost. Operations frozen. Ransomware in 2025 is faster, smarter, and nearly unstoppable.

LockBit, Lazarus, and FunkLocker are already inside corporate networks worldwide.

Help your SOC detect threats early and respond with confidence ⬇️ https://thn.news/enterprise-defense
😁9πŸ”₯7πŸ‘2
⚠️ Security training β‰  security.

Training teaches people to see risk β€” threat hunting proves whether it still exists. Real security starts before the first alert.

πŸ” Don’t just educate. Learn how to validate ↓ https://thehackernews.com/2025/10/moving-beyond-awareness-how-threat.html
πŸ‘9πŸ”₯2
🚨 A Chinese APT hid inside ArcGIS for over a year.

They turned a legit Java extension into a web shell.

πŸ”‘ Added a hardcoded key β†’ exclusive access
πŸ’Ύ Hid it in backups β†’ survived restores

That’s what β€œliving off the land” really means ↓ https://thehackernews.com/2025/10/chinese-hackers-exploit-arcgis-server.html
πŸ”₯22🀯8😁1
⚠️ Heads-up! SAP just re-patched a critical CVSS 10.0 flaw (CVE-2025-42944) in NetWeaver AS Java β€” a deserialization bug that lets attackers execute commands without authentication.

Apply. The. Fix. β†’ https://thehackernews.com/2025/10/new-sap-netweaver-bug-lets-attackers.html
πŸ”₯13🀯2
πŸͺ A cookie that spawns a shell πŸ’€

A critical flaw (CVE-2025-2611, CVSS 9.3) in ICTBroadcast autodialer software is under active exploitation.

Attackers inject commands via the BROADCAST session cookie for unauthenticated remote code execution.

No patch yet β€” check your stack β†’ https://thehackernews.com/2025/10/hackers-target-ictbroadcast-servers-via.html

~200 servers are exposed.
😁15πŸ”₯7πŸ‘1
πŸ”₯ Agentic AI isn’t just automatingβ€”it’s thinking and acting.

Zscaler’s CEO says it’s a bigger shift than cloud or IoT.

The upside? Faster support and instant threat response.
The risk? Rogue AIs scanning your network right now.

Learn why Zero Trust isn’t optional anymore β†’ https://thehackernews.com/videos/2025/10/exploring-agentic-ai-innovation-meets.html
πŸ‘11πŸ€”2
βš™οΈ If you run industrial gear β€” check your Red Lion RTUs.

Two CVEs (both 10/10) let anyone pop root via one open port. Water, energy, transport β€” all at risk.

Patch ASAP. Details here β†’ https://thehackernews.com/2025/10/two-cvss-100-bugs-in-red-lion-rtus.html
😁11πŸ‘2
πŸ”΄ Microsoft just dropped fixes for 183 security flaws.

3 are already being exploited β€” including one buried in every Windows PC since XP.

...and at the same time, it is ending Windows 10 support (unless you pay).

Details + patch info ↓ https://thehackernews.com/2025/10/two-new-windows-zero-days-exploited-in.html
πŸ‘19πŸ”₯8😱6😁2
πŸ”₯ New free playbook from Pillar Security : a hands-on framework for red-teaming agentic AI systems.

Covers the AI Kill Chain, context engineering, and the CFS model for crafting and testing realistic attack simulations.

πŸ”— No sign-up required: https://thn.news/agentic-defend
πŸ”₯16πŸ‘6
🚨 Over 100 VS Code extensions leaked access tokens β€” letting attackers push malicious updates to 150,000+ installs.

A single exposed key could’ve weaponized the software supply chain.

Full story ↓ https://thehackernews.com/2025/10/over-100-vs-code-extensions-exposed.html
😁13😱7πŸ”₯3
πŸ‘€ F5 just confirmed a nation-state breach that went undetected for months.

Hackers stole BIG-IP source code and data on undisclosed vulnerabilities.

Full story ↓ https://thehackernews.com/2025/10/f5-breach-exposes-big-ip-source-code.html
😱19😁10πŸ”₯3πŸ€”3πŸ‘2πŸ‘1
🚨 China-linked β€œJewelbug” hackers quietly lived inside a Russian IT provider for 5 months.

They used Microsoft’s own debugger to slip past defenses β€” and exfiltrated data to Yandex Cloud.

Full story ↓ https://thehackernews.com/2025/10/chinese-threat-group-jewelbug-quietly.html
πŸ”₯22😁7
🚨 CISA just flagged a 10.0-severity flaw in Adobe Experience Manager.

A single debug page can open the door to remote code execution β€” no login required.

Attackers are already exploiting it, and many orgs still haven’t patched.

Details ↓ https://thehackernews.com/2025/10/cisa-flags-adobe-aem-flaw-with-perfect.html
πŸ”₯14
This week in ThreatsDay:

⚑ $15B crypto empire seized
πŸ”­ Satellites leaking private calls
πŸ’¬ MFA phishing kits evolving fast
πŸ“‘ Cloud tools turned into covert C2

Read the full bulletin β†’ https://thehackernews.com/2025/10/threatsday-bulletin-15b-crypto-bust.html
πŸ”₯6😁3πŸ€”1
πŸ” Pen tests are meant to protect you. But the classic approach might be costing πŸ’Έ you instead.

Admin overheads. Scope creep. Endless retests.

Here’s why traditional pen testing drains time and budget β€” and how PTaaS fixes it ↓ https://thehackernews.com/2025/10/beware-hidden-costs-of-pen-testing.html
πŸ”₯6πŸ€”2😁1
🚨 Hackers just turned a Cisco zero-day (CVE-2025-20352) into a Linux rootkit dropperβ€”hitting routers before the patch dropped.

The backdoor’s universal password was β€œdisco.”

Learn more about the Operation Zero Disco ↓ https://thehackernews.com/2025/10/hackers-deploy-linux-rootkits-via-cisco.html
😁18😱6⚑2πŸ‘1
Security teams are overwhelmed β€” 960+ alerts a day, and 40% go unchecked.

The real danger? Some of those missed alerts are actual breaches.

AI-SOCs promise to handle every alert automatically β€” but not all AI delivers.

Here’s how to tell what’s real vs. hype ↓ https://thehackernews.com/2025/10/architectures-risks-and-adoption-how-to.html
πŸ”₯5πŸ€”1
Researchers uncovered "LinkPro," a Golang-based Linux rootkit that uses eBPF to hide processes and activate remotely via a secret β€œmagic packet.”

It spread through a malicious Docker image deployed on vulnerable Jenkins servers.

Full report ↓ https://thehackernews.com/2025/10/linkpro-linux-rootkit-uses-ebpf-to-hide.html
πŸ”₯9⚑4😱2
πŸ”΄ Hackers are hiding malware inside blockchain smart contracts.

They’re pushing stealers like Atomic & Lumma from hacked WordPress sites β€” updating payloads without ever touching them.

Google found 14,000+ infected pages.

Details here β†’ https://thehackernews.com/2025/10/hackers-abuse-blockchain-smart.html
πŸ”₯15
⚑ North Korean hackers just used the blockchain to hide malware β€” the first time ever seen.

Google says they used EtherHiding to plant code inside smart contracts, making it nearly impossible to remove and easy to update for just $1.37 in gas fees.

Full story ↓ https://thehackernews.com/2025/10/north-korean-hackers-use-etherhiding-to.html
πŸ”₯19😁3
Get an inside look at Georgetown's Cybersecurity Master's program. Register for the virtual sample class on October 29.

Attend here β†’ https://thn.news/georgetown-cyber-class
πŸ‘5πŸ”₯3