The Hacker News
โœ”
151K subscribers
1.77K photos
9 videos
3 files
7.68K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: admin@thehackernews.com

๐ŸŒ Website: https://thehackernews.com
Download Telegram
โš ๏ธ 7 out of 10 threats faced by SOCs begin with phishing.

Phishkits dominate the threat landscape and become increasingly harder to detect.

Act now to set up strong defenses with fresh, actionable intel from 15K orgs โคต๏ธ https://thn.news/threat-intel-tg
๐Ÿ‘7๐Ÿ‘2๐Ÿค”2
โš ๏ธ Your AppSec blind spots are costing you.

The gap between code and cloud runtime drives 90% of delayed fixesโ€”and missed accountability.

Map vulnerabilities, misconfigs, and secrets across your pipeline to regain control.

Cut the noise. Reduce risk. Start now โ†“ https://thehacker.news/code-to-cloud-appsec
๐Ÿค”6
๐Ÿ”ฅ Your Cisco, ASUS, QNAP, or Synology router might secretly be part of a botnet.

A new threat called PolarEdge is hiding inside routers, turning them into undetectable spies using a secret TLS server and a hidden config file.

Exploit chain, IOCs & decryption trick โ†“ https://thehackernews.com/2025/10/polaredge-targets-cisco-asus-qnap.html
๐Ÿ‘8๐Ÿ”ฅ2๐Ÿค”2
Meta just rolled out new anti-scam tools for WhatsApp & Messenger.

โš ๏ธ Screen-share warnings
๐Ÿค– AI scam detection
๐Ÿšจ Instant alerts

... but one setting quietly breaks ๐Ÿ” encryption.

Learn more โ†“ https://thehackernews.com/2025/10/meta-rolls-out-new-tools-to-protect.html
๐Ÿ‘11๐Ÿ˜ฑ5๐Ÿ˜4๐Ÿ”ฅ3
Every new AI tool in your SOC adds another way in for attackers.

The defender might now be the weak spot.

AI agents are making decisions on their own โ€” and trust just became an identity problem.

Learn how to secure them before someone else does โ†’ https://thehackernews.com/2025/10/securing-ai-to-benefit-from-ai.html
๐Ÿ‘10๐Ÿ˜7๐Ÿ”ฅ2
๐Ÿšจ TP-Linkโ€™s Omada gateways just got hit with four major security flaws โ€” two can let hackers run commands without logging in.

A remote attacker could take full control โ€” no password needed.

Patch now. Details โ†“ https://thehackernews.com/2025/10/tp-link-patches-four-omada-gateway.html
๐Ÿ‘13๐Ÿคฏ6๐Ÿ”ฅ1
A tiny Rust bug just broke thousands of builds.

Itโ€™s called TARmageddon (CVE-2025-62518) โ€” a flaw in the async-tar library that lets attackers slip hidden files inside nested TAR archives.

Unpatched since 2023, developers are now racing to fix it โ†“ https://thehackernews.com/2025/10/tarmageddon-flaw-in-async-tar-rust.html
๐Ÿ˜16๐Ÿ”ฅ1๐Ÿค”1
๐Ÿšจ PassiveNeuron is still active.

Hackers are breaking in through Microsoft SQL servers, planting custom malware (Neursite & NeuralExecutor), and even using GitHub to hide their command servers โ€” a rare move in state-level spying.

Full story โ†’ https://thehackernews.com/2025/10/researchers-identify-passiveneuron-apt.html
๐Ÿ”ฅ14๐Ÿ˜2
๐Ÿค– Nearly 40% of alerts still go unseen.

AI-SOCs now handle triage, cut false positives, and alert teams with full context. But as Shahar Ben-Hador explains โ€” outsource or not, you still own the breach.

$30K vs $100K+โ€ฆ hereโ€™s who should switch โ†“ https://thehackernews.com/expert-insights/2025/10/what-happens-to-mssps-and-mdrs-in-age.html
๐Ÿ‘4๐Ÿ”ฅ2
๐Ÿ”’ 8-character passwords are dead.
๐Ÿ’€ Hackers crack โ€œP@ssw0rd!โ€ in months.
๐Ÿ”ก The fix isnโ€™t symbols โ€” itโ€™s length.

16 simple letters beat any complex mix.
Use words, not symbols.

Why your policy still fails โ†“ https://thehackernews.com/2025/10/why-you-should-swap-passwords-for.html
๐Ÿ”ฅ21๐Ÿ‘8๐Ÿค”3
Hackers linked to China exploited a โ€œpatchedโ€ Microsoft SharePoint flaw to break into networks across four continents.

It wasnโ€™t just spying โ€” they found a way to bypass the patch that fixed a previous bypass.

Symantec warns the campaign is still spreading.

Read โ†’ https://thehackernews.com/2025/10/chinese-threat-actors-exploit-toolshell.html
๐Ÿคฏ16๐Ÿ”ฅ8๐Ÿ˜1
Your cloud might flag the same issue across five tools โ€” XDR, CSPM, SIEM, CMDB, and more.

Each reports it differently. None resolve it.

Thatโ€™s the real challenge: detection is easy; remediation isnโ€™t.

Learn how Pentera Resolve turns alerts into action โ†’ https://thehackernews.com/2025/10/bridging-remediation-gap-introducing.html
๐Ÿ‘5๐Ÿ”ฅ1
Which Industries Are Most at Risk for DDoS Attacks?

While DDoS attacks can hit any organization, some industries face far higher riskโ€”and potentially greater impact when they do.

The latest DDoS Resiliency Score (DRS) report ranks the industries most frequently targeted and explains why.

Here's the list of the highest risk sectors. For the full list of industries, see here - https://thn.news/ddos-risk-map

Highest-risk sectors:
๐Ÿ’ฐ Financial Services โ€“ Targets of hacktivism and extortion-driven outages.
โšก Energy โ€“ At risk from politically or state-backed disruptions.
๐Ÿ›๏ธ Government โ€“ Frequent hacktivist targets, especially around elections.
๐ŸŒ Telecom โ€“ Increasingly hit by ransom-based attacks.
๐ŸŽฎ Gaming & Gambling โ€“ Vulnerable to extortion and competitive disruption.
๐Ÿ’ป SaaS & Software โ€“ Susceptible to DDoS that erodes customer trust.
๐Ÿ”ฅ10โšก4
๐Ÿšจ Developers, check your NuGet packages.

A fake NuGet package โ€œNetherะตum.Allโ€ โ€” spelled with a Cyrillic โ€˜eโ€™ โ€” was stealing wallet keys from Ethereum .NET projects.

It even faked 11.7M downloads to look real.

Full story โ†“ https://thehackernews.com/2025/10/fake-nethereum-nuget-package-used.html
๐Ÿคฏ8โšก2๐Ÿ”ฅ2
๐Ÿ”ด A fake โ€œZoom meetingโ€ from Ukraineโ€™s Presidentโ€™s Office just hacked aid workers. The CAPTCHA wasnโ€™t real โ€” it opened a live remote shell through WebSocket.

A one-day domain. Six months of setup. Russian servers behind it.

The trojanโ€™s still active โ†“ https://thehackernews.com/2025/10/ukraine-aid-groups-targeted-through.html
๐Ÿคฏ17๐Ÿ˜7๐Ÿ”ฅ6
โš ๏ธ An Iranian hacking group used a real email account to plant a new backdoor in 100+ Middle East government networks.

They sent it through real diplomatic inboxes โ€” and it worked.

Read โ†“ https://thehackernews.com/2025/10/iran-linked-muddywater-targets-100.html
๐Ÿ”ฅ26๐Ÿคฏ8๐Ÿ˜ฑ6โšก3๐Ÿ˜2๐Ÿ‘1
๐Ÿšจ CISA just warned about a critical bug in Motex Lanscope (CVE-2025-61932).

Hackers can take control of systems by sending one malicious packet.

Itโ€™s already being used in real attacks.

Fix it before Nov 12 โ†“ https://thehackernews.com/2025/10/critical-lanscope-endpoint-manager-bug.html
๐Ÿ”ฅ5
๐Ÿšจ New Adobe Commerce flaw (CVE-2025-54236, CVSS 9.1) under active attack.

Over 250 exploit attempts in 24 hoursโ€”mostly on unpatched Magento sites.

PoC is public. Patch now.

Details โ†’ https://thehackernews.com/2025/10/over-250-magento-stores-hit-overnight.html
๐Ÿ”ฅ5
๐ŸŽ Hackers found a new jackpot โ€” cloud gift cards.

A group called Jingle Thief broke into retail cloud systems and quietly issued fake gift cards for months, hiding inside Microsoft 365 accounts.

Full story โ†“ https://thehackernews.com/2025/10/jingle-thief-hackers-exploit-cloud.html
๐Ÿ˜23๐Ÿคฏ1๐Ÿ˜ฑ1
In this 20-minute session, learn how to harden your images, secure dependencies, and lock down your CI/CD pipeline against real-world supply chain attacks.

๐Ÿ“… Tuesday, Oct 28 | 8 AM PST | 11 AM EST

๐ŸŽฅ Register Now โ†“ https://thn.news/secure-stack-webinar
๐Ÿ”ฅ7
๐Ÿšจ Static secrets are fading fast.

Teams using managed identities cut 95% of credential hassleโ€”yet hidden API keys still lurk in legacy systems.

The fix? Run NHI discovery to find every key, then migrate 70โ€“80% to managed identities.

Your roadmap โ†“ https://thehackernews.com/2025/10/why-organizations-are-abandoning-static.html
๐Ÿ‘7