The Hacker News
βœ”
153K subscribers
2.02K photos
12 videos
3 files
7.94K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
🚨 AI tools are now running inside your browser β€” reading data, following hidden prompts, and moving info across tabs.

IT can’t see it. Security can’t stop it.

Seraphic Security’s Suresh Batchu calls this the next big blind spot: Shadow AI in the enterprise browser.

πŸ”— Read ↓ https://thehackernews.com/expert-insights/2025/12/shadow-ai-in-browser-next-enterprise.html
🀯13😁6πŸ€”3πŸ‘2
🚨 A fake Microsoft Teams installer is spreading malware in China.

Hackers called "Silver Fox" made it look like a Russian attack to hide their tracks.

It installs ValleyRAT, giving full remote access to victims.

πŸ”— Read: https://thehackernews.com/2025/12/silver-fox-uses-fake-microsoft-teams.html
😁14πŸ”₯12
⚠️ Hackers are exploiting a command injection bug in Array Networks AG Series gateways β€” active since August 2025.

It lets attackers run any command on systems using β€œDesktopDirect” remote access.

πŸ”— Details β†’ https://thehackernews.com/2025/12/jpcert-confirms-active-command.html
πŸ”₯9😁4πŸ‘3
🚨 CISA just warned about a new Chinese state-backed hack tool called BRICKSTORM β€” a backdoor found in VMware and Windows systems used by U.S. government and tech networks.

It can reinstall itself if removed, hide in normal traffic, and give hackers full remote control.

πŸ”—Read β†’ https://thehackernews.com/2025/12/cisa-reports-prc-hackers-using.html
🀯20πŸ”₯6πŸ‘3😁2
🚨 A lawyer in Pakistan was hacked with Predator β€” the first known spyware attack on a civil society member.

It started with a link on WhatsApp, but new leaks show Predator can also spread through ads β€” no click needed.

It can read chats, record audio, take photos β€” and Intellexa may still access customer systems remotely.

πŸ”— Read β†’ https://thehackernews.com/2025/12/intellexa-leaks-reveal-zero-days-and.html
😁9😱5πŸ”₯2πŸ‘1
⚠️ Within HOURS of disclosure, two China-linked hacking groups weaponized a critical React flaw (CVE-2025-55182).

They’re already scanning the web for unpatched apps.

Update to React 19.0.1+ now.

πŸ”— Read ↓ https://thehackernews.com/2025/12/chinese-hackers-have-started-exploiting.html
🀯7πŸ”₯4
🚨 Critical Apache Tika flaw (CVE-2025-66516) just dropped β€” CVSS 10.0.

A single fake PDF can trigger an XXE attack, letting hackers read server files or run code.

πŸ”— Read ↓ https://thehackernews.com/2025/12/critical-xxe-bug-cve-2025-66516-cvss.html

Update to v3.2.2 now.
πŸ”₯13πŸ€”5😱1
🧩 57% of SMBs say cybersecurity is a top priority β€” yet they still turn down MSPs.

➑ The issue isn’t interest. It’s confusion.
➑ They’re tired of jargon, fear, and hard selling.

β€œGetting to Yes” helps MSPs explain security in plain business terms β€” and win trust.

πŸ‘‰ See how it’s done β†’ https://thehackernews.com/2025/12/getting-to-yes-anti-sales-guide-for-msps.html
πŸ‘4
🚨 WARNING: A new attack can trick Perplexity’s Comet browser into deleting your Google Drive.

Just one normal-looking email with hidden cleanup instructions can make the AI agent erase real files β€” no exploit, no warning.

πŸ”— Details here β†’ https://thehackernews.com/2025/12/zero-click-agentic-browser-attack-can.html
🀯23😁14πŸ”₯8
CISA added the new 10.0-rated React RCE flaw (CVE-2025-55182) to its exploited list.

πŸ•’ Exploited within hours by Chinese hackers.
πŸ’₯ Affects Next.js, React Router, Vite, Waku & more.
πŸ’° Some attacks dropped crypto-miners & stole AWS creds.

πŸ”— Read: https://thehackernews.com/2025/12/critical-react2shell-flaw-added-to-cisa.html
πŸ”₯18πŸ‘11πŸ‘4😁4🀯2
πŸ›‘ Over 30 security flaws found in AI-powered coding tools like Copilot, Cursor, and Zed β€” letting hackers steal data or run malicious code without you doing a thing.

Researchers are calling it β€œIDEsaster.”

πŸ”— Details here β†’ https://thehackernews.com/2025/12/researchers-uncover-30-flaws-in-ai.html
😁32πŸ‘15🀯12πŸ”₯1
⚠️ Iran’s MuddyWater hackers are using a new backdoor called "UDPGangster" that hides in fake β€œelection seminar” Word files.

It only runs after checking if your computer is real β€” not a sandbox β€” then steals data over UDP to dodge detection.

πŸ”— Read β†’ https://thehackernews.com/2025/12/muddywater-deploys-udpgangster-backdoor.html
😁17πŸ”₯10🀯8⚑4πŸ‘4πŸ€”2
⚠️ Hackers are exploiting a bug in the Sneeit Framework plugin (CVE-2025-6389) to run code on servers and create admin accounts on WordPress sites.

⚠️ Separately, a flaw in ICTBroadcast (CVE-2025-2611) lets attackers use the BROADCAST cookie for unauthenticated remote shell access on exposed hosts.

πŸ”— Read ↓ https://thehackernews.com/2025/12/sneeit-wordpress-rce-exploited-in-wild.html
πŸ€”10πŸ‘3😱2
⚠️ Three new Android threats just dropped:

β€’ FvncBot – fake β€œmBank” app that logs keys, streams screens, and steals banking data.
β€’ SeedSnatcher – spreads via Telegram to steal crypto seed phrases and 2FA codes.
β€’ ClayRat – upgraded spyware faking YouTube & taxi apps for full device control.

All abuse Android’s accessibility features.

πŸ”— Read here ↓ https://thehackernews.com/2025/12/android-malware-fvncbot-seedsnatcher.html
πŸ”₯12πŸ‘4🀯4😁3πŸ‘2
⚠️ Holiday shopping means hacker season.

Bots hit hardest around Black Friday & Christmas.

Reused passwords = easy targets.

Block breached logins + secure vendor accounts now.

πŸ”— Read ↓ https://thehackernews.com/2025/12/how-can-retailers-cyber-prepare-for.html
⚑11
Catch the the latest CybersecurityRecap for:

πŸ’₯ USB drives spreading crypto miners.
πŸ’° Fake investment sites busted.
πŸ€ CastleRAT creeping through networks.
βš–οΈ Portugal shields ethical hackers.
πŸ’Έ Ransomware payouts falling fast.

πŸ‘‰ Get the full stories, latest tools, and expert webinars in the latest recap: https://thehackernews.com/2025/12/weekly-recap-usb-malware-react2shell.html
⚑6πŸ‘4πŸ”₯1😁1
⚠️ Hackers are hiding malware in normal websites.

A new attack called JS#SMUGGLER plants code that quietly runs PowerShell through mshta.exe to install NetSupport RAT β€” giving attackers full control of your computer.

It even checks your device type to avoid being caught.

πŸ”— Read ↓ https://thehackernews.com/2025/12/experts-confirm-jssmuggler-uses.html
πŸ€”16🀯10πŸ‘5πŸ”₯2😁2
⚠️ Researchers found malicious packages in VS Code, Go, npm, and Rust stealing developer data.

They mimicked themes, AI tools, and libraries to grab screenshots, Wi-Fi passwords, and browser cookies.

πŸ”— Find details here ↓ https://thehackernews.com/2025/12/researchers-find-malicious-vs-code-go.html
🀯16😁5πŸ€”4πŸ‘2πŸ”₯1
🚨 Hackers are uploading fake resumes on Indeed and JazzHR to breach Canadian companies.

80% of attacks in this campaign hit Canada.

The β€œPDFs” actually launch QWCrypt ransomware through a tool called RedLoader.

πŸ”— Read: https://thehackernews.com/2025/12/stac6565-targets-canada-in-80-of.html
😱12πŸ‘6😁5
πŸ”₯ You can win $20K for breaking Google’s new Chrome security feature.

Google just added the β€œUser Alignment Critic,” a safeguard that uses a second model to double-check Chrome’s AI agent and block prompt attacks or data leaks.

πŸ”— Read: https://thehackernews.com/2025/12/google-adds-layered-defenses-to-chrome.html
😁19πŸ”₯7πŸ€”7
πŸ’‘ Most Zero Trust tools still don’t talk to each other β€” so access decisions lag behind real risks.

A MongoDB engineer built a workflow using Tines that lets Kolide send real-time device alerts to Okta through the Shared Signals Framework.

Finally, Zero Trust that actually works in sync.

πŸ”— Read: https://thehackernews.com/2025/12/how-to-streamline-zero-trust-using.html
πŸ‘14