The Hacker News
βœ”
155K subscribers
2.26K photos
13 videos
3 files
8.18K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
🚨 Anthropic’s official Git MCP server had three vulnerabilities enabling file read/delete and potential RCE.

Researchers showed prompt injectionβ€”via AI-read contentβ€”can trigger the chain without direct system access.

πŸ”— Exploit chain and CVEs β†’ https://thehackernews.com/2026/01/three-flaws-in-anthropic-mcp-git-server.html
😁7⚑4
Cybersecurity in 2026 isn't a knowledge problem. It's an execution problem. πŸ“‰

The big 3:
β€’ AI-driven attacks
β€’ Shadow agents
β€’ Identity abuse

Stop reading, start executing!

Full Forecast: https://thn.news/tech-security-outlook
πŸ”₯15🀯3⚑2πŸ‘2πŸ‘2
πŸ‡°πŸ‡΅ North Korea–linked actors are luring developers with fake job repos.

Simply opening a malicious VS Code project can auto-run hidden tasks that fetch JavaScript from Vercel and deploy a backdoor enabling remote code execution.

πŸ”— Learn how it works β†’ https://thehackernews.com/2026/01/north-korea-linked-hackers-target.html
πŸ”₯12πŸ‘8😁7
🚨 npm binary-parser flaw enables arbitrary JavaScript execution in some Node.js apps.

Affects versions < 2.3.0 and only hits apps that build parsers from untrusted input via dynamic code generation.

πŸ”— Exploit path explained β†’ https://thehackernews.com/2026/01/certcc-warns-binary-parser-bug-allows.html
πŸ‘8πŸ‘3
🚨 LastPass is warning users about an active phishing campaign.

Fake β€œmaintenance” emails create 24-hour urgency and redirect victims to spoofed LastPass sites designed to steal master passwords.

πŸ”— How the scam works and how to spot it β†’ https://thehackernews.com/2026/01/lastpass-warns-of-fake-maintenance.html
πŸ‘10
πŸ” Containers now power core production systems, but security is lagging behind.

ActiveState data shows 82% of orgs suffered a container breach last yearβ€”and many leaders now treat incidents as expected, not preventable.

πŸ”— Why container security is becoming β€œinevitable” β†’ https://thehackernews.com/expert-insights/2026/01/the-great-container-disconnect-security.html
πŸ‘5
πŸ€–βš οΈ One developer. 88,000+ lines of code.

Researchers say an advanced Linux malware framework was built in weeks with AI help, guided by a single skilled developer using an AI agentβ€”resetting expectations for what one actor can build.

πŸ”— Read β†’ https://thehackernews.com/2026/01/voidlink-linux-malware-framework-built.html
πŸ”₯12😱4😁2
🚨 Security researchers found two high-severity flaws in Chainlit, an open-source AI chatbot framework.

The bugs enable file reads and SSRF, exposing API keys and internal data and enabling lateral movement. Fixed in v2.9.4.

πŸ”— Read β†’ https://thehackernews.com/2026/01/chainlit-ai-framework-flaws-enable-data.html
😁8πŸ‘4πŸ”₯4
πŸ›‘οΈ Security teams don’t fail by missing bugs. They fail by fixing the wrong ones.

Gartner’s EAP category shifts focus from CVE volume to real attack paths across cloud and identity. Most alerts never reach critical assets. EAPs show what actually matters.

πŸ”— Read β†’ https://thehackernews.com/2026/01/exposure-assessment-platforms-signal.html
πŸ‘7
πŸ›‘ RCE flaws found in widely used AI Python libraries.

Researchers report bugs in Apple FlexTok, NVIDIA NeMo, and Salesforce Uni2TS that trigger when malicious model metadata is loaded.

These tools power popular AI models. Patches are out, no active exploitation seen yet.

πŸ”— Read β†’ https://thehackernews.com/2026/01/threatsday-bulletin-ai-voice-cloning.html#rce-via-ai-libraries
😱7πŸ”₯5
Static pentest reports create unnecessary delays.

Today’s security teams need real-time visibility, automated handoffs, and continuous workflows. Not PDFs that stall remediation.

This step-by-step guide explains how automation modernizes pentest delivery so findings move from discovery to remediation immediately.

Download the guide πŸ‘‰ https://thn.news/pentest-delivery-guide
😁6πŸ‘5
πŸ”” Webinar Alert! MSSPs aren’t losing in 2026 because they’re small. They’re losing because delivery doesn’t scale.

This live webinar breaks down how AI removes manual assessments and reporting β€” so you can deliver CISO-level security without hiring more analysts.

See the exact operating model top MSSPs are using to protect margins.

πŸ”— Save your seat before it fills β†’ https://thehackernews.com/2026/01/webinar-how-smart-mssps-using-ai-to.html
πŸ‘7πŸ‘1
🚨 Zoom and GitLab shipped urgent security fixes.

➀ Zoom patched a critical RCE (CVSS 9.9) in Node MMRs that could let a meeting participant run code.

➀ GitLab fixed high-severity bugs enabling unauthenticated DoS and a 2FA bypass.

πŸ”— Details on affected versions and patches β†’ https://thehackernews.com/2026/01/zoom-and-gitlab-release-security.html
πŸ”₯13😁3
πŸ§‘β€πŸ’» North Korean actors behind the Contagious Interview campaign targeted 3,136 IPs, researchers say.

The activity hit AI, crypto, finance, and software firms across Europe, Asia, and the Middle East.

πŸ’Ό Hiring processes were the entry point.

πŸ”— Learn more β†’ https://thehackernews.com/2026/01/north-korean-purplebravo-campaign.html
πŸ‘9😁7
🚨 Cisco fixed an actively exploited zero-day in its voice and collaboration stack.

CVE-2026-20045 allows unauthenticated attackers to run commands and escalate to root on exposed Unified CM and Webex Calling systems.

πŸ”—Details β†’ https://thehackernews.com/2026/01/cisco-fixes-actively-exploited-zero-day.html
πŸ”₯9πŸ€”7πŸ‘4πŸ‘2⚑1
🚨 Fortinet FortiGate under automated SSO abuse.

Attackers exploit CVE-2025-59718/59719 to add admin users, enable VPN access, and export firewall configs within seconds, per Arctic Wolf.

πŸ”— Learn what’s happening and what to disable β†’ https://thehackernews.com/2026/01/automated-fortigate-attacks-exploit.html
πŸ€”8⚑5πŸ‘4
Model Context Protocol (MCP) connects AI models directly to live enterprise systems.

One compromised MCP server can expose data, tokens, and APIs at scale.

Most existing security tools have little to no visibility into this layer.

πŸ”— MCP risks and why they matter β†’ https://thehackernews.com/expert-insights/2026/01/do-you-really-know-your-ai-landscape.html
πŸ”₯9⚑5😁2
🚨 SmarterMail flaw is under active attack within 48 hours of patching.

The bug lets attackers bypass auth, reset the admin password, then abuse built-in admin features to run OS commands as SYSTEM.

Activity points to patch reverse-engineering.

πŸ”— Details β†’ https://thehackernews.com/2026/01/smartermail-auth-bypass-exploited-in.html
πŸ‘8😁4😱3⚑1
🚨 Fake SymPy on PyPI is targeting Linux devs. The package sympy-dev clones the real project text, poses as a dev build, and has 1,100+ downloads since Jan 17.

It activates only when certain math functions run, then loads an XMRig miner fully in memory to avoid traces.

πŸ”— Learn how the loader works β†’ https://thehackernews.com/2026/01/malicious-pypi-package-impersonates.html
🀯7⚑1
Learn cybersecurity risk management from the experts at Georgetown. Attend our webinar on TBD.

Sign up - https://thn.news/risk-mgmt-insight
πŸ‘6
βš οΈπŸ“§ Email is still the easiest way in.

In Google Workspace, BEC attacks often carry no links or malware, so native defenses miss them. One compromised inbox can expose years of sensitive email and files.

Hardening helps, but blind spots remain.

πŸ”— Gmail limits, real attack paths β†’ https://thehackernews.com/2026/01/filling-most-common-gaps-in-google.html
😁8