The Hacker News
βœ”
155K subscribers
2.26K photos
13 videos
3 files
8.18K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
🚨 Zoom and GitLab shipped urgent security fixes.

➀ Zoom patched a critical RCE (CVSS 9.9) in Node MMRs that could let a meeting participant run code.

➀ GitLab fixed high-severity bugs enabling unauthenticated DoS and a 2FA bypass.

πŸ”— Details on affected versions and patches β†’ https://thehackernews.com/2026/01/zoom-and-gitlab-release-security.html
πŸ”₯12😁3
πŸ§‘β€πŸ’» North Korean actors behind the Contagious Interview campaign targeted 3,136 IPs, researchers say.

The activity hit AI, crypto, finance, and software firms across Europe, Asia, and the Middle East.

πŸ’Ό Hiring processes were the entry point.

πŸ”— Learn more β†’ https://thehackernews.com/2026/01/north-korean-purplebravo-campaign.html
πŸ‘9😁7
🚨 Cisco fixed an actively exploited zero-day in its voice and collaboration stack.

CVE-2026-20045 allows unauthenticated attackers to run commands and escalate to root on exposed Unified CM and Webex Calling systems.

πŸ”—Details β†’ https://thehackernews.com/2026/01/cisco-fixes-actively-exploited-zero-day.html
πŸ”₯9πŸ€”7πŸ‘4πŸ‘2⚑1
🚨 Fortinet FortiGate under automated SSO abuse.

Attackers exploit CVE-2025-59718/59719 to add admin users, enable VPN access, and export firewall configs within seconds, per Arctic Wolf.

πŸ”— Learn what’s happening and what to disable β†’ https://thehackernews.com/2026/01/automated-fortigate-attacks-exploit.html
πŸ€”8⚑5πŸ‘4
Model Context Protocol (MCP) connects AI models directly to live enterprise systems.

One compromised MCP server can expose data, tokens, and APIs at scale.

Most existing security tools have little to no visibility into this layer.

πŸ”— MCP risks and why they matter β†’ https://thehackernews.com/expert-insights/2026/01/do-you-really-know-your-ai-landscape.html
πŸ”₯9⚑5😁2
🚨 SmarterMail flaw is under active attack within 48 hours of patching.

The bug lets attackers bypass auth, reset the admin password, then abuse built-in admin features to run OS commands as SYSTEM.

Activity points to patch reverse-engineering.

πŸ”— Details β†’ https://thehackernews.com/2026/01/smartermail-auth-bypass-exploited-in.html
πŸ‘8😁4😱3⚑1
🚨 Fake SymPy on PyPI is targeting Linux devs. The package sympy-dev clones the real project text, poses as a dev build, and has 1,100+ downloads since Jan 17.

It activates only when certain math functions run, then loads an XMRig miner fully in memory to avoid traces.

πŸ”— Learn how the loader works β†’ https://thehackernews.com/2026/01/malicious-pypi-package-impersonates.html
🀯7⚑1
Learn cybersecurity risk management from the experts at Georgetown. Attend our webinar on TBD.

Sign up - https://thn.news/risk-mgmt-insight
πŸ‘6
βš οΈπŸ“§ Email is still the easiest way in.

In Google Workspace, BEC attacks often carry no links or malware, so native defenses miss them. One compromised inbox can expose years of sensitive email and files.

Hardening helps, but blind spots remain.

πŸ”— Gmail limits, real attack paths β†’ https://thehackernews.com/2026/01/filling-most-common-gaps-in-google.html
😁8
Behind every bar in this report is time won, money saved, or risk stopped.

@anyrun_app helps businesses boost DR by 36% & reduce MTTR by 21 minutes with better attack visibility for SOC & MSSP teams.

See how it can support your org in 2026 πŸ‘‰ https://thn.news/threat-intel-hub
πŸ”₯8
πŸ”₯ ThreatsDay Bulletin β€” Get this week’s active threat landscape...

πŸ”“ Zero-click Pixel exploit
🧱 EU moves to lock down the tech supply chain
πŸ•·οΈ Mass WordPress plugin reconnaissance
πŸ“’ Malvertising β†’ infostealers & RATs
🧾 Fake invoices, loans, and proxyware abuse
🌐 18,000+ active C2 servers exposed
πŸ’Έ Crypto scams racing past $17B
🏧 ATM malware ring dismantled

πŸ”— Read all 20 updates β†’ https://thehackernews.com/2026/01/threatsday-bulletin-pixel-zero-click.html
πŸ‘4πŸ€”4⚑2πŸ‘2
🚨 An 11-year-old critical flaw in GNU InetUtils telnetd lets attackers log in as root with no password.

Tracked as CVE-2026-24061 (CVSS 9.8), it affects all versions 1.9.3–2.7 due to an unsanitized USER environment value passed to login.

⚠️ Exploitation has already been observed in the wild.

πŸ”— Read β†’https://thehackernews.com/2026/01/critical-gnu-inetutils-telnetd-flaw.html
🀯18😱4πŸ”₯2⚑1😁1
⚠️ Osiris ransomware hit a major food service operator in Southeast Asia, researchers say.

The attack used a custom POORTRY driver to shut down security tools, then encrypted systems and exfiltrated data to cloud storage.

πŸ”— Details here β†’ https://thehackernews.com/2026/01/new-osiris-ransomware-emerges-as-new.html
😁12😱7πŸ”₯2⚑1
πŸ› οΈβš οΈ Attackers are abusing trusted IT tools, not deploying malware.

A new campaign steals email logins, then installs legitimate RMM software for silent, long-term access.
Because the tools are signed and allowed, many security controls don’t trigger.

πŸ”— Details β†’ https://thehackernews.com/2026/01/phishing-attack-uses-stolen-credentials.html
πŸ‘5😁3😱3⚑2
πŸ‡ΊπŸ‡Έ  TikTok confirmed a new U.S. joint venture to stay operational in the country.

ByteDance will reduce its stake to 19.9%, giving majority control to U.S. investors.

U.S. user data and algorithms will move to Oracle’s U.S. cloud with third-party security audits.

πŸ”— Read β†’ https://thehackernews.com/2026/01/tiktok-forms-us-joint-venture-to.html
πŸ‘9😱5πŸ€”3🀯1
🚨 Fortinet confirms active exploitation of CVE-2025-59718 / 59719, allowing FortiGate FortiCloud SSO bypass β€” even on fully patched devices.

Attackers abuse crafted SAML logins to gain admin access, add persistent accounts, enable VPN, and steal configs. Disabling FortiCloud SSO is advised.

πŸ”— Details β†’ https://thehackernews.com/2026/01/fortinet-confirms-active-forticloud-sso.html
πŸ‘8😱5⚑1
🚨 CISA added four exploited vulnerabilities to its KEV list, impacting Zimbra, Versa SD-WAN, Vite, and a compromised npm package linked to a supply-chain attack.

⏳ U.S. federal agencies must apply fixes by Feb 12 under BOD 22-01.

πŸ”— CVEs, fixes, and deadlines β†’ https://thehackernews.com/2026/01/cisa-updates-kev-catalog-with-four.html
πŸ”₯7πŸ‘3⚑1