The Hacker News
βœ”
155K subscribers
2.26K photos
13 videos
3 files
8.18K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
🚨 An 11-year-old critical flaw in GNU InetUtils telnetd lets attackers log in as root with no password.

Tracked as CVE-2026-24061 (CVSS 9.8), it affects all versions 1.9.3–2.7 due to an unsanitized USER environment value passed to login.

⚠️ Exploitation has already been observed in the wild.

πŸ”— Read β†’https://thehackernews.com/2026/01/critical-gnu-inetutils-telnetd-flaw.html
🀯18😱4πŸ”₯2⚑1😁1
⚠️ Osiris ransomware hit a major food service operator in Southeast Asia, researchers say.

The attack used a custom POORTRY driver to shut down security tools, then encrypted systems and exfiltrated data to cloud storage.

πŸ”— Details here β†’ https://thehackernews.com/2026/01/new-osiris-ransomware-emerges-as-new.html
😁12😱7⚑1πŸ”₯1
πŸ› οΈβš οΈ Attackers are abusing trusted IT tools, not deploying malware.

A new campaign steals email logins, then installs legitimate RMM software for silent, long-term access.
Because the tools are signed and allowed, many security controls don’t trigger.

πŸ”— Details β†’ https://thehackernews.com/2026/01/phishing-attack-uses-stolen-credentials.html
πŸ‘5😁3😱3⚑1
πŸ‡ΊπŸ‡Έ  TikTok confirmed a new U.S. joint venture to stay operational in the country.

ByteDance will reduce its stake to 19.9%, giving majority control to U.S. investors.

U.S. user data and algorithms will move to Oracle’s U.S. cloud with third-party security audits.

πŸ”— Read β†’ https://thehackernews.com/2026/01/tiktok-forms-us-joint-venture-to.html
πŸ‘9😱5πŸ€”3🀯1
🚨 Fortinet confirms active exploitation of CVE-2025-59718 / 59719, allowing FortiGate FortiCloud SSO bypass β€” even on fully patched devices.

Attackers abuse crafted SAML logins to gain admin access, add persistent accounts, enable VPN, and steal configs. Disabling FortiCloud SSO is advised.

πŸ”— Details β†’ https://thehackernews.com/2026/01/fortinet-confirms-active-forticloud-sso.html
πŸ‘8😱5⚑1
🚨 CISA added four exploited vulnerabilities to its KEV list, impacting Zimbra, Versa SD-WAN, Vite, and a compromised npm package linked to a supply-chain attack.

⏳ U.S. federal agencies must apply fixes by Feb 12 under BOD 22-01.

πŸ”— CVEs, fixes, and deadlines β†’ https://thehackernews.com/2026/01/cisa-updates-kev-catalog-with-four.html
πŸ”₯7πŸ‘3⚑1
🚨 CISA confirms active exploitation of a critical VMware vCenter Server flaw.

CVE-2024-37079 allows remote code execution via a DCE/RPC heap overflow if an attacker has network access.

πŸ”— Details β†’ https://thehackernews.com/2026/01/cisa-adds-actively-exploited-vmware.html
πŸ”₯10🀯6πŸ€”2
πŸ‡΅πŸ‡± Poland blocked what officials described as its strongest cyberattack on the energy sector in years.

ESET links it to Russia-aligned Sandworm, which used a new DynoWiper malware to target ⚑ power plants and renewable energy systems in late Dec 2025.

πŸ”—Details β†’ https://thehackernews.com/2026/01/new-dynowiper-malware-used-in-attempted.html
😁8πŸ‘7
πŸ€– AI agents now move faster than IAM can see.

Shared agents quietly gain broad, long-lived access across systems, often with no clear owner. That’s how access drift begins.

The risk isn’t stolen credsβ€”it’s valid access used in unsafe ways that never trigger alerts.

πŸ”— Read β†’ https://thehackernews.com/2026/01/who-approved-this-agent-rethinking.html
πŸ‘4⚑3
⚠️ Russian users hit by a new phishing chain delivering Amnesia RAT and ransomware.

Fake business docs and LNK files do the work β€” no exploits. Payloads are split across GitHub and Dropbox, then Microsoft Defender is disabled using defendnot.

πŸ”—Full attack chain and defenses β†’ https://thehackernews.com/2026/01/multi-stage-phishing-campaign-targets.html
πŸ”₯28🀯4😱3πŸ€”2⚑1😁1
πŸ§‘β€πŸ’» North Korea’s Konni group is using AI-assisted PowerShell malware to target blockchain developers.

Campaigns hit Japan, Australia, and India via Google ad–style phishing links that bypass filters and drop EndRAT.

πŸ”— Inside the full attack chain β†’ https://thehackernews.com/2026/01/konni-hackers-deploy-ai-generated.html
πŸ”₯9⚑5🀯4πŸ‘3πŸ‘1
πŸ›‘ Attackers now use πŸ€– AI to write, hide, and mutate malware in real time. Google and Anthropic confirm AI-orchestrated attacks running autonomously end to end.

They bypass EDR by looking normal on each endpoint. The tell is in network behavior.

πŸ”— How network signals expose what endpoints miss β†’ https://thehackernews.com/2026/01/winning-against-ai-based-attacks.html
⚑14😁4🀯3πŸ‘2
🚨 Two popular VS Code AI assistant extensions were caught spying on developers.

They looked normal but quietly sent opened files and code edits to servers in πŸ‡¨πŸ‡³ China.

Koi Security says 1.5M installs were exposed without consent.

πŸ”—Read β†’ https://thehackernews.com/2026/01/malicious-vs-code-ai-extensions-with-15.html
πŸ‘10😁5⚑4
🚨 Weekly Cybersecurity Recap

⚠️ Old flaws, new attacks
🧠 AI writing malware
🧩 Trusted software abused
⏱️ Exploits moving fast

πŸ” Read the full recap. Stay alert β†’ https://thehackernews.com/2026/01/weekly-recap-firewall-flaws-ai-built.html
πŸ‘5πŸ‘3
🚨 ALERT: Indian users are being hit by a cyber-espionage campaign posing as Income Tax emails.

Opening the attachment installs a stealth backdoor that disguises itself as Windows Explorer, bypasses UAC, and stays hidden.

πŸ”— Inside the attack chain and payloads β†’ https://thehackernews.com/2026/01/indian-users-targeted-in-tax-phishing.html
πŸ‘8😁8πŸ‘5
Google Project Zero revealed a working zero-click exploit chain against Pixel 9 phones.

A bug in the Dolby audio decoder let Google Messages process a malicious audio file in the background, gaining code execution, then a kernel bug completed the takeover. Pixel patches shipped in early Jan 2026.

πŸ”— Read β†’ https://thehackernews.com/2026/01/threatsday-bulletin-pixel-zero-click.html#zero-click-chain-hits-pixel
πŸ”₯19πŸ‘6
πŸ›‘ URGENT: Microsoft rushed out out-of-band fixes for an actively exploited Office zero-day.

CVE-2026-21509 (CVSS 7.8) lets attackers bypass Office security using a malicious file that must be opened by the victim.

πŸ”— Details β†’ https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
πŸ”₯14πŸ‘7🀯4⚑3😱1
⚠️ Most OT incidents don’t start in OT. They start with routine IT gaps reaching operations.

Sygnia found risk centered on remote access, management systems, identity, and recoveryβ€”not the process network. ~60% of OT access came via trusted management paths.

πŸ”— Why this pattern keeps repeating across industries β†’ https://thehackernews.com/expert-insights/2026/01/ot-security-in-practice-4-crossindustry.html
πŸ‘10⚑4
πŸ‡¨πŸ‡³ China-aligned APTs are using PeckBirdy, a JScript-based C2 framework active since 2023, to move quietly across browsers, Windows tools, and servers.

πŸ•΅οΈβ€β™‚οΈ It relies on LOLBins to deliver modular backdoors and steal data, leaving little trace on disk.

πŸ”— See how PeckBirdy works β†’ https://thehackernews.com/2026/01/china-linked-hackers-have-used.html
⚑11πŸ‘5🀯2
⚠️ A single spreadsheet formula can now lead to full server takeover in Grist-Core.

The flaw, CVE-2026-24002 (CVSS 9.1), breaks out of the Pyodide sandbox, letting attackers run OS commands and access files and secrets.

πŸ”— Read β†’ https://thehackernews.com/2026/01/critical-grist-core-vulnerability.html
πŸ”₯6⚑5
⚠️ Update: Alma Security calls CVE-2026-1245 ParserPoison.

binary-parser drops unvalidated field names and encodings into new Function(). Untrusted schemas = JavaScript execution.

πŸ”— How ParserPoison works under the hood β†’ https://thehackernews.com/2026/01/certcc-warns-binary-parser-bug-allows.html
πŸ”₯8⚑1