The Hacker News
โœ”
155K subscribers
2.26K photos
13 videos
3 files
8.18K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: admin@thehackernews.com

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿ› ๏ธโš ๏ธ Attackers are abusing trusted IT tools, not deploying malware.

A new campaign steals email logins, then installs legitimate RMM software for silent, long-term access.
Because the tools are signed and allowed, many security controls donโ€™t trigger.

๐Ÿ”— Details โ†’ https://thehackernews.com/2026/01/phishing-attack-uses-stolen-credentials.html
๐Ÿ‘5๐Ÿ˜3๐Ÿ˜ฑ3โšก1
๐Ÿ‡บ๐Ÿ‡ธ  TikTok confirmed a new U.S. joint venture to stay operational in the country.

ByteDance will reduce its stake to 19.9%, giving majority control to U.S. investors.

U.S. user data and algorithms will move to Oracleโ€™s U.S. cloud with third-party security audits.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/tiktok-forms-us-joint-venture-to.html
๐Ÿ‘9๐Ÿ˜ฑ5๐Ÿค”3๐Ÿคฏ1
๐Ÿšจ Fortinet confirms active exploitation of CVE-2025-59718 / 59719, allowing FortiGate FortiCloud SSO bypass โ€” even on fully patched devices.

Attackers abuse crafted SAML logins to gain admin access, add persistent accounts, enable VPN, and steal configs. Disabling FortiCloud SSO is advised.

๐Ÿ”— Details โ†’ https://thehackernews.com/2026/01/fortinet-confirms-active-forticloud-sso.html
๐Ÿ‘8๐Ÿ˜ฑ5โšก1
๐Ÿšจ CISA added four exploited vulnerabilities to its KEV list, impacting Zimbra, Versa SD-WAN, Vite, and a compromised npm package linked to a supply-chain attack.

โณ U.S. federal agencies must apply fixes by Feb 12 under BOD 22-01.

๐Ÿ”— CVEs, fixes, and deadlines โ†’ https://thehackernews.com/2026/01/cisa-updates-kev-catalog-with-four.html
๐Ÿ”ฅ7๐Ÿ‘3โšก1
๐Ÿšจ CISA confirms active exploitation of a critical VMware vCenter Server flaw.

CVE-2024-37079 allows remote code execution via a DCE/RPC heap overflow if an attacker has network access.

๐Ÿ”— Details โ†’ https://thehackernews.com/2026/01/cisa-adds-actively-exploited-vmware.html
๐Ÿ”ฅ10๐Ÿคฏ6๐Ÿค”2
๐Ÿ‡ต๐Ÿ‡ฑ Poland blocked what officials described as its strongest cyberattack on the energy sector in years.

ESET links it to Russia-aligned Sandworm, which used a new DynoWiper malware to target โšก power plants and renewable energy systems in late Dec 2025.

๐Ÿ”—Details โ†’ https://thehackernews.com/2026/01/new-dynowiper-malware-used-in-attempted.html
๐Ÿ˜8๐Ÿ‘7
๐Ÿค– AI agents now move faster than IAM can see.

Shared agents quietly gain broad, long-lived access across systems, often with no clear owner. Thatโ€™s how access drift begins.

The risk isnโ€™t stolen credsโ€”itโ€™s valid access used in unsafe ways that never trigger alerts.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/who-approved-this-agent-rethinking.html
๐Ÿ‘4โšก3
โš ๏ธ Russian users hit by a new phishing chain delivering Amnesia RAT and ransomware.

Fake business docs and LNK files do the work โ€” no exploits. Payloads are split across GitHub and Dropbox, then Microsoft Defender is disabled using defendnot.

๐Ÿ”—Full attack chain and defenses โ†’ https://thehackernews.com/2026/01/multi-stage-phishing-campaign-targets.html
๐Ÿ”ฅ28๐Ÿคฏ4๐Ÿ˜ฑ3๐Ÿค”2โšก1๐Ÿ˜1
๐Ÿง‘โ€๐Ÿ’ป North Koreaโ€™s Konni group is using AI-assisted PowerShell malware to target blockchain developers.

Campaigns hit Japan, Australia, and India via Google adโ€“style phishing links that bypass filters and drop EndRAT.

๐Ÿ”— Inside the full attack chain โ†’ https://thehackernews.com/2026/01/konni-hackers-deploy-ai-generated.html
๐Ÿ”ฅ9โšก5๐Ÿคฏ4๐Ÿ‘3๐Ÿ‘2
๐Ÿ›‘ Attackers now use ๐Ÿค– AI to write, hide, and mutate malware in real time. Google and Anthropic confirm AI-orchestrated attacks running autonomously end to end.

They bypass EDR by looking normal on each endpoint. The tell is in network behavior.

๐Ÿ”— How network signals expose what endpoints miss โ†’ https://thehackernews.com/2026/01/winning-against-ai-based-attacks.html
โšก15๐Ÿ˜4๐Ÿ‘3๐Ÿคฏ3
๐Ÿšจ Two popular VS Code AI assistant extensions were caught spying on developers.

They looked normal but quietly sent opened files and code edits to servers in ๐Ÿ‡จ๐Ÿ‡ณ China.

Koi Security says 1.5M installs were exposed without consent.

๐Ÿ”—Read โ†’ https://thehackernews.com/2026/01/malicious-vs-code-ai-extensions-with-15.html
๐Ÿ‘10๐Ÿ˜6โšก4
๐Ÿšจ Weekly Cybersecurity Recap

โš ๏ธ Old flaws, new attacks
๐Ÿง  AI writing malware
๐Ÿงฉ Trusted software abused
โฑ๏ธ Exploits moving fast

๐Ÿ” Read the full recap. Stay alert โ†’ https://thehackernews.com/2026/01/weekly-recap-firewall-flaws-ai-built.html
๐Ÿ‘5๐Ÿ‘3
๐Ÿšจ ALERT: Indian users are being hit by a cyber-espionage campaign posing as Income Tax emails.

Opening the attachment installs a stealth backdoor that disguises itself as Windows Explorer, bypasses UAC, and stays hidden.

๐Ÿ”— Inside the attack chain and payloads โ†’ https://thehackernews.com/2026/01/indian-users-targeted-in-tax-phishing.html
๐Ÿ‘8๐Ÿ˜8๐Ÿ‘5
Google Project Zero revealed a working zero-click exploit chain against Pixel 9 phones.

A bug in the Dolby audio decoder let Google Messages process a malicious audio file in the background, gaining code execution, then a kernel bug completed the takeover. Pixel patches shipped in early Jan 2026.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/threatsday-bulletin-pixel-zero-click.html#zero-click-chain-hits-pixel
๐Ÿ”ฅ20๐Ÿ‘7
๐Ÿ›‘ URGENT: Microsoft rushed out out-of-band fixes for an actively exploited Office zero-day.

CVE-2026-21509 (CVSS 7.8) lets attackers bypass Office security using a malicious file that must be opened by the victim.

๐Ÿ”— Details โ†’ https://thehackernews.com/2026/01/microsoft-issues-emergency-patch-for.html
๐Ÿ”ฅ14๐Ÿ‘7๐Ÿคฏ4โšก3๐Ÿ˜1๐Ÿ˜ฑ1
โš ๏ธ Most OT incidents donโ€™t start in OT. They start with routine IT gaps reaching operations.

Sygnia found risk centered on remote access, management systems, identity, and recoveryโ€”not the process network. ~60% of OT access came via trusted management paths.

๐Ÿ”— Why this pattern keeps repeating across industries โ†’ https://thehackernews.com/expert-insights/2026/01/ot-security-in-practice-4-crossindustry.html
๐Ÿ‘10โšก4
๐Ÿ‡จ๐Ÿ‡ณ China-aligned APTs are using PeckBirdy, a JScript-based C2 framework active since 2023, to move quietly across browsers, Windows tools, and servers.

๐Ÿ•ต๏ธโ€โ™‚๏ธ It relies on LOLBins to deliver modular backdoors and steal data, leaving little trace on disk.

๐Ÿ”— See how PeckBirdy works โ†’ https://thehackernews.com/2026/01/china-linked-hackers-have-used.html
โšก11๐Ÿ‘5๐Ÿคฏ2
โš ๏ธ A single spreadsheet formula can now lead to full server takeover in Grist-Core.

The flaw, CVE-2026-24002 (CVSS 9.1), breaks out of the Pyodide sandbox, letting attackers run OS commands and access files and secrets.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/01/critical-grist-core-vulnerability.html
๐Ÿ”ฅ6โšก5
โš ๏ธ Update: Alma Security calls CVE-2026-1245 ParserPoison.

binary-parser drops unvalidated field names and encodings into new Function(). Untrusted schemas = JavaScript execution.

๐Ÿ”— How ParserPoison works under the hood โ†’ https://thehackernews.com/2026/01/certcc-warns-binary-parser-bug-allows.html
๐Ÿ”ฅ8โšก1
๐Ÿšจ ClickFix attacks are evolving fast.

๐Ÿงฉ Fake CAPTCHAs trick users into running commands that abuse signed Windows App-V scripts to proxy PowerShell.

โ˜๏ธ Malware like Amatera Stealer is staged via trusted services, runs in memory, and mainly hits enterprise systemsโ€”staying under EDR radar.

๐Ÿ”— Inside the new ClickFix playbook โ†’ https://thehackernews.com/2026/01/clickfix-attacks-expand-using-fake.html
๐Ÿ˜5โšก3๐Ÿ”ฅ2
๐Ÿ‡ฎ๐Ÿ‡ณ Indian government networks were targeted in two cyber campaigns linked to a Pakistan-based actor.

Tracked by Zscaler as Gopher Strike and Sheet Attack, the key tactic was India-only malware delivery, filtered by IP and Windows systems to evade analysis.

๐Ÿ”— Attack chain and tools explained โ†’ https://thehackernews.com/2026/01/experts-detect-pakistan-linked-cyber.html
๐Ÿ‘7๐Ÿ‘4