The Hacker News
βœ”
156K subscribers
2.36K photos
14 videos
4 files
8.29K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
Media is too big
VIEW IN TELEGRAM
What if the hardest vulnerability to patch… is self-doubt?

ICS environments are unforgiving. Responders can’t afford hesitationβ€”but they also can't ignore it. In ICS410, Justin Searle helps practitioners move from doubt to decisive action, grounded in technical precision and OT situational awareness.

Register for ICS410 at SANS Surge 2026 (Feb 23–28) and train live with Justin: https://thn.news/sans-surge-26
πŸ€”8πŸ”₯1
Latest edition of Cybersecurity recap worth reading:

🌐 Proxy botnet disrupted
πŸͺŸ Office zero-day exploited
πŸ€– AI endpoints hijacked
⚑ Power systems targeted
🧩 Malware in dev tools
πŸ“§ AWS creds abused
πŸ—„οΈ Databases extorted
πŸ” Enterprise flaws exploited

πŸ”— Full RECAP β†’ https://thehackernews.com/2026/02/weekly-recap-proxy-botnet-office-zero.html
πŸ‘10⚑4
⚑ Microsoft will phase out NTLM in Windows through a three-step plan.

Deprecated in June 2024, NTLM remains widely used despite known security flaws. NTLM will be disabled by default in a future Windows release, with Kerberos becoming the standard.

πŸ”— dtails β†’ https://thehackernews.com/2026/02/microsoft-begins-ntlm-phase-out-with.html
πŸ”₯10🀯3
πŸ”₯ A high-severity RCE flaw in OpenClaw lets attackers take over the local agent with a single click.

A crafted link can steal a gateway token via unvalidated WebSocket origins, enabling full command execution even on localhost-only setups through the user’s browser.

πŸ”— Details and attack chain β†’ https://thehackernews.com/2026/02/openclaw-bug-enables-one-click-remote.html
😁14⚑5πŸ‘4
βš‘πŸ€– Researchers find 341 malicious ClawHub skills targeting OpenClaw users via fake install steps.

The skills deploy Atomic Stealer on macOS and keylogging malware on Windows, abusing OpenClaw’s open marketplace model.

πŸ”— Read β†’ https://thehackernews.com/2026/02/researchers-find-341-malicious-clawhub.html
πŸ‘11πŸ”₯7😁5πŸ€”4🀯2⚑1
🚨 China-linked Lotus Blossom compromised Notepad++ hosting infrastructure to hijack update traffic and deliver the Chrysalis backdoor, Rapid7 reports.

The issue affected older versions and was fixed with version 8.8.9 in December 2025.

πŸ”— Read β†’ https://thehackernews.com/2026/02/notepad-hosting-breach-attributed-to.html
😁13🀯10πŸ”₯6⚑2
πŸ€– Mozilla will add 1-click Firefox setting to fully disable generative AI features.

With Firefox 148, users can block all current and future AI features or manage them individually, keeping AI strictly opt-in as browsers add more automation.

πŸ”— Read β†’ https://thehackernews.com/2026/02/mozilla-adds-one-click-option-to.html
πŸ”₯38πŸ‘16πŸ‘4😱4⚑1
πŸ•ΈοΈ Exposed C2 server showed a complete BYOB botnet in the open 🧠

Droppers, loaders, and RATs for Windows, Linux, and macOS were publicly accessible, revealing a multi-stage chain for evasion, persistence, and control. Crypto miners were also hosted.

πŸ”— Read β†’ https://thehackernews.com/2026/02/weekly-recap-proxy-botnet-office-zero.html#:~:text=Exposed%20C2%20Server%20Reveals%20BYOB%20Infrastructure
πŸ”₯9⚑4🀯3πŸ‘2
πŸ›‘οΈ Russia-linked APT28 exploited a newly disclosed Microsoft Office flaw within days of disclosure.

CVE-2026-21509 was used via malicious RTF files, with geo-fenced delivery targeting Ukraine, Slovakia, and Romania.

πŸ”— Read β†’ https://thehackernews.com/2026/02/apt28-uses-microsoft-office-cve-2026.html
😁12🀯10πŸ”₯5⚑1
πŸ” Major cloud outages didn’t just break appsβ€”they broke access.

When shared cloud services fail, identity systems fail too, even if the IdP is running. Authentication depends on databases, DNS, and control planes.

πŸ”— How cloud outages cascade into identity failures β†’ https://thehackernews.com/2026/02/when-cloud-outages-ripple-across.html
πŸ‘7😁4πŸ€”3⚑2🀯1
Want to enhance your cyber resilience with strategies and insights from industry leaders? Sign up for Infosec Compliance Now and earn up to 4 free CPE credits!

This virtual event will explore:
βœ”οΈ Structuring AI governance programs
βœ”οΈ Establishing continuous control monitoring
βœ”οΈ Navigating the current cyber risk landscape

Register Now β†’ https://thn.news/cyber-risk-summit
πŸ‘6😁2
🚨 Researchers detect active exploitation of a critical React Native CLI flaw.

CVE-2025-11953 allows unauthenticated OS command execution on exposed Metro dev servers, with attacks deploying PowerShell and a Rust payload.

πŸ”— Read β†’ https://thehackernews.com/2026/02/hackers-exploit-metro4shell-rce-flaw-in.html
🀯12⚑2😁2
πŸ“’ WEBINAR ALERT β†’ Adding tools hasn’t made SOCs calmer or faster. It’s mostly added noise.

In this session, two SOC operators walk through practical build vs buy decisions, real models, and a customer case study you can reuse.

πŸ”— Join to Watch: https://thehackernews.com/2026/02/webinar-smarter-soc-blueprint-learn.html
⚑4πŸ‘2😁2πŸ”₯1
⚠️ A critical flaw in Docker’s Ask Gordon AI let container metadata execute real commands.

A single malicious Docker LABEL could pass through the MCP gateway and run tools with user privileges. Fixed in version 4.50.0.

πŸ”— DockerDash details β†’ https://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html
😁13⚑5πŸ‘3πŸ”₯1
🚨 SolarWinds Web Help Desk flaw added to CISA KEV

β€’ CVE-2025-40551 (CVSS 9.8): unauthenticated RCE via deserialization
β€’ Fixed in WHD v2026.1
β€’ Federal agencies must patch by February 6

πŸ”— Read β†’ https://thehackernews.com/2026/02/cisa-adds-actively-exploited-solarwinds.html
πŸ”₯6⚑3πŸ‘2
πŸ”’ Eclipse Foundation will add pre-publish security checks to the Open VSX extension registry.

This shifts enforcement from post-report cleanup to blocking risky uploads before release, targeting impersonation, leaked secrets, and known malicious patterns.

πŸ”— Details β†’ https://thehackernews.com/2026/02/eclipse-foundation-mandates-pre-publish.html
😁8🀯3πŸ€”2⚑1
πŸ›‘ Microsoft warns infostealers are expanding from Windows to macOS.

Since late 2025, malvertising (Google Ads) and ClickFix lures have delivered fake DMG installers. Python-based stealers abuse native macOS tools + AppleScript to extract creds, cookies, and iCloud Keychain data.

πŸ”— Attack chain and theft capabilities β†’ https://thehackernews.com/2026/02/microsoft-warns-python-infostealers.html
😁9πŸ‘5πŸ‘5
πŸ›‘οΈ Mid-market firms aren’t under-secured. IBM finds 83 security tools on average, and complexity is the real blocker.

The gaps come from unused EDR, alert overload, and weak preventionβ€”not missing tools.

πŸ”— Simplifying security across the full threat lifecycle β†’ https://thehackernews.com/expert-insights/2026/02/how-to-secure-your-mid-market-business.html
πŸ‘7
πŸ› οΈπŸ“ŠπŸ” Most incident response failures start in the first moments. Early responder decisions on evidence and scope shape the case.

That window repeats as scope expands. Isolating systems too fast can hide real intrusion patterns.

πŸ”— Inside the first 90 seconds β†’ https://thehackernews.com/2026/02/the-first-90-seconds-how-early.html
πŸ‘9
mai.gif
14.2 MB
Identity risk now sits beyond IAM β€” inside apps, APIs, and service accounts.

🧩 Identity Dark Matter includes hardcoded credentials, orphaned accounts, and access paths outside identity providers β€” largely invisible to traditional tools.

πŸ”— Learn how Orchid uncovers Identity Dark Matter β†’ https://thehackernews.com/2026/02/orchid-security-introduces-continuous.html
πŸ‘6⚑1
🚨 All 24 GenAI models failed our security testing

We put 24 leading GenAI models through comprehensive security testing. The results? Every single one demonstrated exploitable chatbot vulnerabilities, with attack success rates ranging from 1.13% to 64.13%.

Key findings:
- 24 frontier models tested
- Hundreds of vulnerabilities discovered
- Attack success rates up to 64%
- 100% failure rate across all models

What's in the report:
βœ… Detailed security profiles of 24 GenAI models
βœ… Analysis of the AI prevention gap
βœ… Practical strategies for securing AI systems
βœ… Compliance and risk management guidance

As GenAI transforms industries, these findings underscore the critical need for continuous, automated security testing.

Download the full report: https://thn.news/gen-ai-tg-report
😁4πŸ”₯3πŸ‘2πŸ€”1