The Hacker News
βœ”
156K subscribers
2.36K photos
14 videos
4 files
8.29K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
🚨 Researchers detect active exploitation of a critical React Native CLI flaw.

CVE-2025-11953 allows unauthenticated OS command execution on exposed Metro dev servers, with attacks deploying PowerShell and a Rust payload.

πŸ”— Read β†’ https://thehackernews.com/2026/02/hackers-exploit-metro4shell-rce-flaw-in.html
🀯12⚑2😁2
πŸ“’ WEBINAR ALERT β†’ Adding tools hasn’t made SOCs calmer or faster. It’s mostly added noise.

In this session, two SOC operators walk through practical build vs buy decisions, real models, and a customer case study you can reuse.

πŸ”— Join to Watch: https://thehackernews.com/2026/02/webinar-smarter-soc-blueprint-learn.html
⚑4πŸ‘2😁2πŸ”₯1
⚠️ A critical flaw in Docker’s Ask Gordon AI let container metadata execute real commands.

A single malicious Docker LABEL could pass through the MCP gateway and run tools with user privileges. Fixed in version 4.50.0.

πŸ”— DockerDash details β†’ https://thehackernews.com/2026/02/docker-fixes-critical-ask-gordon-ai.html
😁13⚑5πŸ‘3πŸ”₯1
🚨 SolarWinds Web Help Desk flaw added to CISA KEV

β€’ CVE-2025-40551 (CVSS 9.8): unauthenticated RCE via deserialization
β€’ Fixed in WHD v2026.1
β€’ Federal agencies must patch by February 6

πŸ”— Read β†’ https://thehackernews.com/2026/02/cisa-adds-actively-exploited-solarwinds.html
πŸ”₯6⚑3πŸ‘2
πŸ”’ Eclipse Foundation will add pre-publish security checks to the Open VSX extension registry.

This shifts enforcement from post-report cleanup to blocking risky uploads before release, targeting impersonation, leaked secrets, and known malicious patterns.

πŸ”— Details β†’ https://thehackernews.com/2026/02/eclipse-foundation-mandates-pre-publish.html
😁8🀯3πŸ€”2⚑1
πŸ›‘ Microsoft warns infostealers are expanding from Windows to macOS.

Since late 2025, malvertising (Google Ads) and ClickFix lures have delivered fake DMG installers. Python-based stealers abuse native macOS tools + AppleScript to extract creds, cookies, and iCloud Keychain data.

πŸ”— Attack chain and theft capabilities β†’ https://thehackernews.com/2026/02/microsoft-warns-python-infostealers.html
😁9πŸ‘5πŸ‘5
πŸ›‘οΈ Mid-market firms aren’t under-secured. IBM finds 83 security tools on average, and complexity is the real blocker.

The gaps come from unused EDR, alert overload, and weak preventionβ€”not missing tools.

πŸ”— Simplifying security across the full threat lifecycle β†’ https://thehackernews.com/expert-insights/2026/02/how-to-secure-your-mid-market-business.html
πŸ‘7
πŸ› οΈπŸ“ŠπŸ” Most incident response failures start in the first moments. Early responder decisions on evidence and scope shape the case.

That window repeats as scope expands. Isolating systems too fast can hide real intrusion patterns.

πŸ”— Inside the first 90 seconds β†’ https://thehackernews.com/2026/02/the-first-90-seconds-how-early.html
πŸ‘9
mai.gif
14.2 MB
Identity risk now sits beyond IAM β€” inside apps, APIs, and service accounts.

🧩 Identity Dark Matter includes hardcoded credentials, orphaned accounts, and access paths outside identity providers β€” largely invisible to traditional tools.

πŸ”— Learn how Orchid uncovers Identity Dark Matter β†’ https://thehackernews.com/2026/02/orchid-security-introduces-continuous.html
πŸ‘6⚑1
🚨 All 24 GenAI models failed our security testing

We put 24 leading GenAI models through comprehensive security testing. The results? Every single one demonstrated exploitable chatbot vulnerabilities, with attack success rates ranging from 1.13% to 64.13%.

Key findings:
- 24 frontier models tested
- Hundreds of vulnerabilities discovered
- Attack success rates up to 64%
- 100% failure rate across all models

What's in the report:
βœ… Detailed security profiles of 24 GenAI models
βœ… Analysis of the AI prevention gap
βœ… Practical strategies for securing AI systems
βœ… Compliance and risk management guidance

As GenAI transforms industries, these findings underscore the critical need for continuous, automated security testing.

Download the full report: https://thn.news/gen-ai-tg-report
😁4πŸ”₯3πŸ‘2πŸ€”1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ‡¨πŸ‡³ China-linked Amaranth-Dragon targeted Southeast Asian government and law enforcement networks in 2025, with links to the APT41 ecosystem.

Campaigns leveraged political lures and the WinRAR CVE-2025-8088 RCE flaw, using cloud delivery and geo-fenced infrastructure for stealth.

πŸ”— Read β†’ https://thehackernews.com/2026/02/china-linked-amaranth-dragon-exploits.html
πŸ”₯13πŸ‘3πŸ€”2🀯2⚑1πŸ‘1😱1
Threat actors are delivering AsyncRAT via IPFS-hosted VHD files in DEAD#VAX.

Phishing emails mount fake PDF drives that run obfuscated scripts and in-memory shellcode inside trusted Windows processesβ€”minimal disk trace.

🧠 Fileless
πŸ›°οΈ IPFS
πŸͺŸ Process injection

πŸ”—Read β†’ https://thehackernews.com/2026/02/deadvax-malware-campaign-deploys.html
πŸ”₯7πŸ‘6😁3⚑1
⚑ Microsoft built a scanner to detect backdoors in open-weight LLMs 🧠 using 3 behavioral signals.

It flags trigger attention spikes, memorized poisoning data leaks, and fuzzy trigger activationβ€”no retraining required. Built to scan open models at scale.

πŸ”— Signals, detection method, limits, AI SDL shift β†’ https://thehackernews.com/2026/02/microsoft-develops-scanner-to-detect.html
πŸ‘11🀯6😁4πŸ‘1
☁️ Cloud attacks move fast. Evidence disappears faster.

Context-aware cloud forensics host data automatically and uses AI to rebuild real attack timelines in minutesβ€”not days. Practical investigation workflows included.

πŸŽ₯ Join the live session...

Telemetry model, AI analysis, response use cases β†’ https://thehacker.news/forensics-reimagined
😱6πŸ‘3
⚠️ Attackers are hijacking live web traffic by weaponizing NGINX configs linked to React2Shell exploitation.

Rogue proxy rules silently reroute user sessions through attacker infrastructureβ€”impacting πŸ›οΈ gov, πŸŽ“edu, and Asian 🌏 TLD sites.

πŸ”— Details β†’ https://thehackernews.com/2026/02/hackers-exploit-react2shell-to-hijack.html
πŸ‘17πŸ€”6⚑4πŸ‘1
⚠️ Critical RCE flaw in n8n (CVE-2026-25049, CVSS 9.4) lets authenticated users execute system commands via crafted workflow expressions.

Public webhooks exposed β†’ remote trigger, credential theft, server takeover.

πŸ”— Exploit path, affected versions, patch details β†’ https://thehackernews.com/2026/02/critical-n8n-flaw-cve-2026-25049.html
πŸ‘9😁5
Passwords are sliding into legacy status.

Passkeys, AI governance, and verifiable credentials are scaling as identity shifts to real-time trust β€” per Rex Booth, SailPoint.

πŸ” 9 predictions reshaping identity security β†’ https://thehackernews.com/expert-insights/2026/02/9-identity-security-predictions-for-2026.html
πŸ€”12πŸ‘6
πŸ’» Iran-linked APT Infy paused C2 ops during Iran’s Jan internet blackout β€” then rebuilt infrastructure as access returned.

Timing ties activity to state network controls. Latest malware uses Telegram + HTTP for dual-channel C2.

πŸ”— Timeline, tooling evolution, infra rebuild β†’ https://thehackernews.com/2026/02/infy-hackers-resume-operations-with-new.html
πŸ‘11😁10
⚠️ AI is everywhere in the enterprise β€” SaaS, browsers, copilots, shadow tools. Visibility is years behind adoption.

Legacy controls miss real interaction points, leaving prompts, uploads, and agent workflows ungoverned.

πŸ”— Download guide link β†’ https://thehackernews.com/2026/02/the-buyers-guide-to-ai-usage-control.html
πŸ‘5
πŸ“¦βš οΈ Is your container adoption outpacing your security maturity? You’re not alone.

ActiveState’s 2026 State of Vulnerability Management & Remediation Report found 82% of DevSecOps leaders experienced a container-related breach last year and 87% expect one in 2026.

Learn how to close the β€œremediation gap” and the role AI will play in securing your stack by 2026.

πŸ“₯ Download the report β†’ https://thn.news/container-sec-guide
πŸ‘4⚑1
🚨 ThreatsDay Bulletin is live.

This week’s signals point to a quieter but faster threat landscape:

β€’ Codespaces RCE & dev workflow abuse
β€’ AI-assisted cloud intrusions
β€’ BYOVD driver exploitation
β€’ AsyncRAT C2 exposure
β€’ Sandbox escape flaws
β€’ RMM persistence campaigns
β€’ Crypto drainer ecosystems
β€’ Botnet & DDoS scaling ops
β€’ Supply-chain injection paths
β€’ APT & crimeware infra overlap

Attack paths are blending into trusted environments β€” cloud, identity, drivers, and developer tooling.

All updates in one place β†’ https://thehackernews.com/2026/02/threatsday-bulletin-codespaces-rce.html
πŸ‘7