The Hacker News
βœ”
156K subscribers
2.36K photos
14 videos
4 files
8.29K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
mai.gif
14.2 MB
Identity risk now sits beyond IAM β€” inside apps, APIs, and service accounts.

🧩 Identity Dark Matter includes hardcoded credentials, orphaned accounts, and access paths outside identity providers β€” largely invisible to traditional tools.

πŸ”— Learn how Orchid uncovers Identity Dark Matter β†’ https://thehackernews.com/2026/02/orchid-security-introduces-continuous.html
πŸ‘6⚑1
🚨 All 24 GenAI models failed our security testing

We put 24 leading GenAI models through comprehensive security testing. The results? Every single one demonstrated exploitable chatbot vulnerabilities, with attack success rates ranging from 1.13% to 64.13%.

Key findings:
- 24 frontier models tested
- Hundreds of vulnerabilities discovered
- Attack success rates up to 64%
- 100% failure rate across all models

What's in the report:
βœ… Detailed security profiles of 24 GenAI models
βœ… Analysis of the AI prevention gap
βœ… Practical strategies for securing AI systems
βœ… Compliance and risk management guidance

As GenAI transforms industries, these findings underscore the critical need for continuous, automated security testing.

Download the full report: https://thn.news/gen-ai-tg-report
😁4πŸ”₯3πŸ‘2πŸ€”1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ‡¨πŸ‡³ China-linked Amaranth-Dragon targeted Southeast Asian government and law enforcement networks in 2025, with links to the APT41 ecosystem.

Campaigns leveraged political lures and the WinRAR CVE-2025-8088 RCE flaw, using cloud delivery and geo-fenced infrastructure for stealth.

πŸ”— Read β†’ https://thehackernews.com/2026/02/china-linked-amaranth-dragon-exploits.html
πŸ”₯13πŸ‘3πŸ€”2🀯2⚑1πŸ‘1😱1
Threat actors are delivering AsyncRAT via IPFS-hosted VHD files in DEAD#VAX.

Phishing emails mount fake PDF drives that run obfuscated scripts and in-memory shellcode inside trusted Windows processesβ€”minimal disk trace.

🧠 Fileless
πŸ›°οΈ IPFS
πŸͺŸ Process injection

πŸ”—Read β†’ https://thehackernews.com/2026/02/deadvax-malware-campaign-deploys.html
πŸ”₯7πŸ‘6😁3⚑1
⚑ Microsoft built a scanner to detect backdoors in open-weight LLMs 🧠 using 3 behavioral signals.

It flags trigger attention spikes, memorized poisoning data leaks, and fuzzy trigger activationβ€”no retraining required. Built to scan open models at scale.

πŸ”— Signals, detection method, limits, AI SDL shift β†’ https://thehackernews.com/2026/02/microsoft-develops-scanner-to-detect.html
πŸ‘11🀯6😁4πŸ‘1
☁️ Cloud attacks move fast. Evidence disappears faster.

Context-aware cloud forensics host data automatically and uses AI to rebuild real attack timelines in minutesβ€”not days. Practical investigation workflows included.

πŸŽ₯ Join the live session...

Telemetry model, AI analysis, response use cases β†’ https://thehacker.news/forensics-reimagined
😱6πŸ‘3
⚠️ Attackers are hijacking live web traffic by weaponizing NGINX configs linked to React2Shell exploitation.

Rogue proxy rules silently reroute user sessions through attacker infrastructureβ€”impacting πŸ›οΈ gov, πŸŽ“edu, and Asian 🌏 TLD sites.

πŸ”— Details β†’ https://thehackernews.com/2026/02/hackers-exploit-react2shell-to-hijack.html
πŸ‘17πŸ€”6⚑4πŸ‘1
⚠️ Critical RCE flaw in n8n (CVE-2026-25049, CVSS 9.4) lets authenticated users execute system commands via crafted workflow expressions.

Public webhooks exposed β†’ remote trigger, credential theft, server takeover.

πŸ”— Exploit path, affected versions, patch details β†’ https://thehackernews.com/2026/02/critical-n8n-flaw-cve-2026-25049.html
πŸ‘9😁5
Passwords are sliding into legacy status.

Passkeys, AI governance, and verifiable credentials are scaling as identity shifts to real-time trust β€” per Rex Booth, SailPoint.

πŸ” 9 predictions reshaping identity security β†’ https://thehackernews.com/expert-insights/2026/02/9-identity-security-predictions-for-2026.html
πŸ€”13πŸ‘6
πŸ’» Iran-linked APT Infy paused C2 ops during Iran’s Jan internet blackout β€” then rebuilt infrastructure as access returned.

Timing ties activity to state network controls. Latest malware uses Telegram + HTTP for dual-channel C2.

πŸ”— Timeline, tooling evolution, infra rebuild β†’ https://thehackernews.com/2026/02/infy-hackers-resume-operations-with-new.html
πŸ‘11😁10
⚠️ AI is everywhere in the enterprise β€” SaaS, browsers, copilots, shadow tools. Visibility is years behind adoption.

Legacy controls miss real interaction points, leaving prompts, uploads, and agent workflows ungoverned.

πŸ”— Download guide link β†’ https://thehackernews.com/2026/02/the-buyers-guide-to-ai-usage-control.html
πŸ‘5
πŸ“¦βš οΈ Is your container adoption outpacing your security maturity? You’re not alone.

ActiveState’s 2026 State of Vulnerability Management & Remediation Report found 82% of DevSecOps leaders experienced a container-related breach last year and 87% expect one in 2026.

Learn how to close the β€œremediation gap” and the role AI will play in securing your stack by 2026.

πŸ“₯ Download the report β†’ https://thn.news/container-sec-guide
πŸ‘4⚑1
🚨 ThreatsDay Bulletin is live.

This week’s signals point to a quieter but faster threat landscape:

β€’ Codespaces RCE & dev workflow abuse
β€’ AI-assisted cloud intrusions
β€’ BYOVD driver exploitation
β€’ AsyncRAT C2 exposure
β€’ Sandbox escape flaws
β€’ RMM persistence campaigns
β€’ Crypto drainer ecosystems
β€’ Botnet & DDoS scaling ops
β€’ Supply-chain injection paths
β€’ APT & crimeware infra overlap

Attack paths are blending into trusted environments β€” cloud, identity, drivers, and developer tooling.

All updates in one place β†’ https://thehackernews.com/2026/02/threatsday-bulletin-codespaces-rce.html
πŸ‘7
AI is foundational for security teams, but operational relief still feels out of reach.

Tines just launched Voice of Security 2026, based on insights from 1,800+ security leaders and practitioners.

The data shows why workloads remain high and what it takes to unlock real AI impact πŸ‘‡ https://thn.news/security-pro-meta-fb
πŸ‘9
🌐⚠️ AISURU/Kimwolf launched a record 31.4 Tbps HTTP DDoS attack β€” mitigated by Cloudflare.

Same botnet drove holiday flood campaigns as Q4 hyper-volumetric attacks surged. Runs on 2M+ infected Android devices via proxy networks.

πŸ”— Read β†’ https://thehackernews.com/2026/02/aisurukimwolf-botnet-launches-record.html
πŸ”₯13😁10⚑1
πŸ”₯ Anthropic’s Claude Opus 4.6 AI found 500+ previously unknown high-severity flaws in open-source code.

Impacted: Ghostscript, OpenSC, CGIF. Bugs ranged from buffer overflows to memory corruption β€” all validated and patched.

πŸ”— Details β†’ https://thehackernews.com/2026/02/claude-opus-46-finds-500-high-severity.html
🀯21😁13πŸ€”7😱6πŸ”₯2⚑1
πŸ›‘ Malicious updates were published to official dYdX trading packages on npm and PyPI, delivering a wallet stealer and remote access malware.

Published via compromised maintainer accounts, the malware hid inside transaction-signing and wallet code.

πŸ”—Read β†’ https://thehackernews.com/2026/02/compromised-dydx-npm-and-pypi-packages.html
πŸ‘6
πŸ›‘οΈ Turn intel into action with a 6-stage Threat-Informed Defense pipeline. Map adversary TTPs, simulate attacks, validate controls, and prioritize fixes that reduce real risk.

πŸ”— Download Guide (Framework steps + tooling) β†’ https://www.linkedin.com/pulse/turn-intel-action-guide-threatinformed-defense-thehackernews-hru3c/
πŸ‘9
State-linked hackers breached 70+ government & critical infrastructure networks across 37 countries, Unit 42 reports.

Targets include law enforcement, finance ministries, and border control. Initial access via phishing loaders, with payloads staged on GitHub.

πŸ”— Intrusion chain, malware design, targeting scope β†’ https://thehackernews.com/2026/02/asian-state-backed-group-tgr-sta-1030.html
πŸ‘13πŸ€”6😁3⚑1
πŸ›‘ CISA orders federal agencies to remove unsupported edge devices within 12–18 months.

Unpatched firewalls, routers, IoT, and perimeter gear are now flagged as prime entry pointsβ€”actively exploited by state-backed actors for network access.

πŸ”— Directive scope, deadlines, device list β†’ https://thehackernews.com/2026/02/cisa-orders-removal-of-unsupported-edge.html
πŸ‘10⚑2
Cisco Talos exposed DKnife β€” a China-linked AitM framework active since 2019 on compromised routers and edge devices.

It monitors traffic, steals credentials, and hijacks app/software updates to deploy ShadowPad and DarkNimbus on PCs and phones.

πŸ”— Modules and infection chain β†’ https://thehackernews.com/2026/02/china-linked-dknife-aitm-framework.html
😁13🀯9⚑2