The Hacker News
βœ”
156K subscribers
2.36K photos
14 videos
4 files
8.29K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
State-linked hackers breached 70+ government & critical infrastructure networks across 37 countries, Unit 42 reports.

Targets include law enforcement, finance ministries, and border control. Initial access via phishing loaders, with payloads staged on GitHub.

πŸ”— Intrusion chain, malware design, targeting scope β†’ https://thehackernews.com/2026/02/asian-state-backed-group-tgr-sta-1030.html
πŸ‘13πŸ€”6😁3⚑1
πŸ›‘ CISA orders federal agencies to remove unsupported edge devices within 12–18 months.

Unpatched firewalls, routers, IoT, and perimeter gear are now flagged as prime entry pointsβ€”actively exploited by state-backed actors for network access.

πŸ”— Directive scope, deadlines, device list β†’ https://thehackernews.com/2026/02/cisa-orders-removal-of-unsupported-edge.html
πŸ‘10⚑2
Cisco Talos exposed DKnife β€” a China-linked AitM framework active since 2019 on compromised routers and edge devices.

It monitors traffic, steals credentials, and hijacks app/software updates to deploy ShadowPad and DarkNimbus on PCs and phones.

πŸ”— Modules and infection chain β†’ https://thehackernews.com/2026/02/china-linked-dknife-aitm-framework.html
😁13🀯9⚑2
German authorities warn of a state-linked phishing campaign abusing Signal account features to hijack chats.

Actors pose as support, steal PINs or trick targets into device linkingβ€”enabling message interception and impersonation across political, military, and media networks.

πŸ”— Read β†’ https://thehackernews.com/2026/02/german-agencies-warn-of-signal-phishing.html
πŸ‘18⚑7😱6
πŸ”₯ OpenClaw now scans every ClawHub skill using πŸ›‘οΈ VirusTotal threat intel.

Uploads are hashed, analyzed via Code Insight, then auto-approved, flagged, or blocked. Daily rescans πŸ” check if clean skills turn malicious later.

⚠️ Hundreds of risky skills had slipped through earlier.

πŸ”— Read β†’ https://thehackernews.com/2026/02/openclaw-integrates-virustotal-scanning.html
😱21πŸ‘19πŸ‘8⚑4😁3πŸ€”3🀯3πŸ”₯2
⚑ BeyondTrust patched pre-auth RCE (CVE-2026-1731) in Remote Support and PRA.

Attackers could run OS commands via crafted requests.~11K exposed instances found. Patches released.

πŸ”— Versions affected, fixes β†’ https://thehackernews.com/2026/02/beyondtrust-fixes-critical-pre-auth-rce.html
πŸ‘8
πŸ›‘ Cloud worm malware campaign is systematically taking over cloud infrastructure.

TeamPCP exploits exposed Docker, Kubernetes, Redis, and React2Shell to mass-deploy proxies, scanners, crypto miners & ransomware across compromised clusters.

πŸ”— Read β†’ https://thehackernews.com/2026/02/teampcp-worm-exploits-cloud.html
πŸ‘7
πŸ› οΈ Bloody Wolf tied to a spear-phishing campaign deploying NetSupport RAT across Central Asia and Russia.

~60 victims across government, finance, manufacturing. Malicious PDFs drop loaders that persist via scripts + scheduled tasks.

πŸ”— Details β†’ https://thehackernews.com/2026/02/bloody-wolf-targets-uzbekistan-russia.html
😁7πŸ‘1
πŸ§ͺ⚑ SOC teams aren’t failing on tools β€” they’re overloaded by triage. Constant validation loops are fueling burnout and SLA drift.

CISOs are moving to sandbox-first workflows, exposing live behavior early and reducing escalations, MTTR, and senior drag.

πŸ”— How evidence replaces guesswork β†’ https://thehackernews.com/2026/02/how-top-cisos-solve-burnout-and-speed.html
πŸ‘7πŸ‘3
⚠️ AI tools, supply chains, and trusted platforms are now attack paths.

Malicious AI skills, Signal phishing, Docker AI RCE, update hijacks β€” plus a record 31.4 Tbps DDoS. All in one week.

πŸ”Ž Read the full recap here: https://thehackernews.com/2026/02/weekly-recap-ai-skill-malware-31tbps.html
😁9πŸ‘5⚑2😱2
🚨 Microsoft traced a multi-stage intrusion to exposed SolarWinds Web Help Desk servers.

Attackers used unauthenticated RCE, moved laterally, and abused legit RMM tools for persistence β€” plus credential dumping and DCSync.

πŸ”— Tradecraft, CVEs, and lateral movement chain β†’ https://thehackernews.com/2026/02/solarwinds-web-help-desk-exploited-for.html
πŸ”₯13
⚠️ Singapore’s cyber agency says China-linked UNC3886 targeted all four national telecom operators.

Attackers used a firewall zero-day and rootkits to access parts of critical systems. Espionage activity was contained. No service disruption or customer data theft found.

πŸ”— Read β†’ https://thehackernews.com/2026/02/china-linked-unc3886-targets-singapore.html
πŸ”₯13πŸ‘5😁4
πŸš¨πŸ›‘οΈ Fortinet Fixes Critical FortiClientEMS RCE (CVE-2026-21643, CVSS 9.1).

SQL injection flaw enables unauthenticated remote command execution via crafted requests. Affects EMS 7.4.4 (patch available).

Separate FortiCloud SSO bug is actively exploited for admin persistence and firewall config theft.

πŸ”— See affected versions and patch guidance β†’ https://thehackernews.com/2026/02/fortinet-patches-critical-sqli-flaw.html
πŸ‘12⚑3🀯3😁2
🚨 Ivanti EPMM Zero-Day Exploits Breach Dutch Regulators, Linked to Wider πŸ‡ͺπŸ‡Ί EU Government Intrusions.

Attackers exploited CVSS 9.8 unauthenticated RCE flaws to access employee work contact data.
Related activity also impacted the European Commission and Finland’s Valtori systems.

πŸ”— Details β†’ https://thehackernews.com/2026/02/dutch-authorities-confirm-ivanti-zero.html
😱7⚑6
Three practical questions security teams should answer before selecting an SSE platform:

βš™οΈ Deployment complexity
πŸ‘οΈ In-session visibility
πŸ›‘οΈ Real session risk coverage

πŸ”— Framework, tradeoffs, rollout risks β†’ https://thehackernews.com/expert-insights/2026/02/3-questions-to-ask-before-your-next-sse.html
πŸ‘6
βš οΈπŸ› οΈ Warlock ransomware breached SmarterTools via unpatched SmarterMail VM.

Attackers entered Jan 29, moved laterally, seized Active Directory, and staged Velociraptor pre-encryption. ~12 servers and a QC data center were hit; core apps and customer data stayed unaffected.

πŸ”— See exploited CVEs β†’ https://thehackernews.com/2026/02/warlock-ransomware-breaches.html
πŸ‘6😁3
Earn and learn at Infosec Compliance Now 2026!

Registration for the 6th annual Infosec Compliance Now virtual event is live! Attend and earn up to 4 free CPE credits while learning about AI-powered GRC, cyber resilience, continuous control monitoring using automation, and more.

Register Now ➜ https://thn.news/infosec-risk-summit
πŸ‘8
πŸ•΅οΈβ€β™‚οΈβš οΈ Ransomware Persists β€” But Encryption Is No Longer the Main Signal of Attack!

Picus reviewed 1.1M malware samples and found a shift toward stealth access over disruption. Encryption attacks fell 38% YoY as extortion moves to data theft and credential abuse.

πŸ”— Explore the full stealth-attack dataset β†’ https://thehackernews.com/2026/02/from-ransomware-to-residency-inside.html
πŸ”₯10πŸ‘4
βš οΈπŸ› οΈ Reynolds ransomware embeds its own BYOVD evasion, bundling a vulnerable driver to disable EDR before encryption.

It drops the NSecKrnl driver (CVE-2025-68947) to kill security tools, reducing detection and affiliate effort.

πŸ”— Read full attack chain and defense insights β†’ https://thehackernews.com/2026/02/reynolds-ransomware-embeds-byovd-driver.html
πŸ‘13
πŸ§‘β€πŸ’»πŸ’» North Korean operatives are using real LinkedIn accounts to land remote IT jobs in Western firms.

With impersonated profiles and verified emails, DPRK actors secure roles to fund weapons programs and conduct espionageβ€”some gain admin access, steal data, and maintain persistence.

πŸ” Read the full investigation β†’ https://thehackernews.com/2026/02/dprk-operatives-impersonate.html
πŸ‘20😁9😱9πŸ”₯6πŸ€”2
πŸ•΅οΈβ€β™‚οΈπŸ’° North Korea-linked UNC1069 used deepfake Zoom calls to hack crypto firms.

Posing via Telegram, attackers lured victims into fake meetings, triggering ClickFix commands that deployed multi-stage malware on macOS & Windows to steal wallets and credentials.

πŸ”— Read β†’ https://thehackernews.com/2026/02/north-korea-linked-unc1069-uses-ai.html
πŸ”₯18😱4