The Hacker News
βœ”
156K subscribers
2.39K photos
15 videos
4 files
8.31K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
πŸ”’ Apple’s latest beta brings end-to-end encryption to RCS β€” but only for Apple-to-Apple chats so far.

It’s part of iOS 26.4 testing alongside new memory protections designed to block spyware at the kernel level.

πŸ”— Inside Apple’s new security stack β†’ https://thehackernews.com/2026/02/apple-tests-end-to-end-encrypted-rcs.html
πŸ‘18πŸ€”2😁1
⚑ Microsoft warns some firms are embedding manipulative prompts in β€œSummarize with AI” buttons.

Researchers identified 50+ hidden instructions that push assistants to remember and recommend specific brands β€” with effects persisting across future chats, often without user awareness.

πŸ”— Read β†’ https://thehackernews.com/2026/02/microsoft-finds-summarize-with-ai.html
πŸ”₯11
Most β€œAI for GRC” still stops at task automation β€” drafting policies or extracting clauses.

As Yair Kuznitsov, CEO of Anecdotes, explains, agentic GRC replaces the workflow itself. Agents collect evidence, evaluate controls, trigger remediation, and maintain audit trails autonomously.

Decision-making is embedded.

πŸ”— CCM agent execution model β†’ https://thehackernews.com/expert-insights/2026/02/ai-shouldnt-improve-workflows-it-should.html
πŸ‘7πŸ”₯1
⚠️ ☠️ πŸ€– A trojanized Oura AI connector is being used to spread SmartLoader malware.

Attackers cloned the MCP server, staged fake GitHub contributors, and planted it in trusted registries. The payload drops StealC to steal credentials, wallets, and cloud access.

πŸ”— Read β†’ https://thehackernews.com/2026/02/smartloader-attack-uses-trojanized-oura.html
πŸ‘8
Network Detection & Response is now central to SOC workflowsβ€”not an add-on.

Testing Corelight’s Investigator showed analysts tracing exploits, reverse shells, and lateral movement in one dashboard, mapped to MITRE and guided by embedded AI.

NDR serves as a force multiplier for mid-tier teams.

πŸ”— Inside: hunt workflows β†’ https://thehackernews.com/2026/02/my-day-getting-my-hands-dirty-with-ndr.html
πŸ‘8
Infosec Compliance Now 2026 | Earn 4 CPEs

Registration for the 6th annual Infosec Compliance Now virtual event is live! Attend and earn up to 4 free CPE credits while learning about AI-powered GRC, cyber resilience, continuous control monitoring using automation, and more!

Register β†’ https://thn.news/cyber-risk-event
πŸ”₯4πŸ‘1
⚠️ Cloud attacks move faster than investigations.

Wiz experts show how workloads vanish, identities rotate, and logs expire before response even starts.

Minutes β€” not days β€” decide outcomes. See how context-aware forensics rebuilds full attack timelines fast.

πŸ”— See cloud breaches reconstructed step-by-step β†’ https://thehackernews.com/2026/02/cloud-forensics-webinar-learn-how-ai.html
πŸ”₯9πŸ‘1😁1
πŸ›‘ A firmware-level Android backdoor called Keenadu is being shipped inside signed tablet builds.

Telemetry shows 13,715 users globally encountered its modules. It injects into every app via core system libraries, enabling remote control, data theft, and ad fraud.

πŸ”— Read β†’ https://thehackernews.com/2026/02/keenadu-firmware-backdoor-infects.html
🀯11😱7πŸ€”4😁2
πŸ€– AI assistants with web browsing can be weaponized as stealth command relays.

Check Point showed Copilot and Grok fetching attacker URLs and returning commands through normal responses β€” blending C2 traffic into enterprise use.

πŸ”— Read details β†’ https://thehackernews.com/2026/02/researchers-show-copilot-and-grok-can.html
🀯8πŸ‘7😁7πŸ‘2
⚠️ CISA added 4 actively exploited flaws to its KEV list, including a Chrome zero-day and critical Zimbra SSRF bug.

Attacks range from browser heap corruption to server command execution and worm delivery.

πŸ”— Exploited CVEs, affected tech, patch timelines β†’ https://thehackernews.com/2026/02/cisa-flags-four-security-flaws-under.html
⚑7πŸ”₯3
⚑ Notepad++ pushed a security update after attackers hijacked its updater to deliver malware to select users.

Version 8.9.2 adds a β€œdouble lock” verification system & hardens the auto-updater after a hosting breach enabled poisoned updates.

πŸ”— Read β†’ https://thehackernews.com/2026/02/notepad-fixes-hijacked-update-mechanism.html
πŸ‘14πŸ”₯6😁5🀯3
🚨 China-linked UNC6201 exploited a CVSS 10.0 (CVE-2026-22769) Dell RecoverPoint zero-day since 2024 using hard-coded credentials.

Access led to Tomcat web shells, BRICKSTORM installs, and newer GRIMBOLT backdoors built to evade detection.

πŸ”— Read β†’ https://thehackernews.com/2026/02/dell-recoverpoint-for-vms-zero-day-cve.html
πŸ”₯12πŸ‘2πŸ‘2
88% of AI pilots never reach production.

Security and IT teams stall not on toolsβ€”but execution. Intelligent workflows blend automation, AI decisions, and human review to move phishing response, service requests, and vuln tracking from manual to real time.

πŸ”— Pre-built workflow breakdowns β†’ https://thehackernews.com/2026/02/3-ways-to-start-your-intelligent.html
😁13
⚠️ Four popular VS Code extensions expose developers to file theft and remote code execution.

Researchers say 125M+ installs are affected. Flaws in Live Server, Code Runner, and others enable localhost abuse, malicious configs, and code injectionβ€”some still unpatched.

πŸ”— Read β†’ https://thehackernews.com/2026/02/critical-flaws-found-in-four-vs-code.html
πŸ‘8🀯4
Cybersecurity isn’t preparing for storms anymore. Instability is permanent.

AI threats, regulatory pressure, and geopolitical risk now shape how systems are built and runβ€”not just defended.

πŸ”— What security looks like when volatility is baseline β†’ https://thehackernews.com/2026/02/cybersecurity-tech-predictions-for-2026.html
πŸ‘2
Media is too big
VIEW IN TELEGRAM
🚨 There’s an extreme scarcity of skilled GenAI red teamersβ€”experts estimate fewer than 10,000 globally, while one security industry analyst believes there are fewer than 10 capable of tackling frontier AI risks.

πŸ“½οΈ From TELUS Digital's Fuel iX team: Watch Uncharted: The AI Safety & Security Summit on demand to hear from top security leaders and industry experts as they uncover:

β€’ Hidden vulnerabilities in GenAI models
β€’ How automated red teaming is transforming risk detection
β€’ Actionable strategies to safeguard your AI systems

πŸ‘‰ Watch now: https://thn.news/ai-security-summit-tg
πŸ‘3
Researchers found a stack overflow in Grandstream GXP1600 phones (CVE-2026-2329, 9.3 CVSS).

A crafted API request can overwrite memory and run code remotelyβ€”no login required. Post-exploitation includes credential theft and VoIP call interception via rogue SIP proxy.

πŸ”— Read β†’ https://thehackernews.com/2026/02/grandstream-gxp1600-voip-phones-exposed.html
πŸ‘3πŸ”₯1
πŸ›‘ Citizen Lab found Cellebrite tools used on a Kenyan activist’s phone while it was in police custody.

Boniface Mwangi’s Samsung device was accessed in July 2025 and later returned without password protection. Full extraction could include messages, files, and passwords.

The findings follow similar cases in Jordan.

πŸ”— Read β†’ https://thehackernews.com/2026/02/citizen-lab-finds-cellebrite-tool-used.html