The Hacker News
βœ”
156K subscribers
2.44K photos
16 videos
4 files
8.37K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
⚠️ A flaw in #GitHub Codespaces let attackers hide malicious Copilot instructions inside a GitHub issue.

When a developer opened a Codespace from that issue, Copilot could silently run the injected prompt and leak a privileged GITHUB_TOKEN.

The research also warns of β€œpromptware” attacks built entirely through prompts.

πŸ”— Exploit Details β†’ https://thehackernews.com/2026/02/roguepilot-flaw-in-github-codespaces.html
πŸ‘15πŸ€”7😁4πŸ”₯3
🚨 CISA added CVE-2026-25108 to its KEV list after active exploitation. The FileZen bug allows an authenticated user to execute OS commands via crafted HTTP requests.

Impacts versions 4.2.1–4.2.8 and 5.0.0–5.0.10 when Antivirus Check is enabled. At least one incident confirmed.

πŸ”— Read β†’ https://thehackernews.com/2026/02/cisa-confirms-active-exploitation-of.html
πŸ‘6πŸ”₯3
⚠️ ALERT: SolarWinds patched four critical 9.1 CVSS flaws in Serv-U that can lead to remote code execution as root.

SolarWinds says there’s no sign of active attacks, but earlier Serv-U flaws were used by Storm-0322.

πŸ”— Details β†’ https://thehackernews.com/2026/02/solarwinds-patches-4-critical-serv-u.html
πŸ‘8πŸ”₯2
Most breaches start with low-severity alerts no one owns.

SolarWinds had DNS quirks, odd Azure AD auth, strange SAML tokens. Each looked minor. Together, they meant compromise.

SOCs are built for volume and speed. Rare, cross-domain signals fall outside playbooks and KPIs.

πŸ”— Why long-tail alerts slip through SOCs β†’ https://thehackernews.com/expert-insights/2026/02/the-riskiest-alert-types-and-why.html
⚑7πŸ‘3πŸ”₯2
πŸ”₯ Microsoft just open-sourced LiteBox, a Rust-based sandboxing library OS.

Developed via the LVBS project, it shrinks attack surfaces by stripping the interface between apps and the host. It enables unmodified Linux programs to run securely on Windows or within isolated Linux environments.

πŸ”— Read: https://thehackernews.com/2026/02/weekly-recap-double-tap-skimmers.html#:~:text=Microsoft%20Unveils%20LiteBox
πŸ‘13πŸ‘2πŸ”₯1
🚨 A former L3Harris employee was sentenced to just over 7 years for selling 8 zero-day exploits to Russian broker Operation Zero.

Prosecutors say he received up to $4M in crypto, and the theft is estimated to have cost L3Harris $35M.

Washington has sanctioned the broker and related entities.

πŸ”— Full story here: https://thehackernews.com/2026/02/defense-contractor-employee-jailed-for.html
😱10πŸ‘7⚑4πŸ”₯3
⚑ 53% of national security orgs still rely on manual data transfers, inviting human error as attacks surge 25%.

The Everfox CYBER360 report calls for a "Cybersecurity Trinity": Zero Trust + Data-Centric Security + Cross-Domain Solutions.

πŸ”— The framework for mission-speed security: https://thehackernews.com/2026/02/manual-processes-are-putting-national.html
πŸ€”4πŸ”₯2😁2
🚨 Over 50,000 npm and 4,500 NuGet users were hit by malicious packages before they were pulled.

The NuGet attack rewrote ASP_NET authorization for instant admin access, while the npm variant used preinstall hooks to deploy OS-specific malware and exfiltrate data.

πŸ”— Read β†’ https://thehackernews.com/2026/02/malicious-nuget-packages-stole-aspnet.html
πŸ‘3πŸ”₯1
Media is too big
VIEW IN TELEGRAM
AI agents aren't taking over humanity… yet. But they are accessing your corporate data in ways you probably can't see.

The Model Context Protocol (MCP) is unlocking agentic AI, and your employees are already using it to connect AI tools to SaaS appsβ€”working smarter and faster with tools they already know. But each MCP connection creates a new data highway with expansive permissions and scopes.

Which is why Nudge Security built automatic discovery for risky MCP connections. Now you can see:

β€’ Which MCP server connections exist in your environment
β€’ Which apps and data they're accessing
Their full permissions and scopes
β€’ With clear visibility into every connection, you can stay ahead of emerging risks and start governing your agent workforce.

Learn more about AI governance with Nudge: https://thn.news/nudge-ai-risk
😁4πŸ‘2πŸ”₯2πŸ‘2🀯2😱1
πŸŽ™οΈπŸ’° Cybercriminals linked to Scattered LAPSUS$ Hunters are paying women $500–$1,000 per call to do vishing attacks.

They supply scripts, target IT help desks to reset passwords, bypass MFA & drop remote tools.

πŸ”— Help desk attack chain β†’ https://thehackernews.com/2026/02/slh-offers-5001000-per-call-to-recruit.html
😁15πŸ‘4πŸ”₯1
πŸ‘¨πŸ»β€πŸ’» SOC triage usually relies on guesswork, driving up risk.

@anyrun_app changes that: its interactive sandbox reveals the full attack chain in ~60 seconds for 90% of cases. The result? 21 minutes shaved off MTTR and 30% fewer escalations to Tier 2.

πŸ”— See execution-based triage in action: https://thehackernews.com/2026/02/top-5-ways-broken-triage-increases.html
πŸ”₯2πŸ‘1
πŸ›‘ Researchers found 3 vulnerabilities in Anthropic’s #ClaudeCode allowing remote code execution and API key theft.

Simply opening a malicious repo could trigger commands or leak credentials before trust prompts appeared.

πŸ”— Read details here: https://thehackernews.com/2026/02/claude-code-flaws-allow-remote-code.html
😁12πŸ”₯6πŸ€”4
πŸ›‘οΈ Google exposes China-linked UNC2814 for breaching 53 orgs across 42 countries.

They used GRIDTIDE to hide C2 in Google Sheets, moved with stolen service accounts, and persisted via systemd.

Google has nuked πŸ”₯ the attacker’s infrastructure.

πŸ”— Read: https://thehackernews.com/2026/02/google-disrupts-unc2814-gridtide.html
πŸ”₯22😱7πŸ‘5πŸ‘2😁2πŸ€”1
🚨 Cisco is warning of active exploitation of a CVSS 10.0 flaw in Catalyst SD-WAN controllers.

CVE-2026-20127 lets unauthenticated attackers bypass auth and gain admin access. Exploitation tied to UAT-8616 dates back to 2023, including rogue peers in the control plane and root escalation.

πŸ”— Read β†’ https://thehackernews.com/2026/02/cisco-sd-wan-zero-day-cve-2026-20127.html
πŸ”₯8πŸ‘4
⚠️ Microsoft says fake Next.js job repos are being used to gain persistent access to developer machines.

Opening a VS Code project or running npm run dev can trigger hidden loaders that pull JavaScript into memory, profile the host, and connect to C2.

GitLab banned 131 linked accounts and tracked heavy abuse of Vercel.

πŸ”— Read β†’ https://thehackernews.com/2026/02/fake-nextjs-repos-target-developers.html
😁7
Attackers are stealing encrypted data under a β€œHarvest Now, Decrypt Later” strategy.

Store it now. Decrypt it when quantum machines mature, possibly between 2030 and 2035. Security Navigator 2026 outlines a five-step PQC migration plan and breach data.

πŸ”— Read β†’ https://thehackernews.com/2026/02/expert-recommends-prepare-for-pqc-right.html
πŸ‘12
Attackers are breaking in faster and hiding better than before.

⚑ 4-min breakout
πŸ–₯️ ActiveMQ β†’ LockBit
🧩 Crash-to-command Chrome
πŸ“¦ WinRAR wide exposure
πŸ” 723K weak crypto defaults
πŸ“’ Google Ads cloaking
πŸ’¬ Teams β†’ macOS malware
πŸ§ͺ AI smart contract benchmark
🌍 Judicial Rust RAT

πŸ”— Full ThreatsDay Bulletin live: https://thehackernews.com/2026/02/threatsday-bulletin-kali-linux-claude.html
😁1
Visibility empowers teams to see everything. Actionability empowers teams to do anything.

That's the foundation of The 2026 Actionability Report, new research from Axonius and the Ponemon Institute. They're shifting the conversation from the "Visibility Gap" to the "Actionability Opportunity." Because here's what the data shows:

πŸ“Š 45% of organizations consolidate assetsβ€”but only 1/3 keep inventories current
πŸ“Š 51% lose critical context during remediation when it matters most
πŸ“Š 37% remain stuck in manual workflows despite the AI revolution

The most effective security programs aren't just collecting more data. They're building systems that turn exposure intel into decisive execution.

Download the full report: https://thn.news/axonius-actionability
πŸ€”1
⚠️ A previously unseen backdoor called Dohdoor is being deployed against U.S. schools and healthcare orgs.

Tracked as UAT-10027, the campaign chains phishing β†’ PowerShell loaders β†’ DLL side-loading β†’ DoH C2 (via Cloudflare) β†’ final Cobalt Strike payload.

πŸ”— Details β†’ https://thehackernews.com/2026/02/uat-10027-targets-us-education-and.html
πŸ‘4
πŸ›‘ New botnet loader Aeternum uses Polygon smart contracts as its C2 channel.

Commands go straight to the public blockchainβ€”infected devices pull & execute them. No servers. No domains. No easy takedown.

(Also: US investigators linked a 300-device proxy net to a Belarus seller.)

πŸ”— Details β†’ https://thehackernews.com/2026/02/aeternum-c2-botnet-stores-encrypted.html
🀯3πŸ”₯1