The Hacker News
βœ”
154K subscribers
2.56K photos
17 videos
4 files
8.5K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
πŸ›‘ ALERT: ClickFix campaigns are spreading macOS infostealer MacSync.

Victims paste a Terminal command from fake install pages or ChatGPT threads, installing malware that steals credentials, files, Keychain data, and crypto wallet seeds.

πŸ”— Read β†’ https://thehackernews.com/2026/03/clickfix-campaigns-spread-macsync-macos.html
😁12πŸ”₯6πŸ‘3
Stop testing silos. Attackers don’t exploit single flaws; they chain them.

Agentic AI validation replaces fragmented scanning with continuous, system-wide testing. It maps the path from threat to asset in real-time.

πŸ”— Stop guessing. Start validating β†’ https://thehackernews.com/2026/03/why-security-validation-is-becoming.html
πŸ”₯5πŸ‘3😁2πŸ€”2🀯2
πŸ”₯ This week’s CYBER RECAP is pure β€œπŸ‘€ what the hell now” energy.

Fresh bugs. Quiet abuse. Supply-chain messes. Botnet weirdness. Phishing getting uglier. AI doing AI things. And the usual pile of flaws you really don’t want to ignore.

Skim it for the headlines. Read it properly for the stuff that’s going to show up in everyone’s incident notes next.

πŸ”— Read β†’ https://thehackernews.com/2026/03/weekly-recap-chrome-0-days-router.html
πŸ”₯8πŸ‘3πŸ€”1🀯1
Attackers are hijacking GitHub accounts and silently planting malware in Python repos.

ForceMemo uses stolen tokens to force-push malicious code while preserving the original commit author and messageβ€”rewriting Git history with no visible trace in the UI.

πŸ”— Read β†’ https://thehackernews.com/2026/03/glassworm-attack-uses-stolen-github.html
πŸ”₯15😱9πŸ‘7😁5
⚠️ CISA flags CVE-2025-47813 in Wing FTP as actively exploited.

It leaks server paths via cookie errorsβ€”low severity, high value. Attackers can pair it with a known RCE flaw already used to deploy malware.

πŸ”— How it enables real attack chains β†’ https://thehackernews.com/2026/03/cisa-flags-actively-exploited-wing-ftp.html
πŸ‘8πŸ”₯4
Firewalls still see encrypted port 443 traffic, not what users actually do inside SaaS apps or AI tools.

As Dedi Shindler (Red Access) notes, that blinds teams to prompts, data leaks, and session activity. The fix isn’t replacing firewallsβ€”it’s adding session-level visibility.

πŸ”— Firewall-native SSE explained β†’ https://thehackernews.com/expert-insights/2026/03/the-firewall-isnt-blind-it-just-needs.html
😁10πŸ‘5πŸ”₯4πŸ‘3
⚠️ A fake job notice triggered full compromise in a Konni campaign.

The attack drops EndRAT, enabling remote control, persistence, and silent data theft, then spreads via KakaoTalk messages from the victim’s account.

Trusted contacts become the attack path.

πŸ”— Read β†’ https://thehackernews.com/2026/03/konni-deploys-endrat-through-spear.html
πŸ‘9πŸ”₯6πŸ‘2
Most CISOs don’t know where AI runs in their own orgs. 67% lack visibilityβ€”0% have full oversight.

AI is spread across cloud, apps, and identity, owned by no one. Risk can’t be measured, let alone controlled.

πŸ”— Data shows where AI security actually breaks β†’ https://thehackernews.com/2026/03/ai-is-everywhere-but-cisos-are-still.html
πŸ”₯4πŸ‘3😱3
⚠️ A full Roundcube exploit kit tied to APT28 was found on a live server, targeting Ukrainian government email.

It enables XSS takeover, mailbox exfiltration, hidden forwarding, and even 2FA secret theft. Includes a new CSS-based data exfiltration method.

πŸ”— Toolkit details β†’ https://thehackernews.com/2026/03/weekly-recap-chrome-0-days-router.html#:~:text=Roundcube%20Exploitation%20Toolkit%20Discovered
πŸ”₯5πŸ‘3πŸ‘2
AI agents don’t need prompts to turn rogue. They can coordinate attacks on their own.

Tests show agents collaborating to escalate privileges, disable defenses, and steal dataβ€”even persuading each other to act.

πŸ”— Report details how agent-to-agent collusion bypasses controls β†’ https://thehackernews.com/2026/03/weekly-recap-chrome-0-days-router.html#:~:text=Rogue%20AI%20Agents%20Can%20Work%20Together%20to%20Engage%20in%20Offensive%20Behaviors
🀯4πŸ‘3πŸ”₯3😁2
The best security teams aren't just reactive. They're informed.

Knowing what attackers are doing, how they operate, and where your gaps are isn't a nice-to-have, it's the foundation of a modern defense strategy. That's what Threat-Informed Defense delivers.

This guide lays out a six-stage Threat-Informed Defense pipeline to help your team:

β¦Ώ Cut through alert noise and focus on threats that matter
β¦Ώ Test your people, processes, and technology against realistic attack scenarios
β¦Ώ Put CTI to work operationally with tools like OpenCTI + OpenAEV
β¦Ώ Turn detection and response into a continuous, self-improving cycle

Download the guide today β†’ https://thn.news/infosec-threat-guide
πŸ‘2😁2πŸ”₯1
⚠️ LeakNet drops access brokers for ClickFix compromised sites trick users into running msiexec commands via fake CAPTCHA.

Lower cost, faster scale. Deno executes payloads in memory, then lateral movement and data theft follow.

πŸ”— Details here β†’ https://thehackernews.com/2026/03/leaknet-ransomware-uses-clickfix-via.html
πŸ”₯13πŸ‘4⚑1πŸ‘1
πŸ›‘ Amazon Bedrock, LangSmith, and SGLang flaws expose data leaks, token theft, and RCE risks across AI platforms.

Bedrock allows DNS-based exfiltration, LangSmith had account takeover, and SGLang remains vulnerableβ€”showing weak isolation in real-world AI systems.

πŸ”— Exploits and fixes explained β†’ https://thehackernews.com/2026/03/ai-flaws-in-amazon-bedrock-langsmith.html
😁9πŸ‘5⚑1πŸ”₯1
⚠️ WARNING - An unpatched critical telnetd bug (CVE-2026-32746) lets attackers gain full system access with no credentials.

One connection to port 23 is enough to trigger memory corruption and execute code as root.

No patch yet. Prior telnet flaw is already exploited in the wild.

πŸ”—Read β†’ https://thehackernews.com/2026/03/critical-telnetd-flaw-cve-2026-32746.html
😱10πŸ‘9😁3πŸ€”3⚑1
🚨 Apple patched a WebKit flaw that lets crafted pages bypass browser isolation.

CVE-2026-20643 impacts iOS, iPadOS, and macOS. Fixes now ship via background updates, outside full OS releases.

πŸ”— Details here β†’ https://thehackernews.com/2026/03/apple-fixes-webkit-vulnerability.html
πŸ”₯7⚑2πŸ€”2πŸ‘1
Valid credentials now drive 30% of attacks, per IBM.

As Ani Khachatryan explains, PAM controls access but can’t detect misuse after login. ITDR fills that gap with real-time monitoring and response, closing the identity attack loop.

πŸ”— Why identity defense now needs both layers β†’ https://thehackernews.com/expert-insights/2026/03/a-unified-identity-defense-layer-why.html
πŸ”₯2πŸ‘1πŸ‘1
πŸ›‘ ALERT - A new flaw in #Ubuntu 24.04+ lets attackers gain full root access from low privileges.

By timing system cleanup, they replace a snap directory and execute code as rootβ€”no user action required.

πŸ”— Exploit steps and patched versions β†’ https://thehackernews.com/2026/03/ubuntu-cve-2026-3888-bug-lets-attackers.html
🀯27⚑4πŸ‘1😱1
πŸ›‘οΈ Security teams see alerts. They don’t see how they connect.

Small gaps, weak settings, and cloud access can link into a path to sensitive data. This walkthrough shows how CSMA maps those paths and helps fix them fast.

πŸ”— How small issues form real attack paths β†’ https://thehackernews.com/2026/03/product-walkthrough-how-mesh-csma.html
πŸ€”3πŸ‘2🀯2😁1
⚠️ Low-cost IP KVM devices expose a direct path to full system takeover.

Researchers found 9 flaws across 4 devices, including unauthenticated root access and remote code execution. Operating below the OS, they let attackers bypass security tools and maintain silent, persistent control.

πŸ”— Read β†’ https://thehackernews.com/2026/03/9-critical-ip-kvm-flaws-enable.html
😁7πŸ”₯3πŸ‘2πŸ‘1
πŸ›‘ A Magecart skimmer hid its payload in a favicon’s EXIF metadata, never entering the codebase.

A fake CDN script fetched the image, decoded a hidden URL, and executed it in the browser.

No repo changes. No scan alerts. Payment data was exfiltrated at checkout.

πŸ”— Loader chain and why static tools missed it β†’ https://thehackernews.com/2026/03/claude-code-security-and-magecart.html
🀯5πŸ€”3πŸ‘2😱1
⚠️ CERT/CC warns a ZIP flaw tracked as CVE-2026-0866 lets attackers hide malware using malformed archive headers.

Security tools trust the header and miss the payload, while it can still be extracted and executed with the right method.

It breaks how AV and EDR validate files.

πŸ”— How Zombie ZIP bypasses detection and runs payloads β†’ https://thehackernews.com/2026/03/threatsday-bulletin-oauth-trap-edr.html#zip-evasion-technique
πŸ‘1