The Hacker News
โœ”
160K subscribers
2.72K photos
18 videos
4 files
8.65K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: admin@thehackernews.com

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿ›‘ A Russian-linked toolkit is spreading through fake Windows shortcut files disguised as private key folders.

CTRL hides activity through RDP tunnels and local pipes, avoiding standard C2 traffic and reducing network detection signals.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/russian-ctrl-toolkit-delivered-via.html
๐Ÿ‘10๐Ÿ”ฅ5๐Ÿคฏ5โšก1
This media is not supported in your browser
VIEW IN TELEGRAM
GitGuardian found 29M leaked secrets in 2025, up 34%โ€”the largest jump on record.

AI services and internal systems drive exposure, while 64% of 2022 leaks remain valid; detection isnโ€™t the issue, remediation & ownership are.

๐Ÿ”— Where secrets leak & why they stay exploitable โ†’ https://thehackernews.com/2026/03/the-state-of-secrets-sprawl-2026-9.html
๐Ÿ”ฅ5๐Ÿ˜1
This week in cybersecurity...

๐Ÿ“ก Telecom backbone backdoored
๐Ÿ“ฌ FBI director's inbox owned
โ›“๏ธ Botnet hiding in blockchain
๐Ÿฆ  Chrome extension = infostealer
๐Ÿ–ฑ๏ธ ClickFix hits macOS
๐Ÿšซ Foreign routers banned
๐Ÿ‘ฎ RedLine operator extradited
๐Ÿ’ธ BEC fraudster gets 7 years
๐Ÿ“ท Deepfake-proof sensor developed
๐Ÿ“‹ 30+ CVEs, some live in the wild

Full recap is live ๐Ÿ‘‡ https://thehackernews.com/2026/03/weekly-recap-telecom-sleeper-cells-llm.html
๐Ÿ”ฅ7๐Ÿ‘6๐Ÿ˜ฑ1
Media is too big
VIEW IN TELEGRAM
๐Ÿ“ฃ Nudge Security has added AI Agent Discovery to help teams manage shadow AI risks.

Employees are rapidly creating AI agents that connect to critical systems with broad permissionsโ€”often without visibility. These agents can persist even after creators leave.

Nudge Security helps by:
๐Ÿ‘‰ Discovering agents across platforms like Copilot Studio, Salesforce, and more
๐Ÿ‘‰ Mapping ownership, permissions, and integrations
๐Ÿ‘‰ Identifying risks like exposed access, hardcoded credentials, and orphaned agents
๐Ÿ‘‰ Enforcing guardrails to validate and secure usage

AI Agent Discovery is in research preview. Start a free trial to access it: https://thn.news/ai-discovery-tool
๐Ÿ”ฅ7๐Ÿ˜4๐Ÿ‘3
โš ๏ธ A new malware loader is using fake โ€œfixโ€ prompts to trick users into running PowerShell commands.

DeepLoad runs inside legitimate Windows processes and begins stealing browser credentials and sessions early in the attack.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/03/deepload-malware-uses-clickfix-and-wmi.html
๐Ÿ˜11๐Ÿ‘7๐Ÿ”ฅ4
Most Tier 1 delays start before the threat is even understood.

Tool switching and static triage slow investigations and hide real behavior. Unified workflows and behavior-first analysis reduce friction, speed validation, and cut unnecessary escalations.

๐Ÿ”— How SOC teams cut delays at Tier 1 โ†’ https://thehackernews.com/2026/03/3-soc-process-fixes-that-unlock-tier-1.html
๐Ÿ”ฅ4๐Ÿ‘2
๐Ÿ›‘ Two OpenAI flaws showed how AI systems can expose sensitive data.

๐Ÿ”ธ One allowed silent leaks via a DNS side channel in ChatGPT
๐Ÿ”ธ Another enabled GitHub token theft via Codex injection

๐Ÿ”— What these vulnerabilities exposed about AI security โ†’ https://thehackernews.com/2026/03/openai-patches-chatgpt-data.html
๐Ÿ‘9๐Ÿ”ฅ9๐Ÿ˜1
โšก WARNING - Axios npm (83M weekly downloads) was compromised, turning installs into a malware delivery path.

Versions 1.14.1 and 0.30.4 pulled a fake dependency that dropped a cross-platform RAT, then erased evidence. Published using stolen maintainer credentials.

๐Ÿ”— What happened and how the attack worked โ†’ https://thehackernews.com/2026/03/axios-supply-chain-attack-pushes-cross.html
๐Ÿ˜ฑ16๐Ÿ‘9๐Ÿคฏ4๐Ÿ”ฅ1
Most AppSec teams say they fix critical bugs. Data shows otherwise.

In Semgrep's report, Braden Riggs finds top teams fix 63% of critical issues, while most fix just 13%. Same tools and alertsโ€”the gap is execution, not detection.

๐Ÿ”— What 50k repos reveal about real vulnerability fixes โ†’ https://thehackernews.com/expert-insights/2026/03/which-code-vulnerabilities-actually-get.html
๐Ÿ‘4๐Ÿค”2๐Ÿ”ฅ1
Silver Fox is spreading AtlasCross RAT via fake Zoom, Signal, and Teams sites.

Signed installers from typo domains bypass checks, disable security tools, and run the RAT in memory for remote access and data theft across Asia.

๐Ÿ”— Full details โ†’ https://thehackernews.com/2026/03/silver-fox-expands-asia-cyber-campaign.html
๐Ÿ‘4๐Ÿ”ฅ1
โš ๏ธ A flaw in Google Cloud Vertex AI could expose sensitive data across projects.

Default service agent permissions allow attackers to steal credentials from AI agents, access storage buckets, and move inside cloud environments.

๐Ÿ”— Details here โ†’ https://thehackernews.com/2026/03/vertex-ai-vulnerability-exposes-google.html
๐Ÿ‘3๐Ÿคฏ3๐Ÿ”ฅ1
AI is shrinking cyberattacks to hours.

Threat actors use AI to automate phishing, find vulnerabilities, and chain exploits faster than human response. Traditional security is too slow.

Defenders are moving to continuous AI-driven testing and fixes.

๐Ÿ”— Why speed now defines cybersecurity โ†’ https://thehackernews.com/2026/03/the-ai-arms-race-why-unified-exposure.html
๐Ÿ˜ฑ8๐Ÿ‘3๐Ÿ˜2๐Ÿ”ฅ1
AI is redefining cyber roles, hiring, and skills.

See where teams are rebuilding and where careers are heading by downloading your copy of 2026 Workforce Research Report.

๐Ÿ”— Download โ†’ https://thn.news/sans-workforce-research
๐Ÿ‘4๐Ÿค”4๐Ÿ”ฅ2
โš ๏ธ A zero-day in TrueConf let attackers spread malware through its own update system.

CVE-2026-3502 (CVSS 7.8) was exploited by compromising on-prem servers, pushing tampered updates to all connected clients in government networks across Southeast Asia.

๐Ÿ”— How the TrueChaos campaign weaponized software updates โ†’ https://thehackernews.com/2026/03/trueconf-zero-day-exploited-in-attacks.html
๐Ÿ”ฅ4๐Ÿค”4๐Ÿคฏ3๐Ÿ‘2
๐Ÿ”ฅ Google has opened Android verification to all developers.

Developer verification is now live globally, letting devs confirm identity and register apps ahead of enforcement.

From Sept 30, 2026, only verified apps install in select markets, expanding globally in 2027.

๐Ÿ”— Timeline and what devs must do next โ†’ https://thehackernews.com/2026/03/android-developer-verification-rollout.html
๐Ÿ‘13๐Ÿ˜ฑ8๐Ÿ˜6๐Ÿคฏ4๐Ÿ”ฅ1
๐Ÿ”ฅ Anthropic accidentally exposed 512,000 lines of Claude Code via an npm packaging error.

The code reveals internal systems like multi-agent workflows, guardrails, and automationโ€”giving attackers a clear map to study and exploit.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/04/claude-code-tleaked-via-npm-packaging.html
๐Ÿ”ฅ33๐Ÿคฏ20๐Ÿ‘4๐Ÿ˜4
โš ๏ธ Google links the Axios npm compromise to North Korean group UNC1069.

Attackers hijacked the maintainer account and pushed malicious versions that executed during install via a hidden dependency, deploying a cross-platform backdoor (Windows, macOS, Linux) and then removing traces.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/04/google-attributes-axios-npm-supply.html
๐Ÿคฏ13๐Ÿ‘4๐Ÿ”ฅ4๐Ÿ˜4โšก3
Vulnerability management is shifting from periodic scans to continuous monitoring.

Exploitation can start within hours, making CVSS scores and patch cycles too slow. Teams now need continuous visibility, threat context, and real-time detection to manage actual risk.

๐Ÿ”— Why proactive vulnerability management is replacing scans โ†’ https://thehackernews.com/expert-insights/2026/03/wazuh-for-proactive-vulnerability.html
๐Ÿ‘12๐Ÿ”ฅ4โšก3
๐Ÿ›‘ Chrome 0-day Warning!

Tracked as CVE-2026-5281, this WebGPU (Dawn) use-after-free bug allows code execution via a crafted page if the renderer is compromised.

Itโ€™s the 4th exploited Chrome browser zero-day in 2026.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/04/new-chrome-zero-day-cve-2026-5281-under.html
๐Ÿ”ฅ15๐Ÿ‘5โšก3
Cyberattacks are shifting away from malware.

84% now use built-in tools like PowerShell and WMIC to move inside systems without raising alarms. These actions look normal, making detection harder while excess access creates hidden risk.

๐Ÿ”— Why attackers now use your own tools โ†’ https://thehackernews.com/2026/04/3-reasons-attackers-are-using-your.html
๐Ÿคฏ5๐Ÿ‘4๐Ÿ”ฅ2๐Ÿค”2๐Ÿ˜ฑ1
๐Ÿšจ Microsoft identified a campaign using WhatsApp to deliver malicious VBS files.

The attack renames Windows tools, uses cloud payloads and installs AnyDesk to enable stealthy persistence and remote access while blending into normal activity.

๐Ÿ”— Read โ†’ https://thehackernews.com/2026/04/microsoft-warns-of-whatsapp-delivered.html
๐Ÿ”ฅ9๐Ÿ‘5๐Ÿ˜5