The Hacker News
βœ”
160K subscribers
2.72K photos
18 videos
4 files
8.65K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
30% of breaches now involve third parties like vendors and SaaS.

The perimeter has shifted outward, and regulations now require continuous oversight. Cynomi shows TPRM is now a core security function, not just compliance.

πŸ”— Why TPRM is becoming central to security β†’ https://thehackernews.com/2026/04/why-third-party-risk-is-biggest-gap-in.html
πŸ‘5πŸ”₯3
SparkCat malware has reappeared on Apple and Google app stores, hiding inside everyday apps.

It scans photos for crypto recovery phrases and sends them to attackers, using OCR to extract sensitive data from images.

πŸ”— Read β†’ https://thehackernews.com/2026/04/new-sparkcat-variant-in-ios-android.html
πŸ”₯6πŸ€”3
πŸ›‘ Attackers are using HTTP cookies to control PHP web shells on Linux servers.

Malware stays inactive and runs only when specific cookie values are sent, blending into normal traffic. Cron jobs can also recreate it for persistence.

πŸ”— How cookie-triggered web shells evade detection β†’ https://thehackernews.com/2026/04/microsoft-details-cookie-controlled-php.html
πŸ”₯19😁9
πŸ›‘ China-linked TA416 is again targeting European governments, using OAuth redirect abuse and cloud-hosted malware to deliver PlugX.

Activity expanded to the Middle East in 2026, tied to conflict-driven intelligence gathering.

πŸ”— Read β†’ https://thehackernews.com/2026/04/china-linked-ta416-targets-european.html
πŸ”₯9πŸ‘9πŸ‘2
⚠️ Fortinet is warning of active exploitation of CVE-2026-35616 (CVSS 9.1) in FortiClient EMS.

The flaw lets unauthenticated attackers bypass API controls and run code. This is the second critical EMS flaw exploited in weeks.

πŸ”— Full details β†’ https://thehackernews.com/2026/04/fortinet-patches-actively-exploited-cve.html
πŸ”₯17πŸ‘4
πŸ›‘ 36 npm packages posing as Strapi plugins were used to deliver malware that runs on install.

They exploited Redis and PostgreSQL, stole credentials, and deployed backdoors via postinstall scripts with full user or CI/CD access.

πŸ”— Details β†’ https://thehackernews.com/2026/04/36-malicious-npm-packages-exploited.html
🀯11😱9πŸ‘4πŸ”₯1
🚨 North Korea-linked hackers spent 6 months building trust before stealing $285M from Drift.

They posed as a trading firm, met contributors in person, deposited $1M+, then used malicious code and a fake wallet app to gain access.

πŸ”— How social engineering enabled the Drift crypto theft β†’ https://thehackernews.com/2026/04/285-million-drift-hack-traced-to-six.html
😱23🀯12πŸ”₯10😁7πŸ‘5πŸ‘3
πŸ”₯ Germany’s BKA has identified a key figure behind the REvil #ransomware group.

Daniil Shchukin (β€œUNKN”) is accused of leading REvil, linked to 130 attacks in Germany causing over €35.4M in damage, with €1.9M in ransom paid.

πŸ”— Learn more here β†’ https://thehackernews.com/2026/04/bka-identifies-revil-leaders-behind-130.html
😁16πŸ‘8πŸ‘5πŸ”₯4⚑1
πŸ›‘ Qilin and Warlock #ransomware are disabling defenses before attacks using BYOVD techniques.

Qilin uses a side-loaded DLL to kill 300+ EDR drivers via vulnerable kernel drivers. Warlock exploits SharePoint and uses similar drivers to bypass kernel-level security, often delaying ransomware execution.

πŸ”— Find the technique disabling EDR tools β†’ https://thehackernews.com/2026/04/qilin-and-warlock-ransomware-use.html
🀯8πŸ‘5πŸ”₯3
AI isn’t making attacks smarter, says Martin Zugec, Technical Solutions Director at Bitdefender. It’s making them cheaper and easier to scale.

Current AI malware is often unreliable and less advanced, but it can hit thousands of standardized systems fast.

πŸ”— Why scale matters more than sophistication in AI threats β†’ https://thehackernews.com/expert-insights/2026/04/why-ai-does-not-need-to-be-innovative.html
😁7πŸ‘4πŸ‘2πŸ”₯1
Everything hit at once this week ...

πŸ“¦ Supply-chain: Axios hack
🌐 Exploits: Chrome 0-day, TrueConf, Fortinet
🍎 Patches: Apple DarkSword fixes
🧩 Malware: ClickFix, DeepLoad, Mirax, Venom
πŸ€– Leak: Claude code exposure
🎯 Phishing: device code surge, banking scams
πŸ•΅οΈ Privacy: LinkedIn tracking claims
πŸ›°οΈ Spyware: Paragon use confirmed
🌍 Infra: residential proxy abuse
πŸ’° Targeting: crypto org attacks
πŸ“± Policy: India SIM-binding
πŸ” APT: access regain attempts
πŸ’£ Insider: extortion case
❀️ Data: OkCupid settlement
🧠 Trend: stealer surge, malicious extensions

Read the full recap β†’ https://thehackernews.com/2026/04/weekly-recap-axios-hack-chrome-0-day.html
πŸ”₯8⚑7😱3πŸ‘2πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
⚠️ A compromised AI library exposed developer machines.

1,705 packages pulled infected LiteLLM versions, harvesting SSH keys and cloud creds from local systems via dependencies.

It worked because secrets sit in plaintext across files and tools.

πŸ”— How one dependency exposed thousands of environments β†’ https://thehackernews.com/2026/04/how-litellm-turned-developer-machines.html
🀯9πŸ”₯6πŸ‘1
Automated pentesting evaluates environments through chained attack paths. If step A fails, steps B through Z never execute.

One blocked step near the top = cascading blind spot across every downstream technique.

Picus Security mapped these two other structural gaps in a new whitepaper.

Download now β†’ https://thn.news/automated-blind-spots
⚑5πŸ”₯4πŸ‘3
🚨 Attackers now move across Windows, macOS, Linux, and mobile in one campaign.

Multi-OS attacks break SOC workflows, splitting one threat into many investigations and slowing validation.

That delay gives attackers time to spread and persist.

πŸ”— Why fragmented triage increases risk β†’ https://thehackernews.com/2026/04/multi-os-cyberattacks-how-socs-close.html
🀯8πŸ‘1πŸ”₯1πŸ€”1
🚨 DPRK-linked attackers used GitHub as C2 in phishing-led attacks on South Korean orgs.

LNK files trigger hidden PowerShell, set persistence, and exfiltrate system data to attacker repos while pulling new payloads.

πŸ”— Read β†’ https://thehackernews.com/2026/04/dprk-linked-hackers-use-github-as-c2-in.html
πŸ”₯10πŸ‘1πŸ€”1
⚠️ Iran-linked actors targeted Microsoft 365 accounts in 3 attack waves in March 2026, hitting 300+ orgs in Israel and 25+ in the UAE.

They used password spraying via Tor/VPNs to access mailboxes.

At the same time, Pay2Key ransomware resurfaced with stronger evasion and log wiping.

πŸ”— Read β†’ https://thehackernews.com/2026/04/iran-linked-password-spraying-campaign.html
πŸ‘17πŸ”₯9🀯6😁5πŸ‘1
πŸ›‘ Flowise has a CVSS 10.0 RCE flaw (CVE-2025-59528) now under active attack.

A bug in MCP config lets attackers run JavaScript with full system access using just an API token. Over 12,000 exposed instances raise risk.

πŸ”— Exploitation details β†’ https://thehackernews.com/2026/04/flowise-ai-agent-builder-under-active.html
⚑9πŸ”₯3
⚠️ WARNING: China-linked Storm-1175 is breaching networks and deploying ransomware in under 72 hours.

It chains zero-day and known flaws, then uses trusted tools to move, steal data, and evade detection across healthcare, finance, and more.

πŸ”— Read β†’ https://thehackernews.com/2026/04/china-linked-storm-1175-exploits-zero.html
πŸ‘6⚑3πŸ”₯3😱2
⚑ New research shows GPUs can be used to take over a system.

GPUBreach attack enables root access by flipping bits in GPU memory, corrupting page tables, and chaining into CPU exploitsβ€”even with IOMMU enabled.

πŸ”— Read details β†’ https://thehackernews.com/2026/04/new-gpubreach-attack-enables-full-cpu.html
😱18πŸ”₯8πŸ‘5πŸ‘1😁1
Ilan Nacmias at Sygnia shares a case where AI security tools worked, but no decisions were made.

Risks were clear, but teams disagreed and leaders saw things as under control. Progress came only after linking risk to business impact.

πŸ”— Why AI didn’t fix execution in cybersecurity β†’ https://thehackernews.com/expert-insights/2026/04/ai-will-change-cybersecurity-humans.html
πŸ”₯6⚑2
Credential security isn’t just about breaches.

Daily issues add up: 30% of helpdesk tickets are password resets (~$70 each), while exposed credentials often go unnoticed.

Forced resets increase weak passwords without reducing risk.

πŸ”— Why credential issues cost more than breaches β†’ https://thehackernews.com/2026/04/the-hidden-cost-of-recurring-credential.html
πŸ‘4πŸ”₯3πŸ€”1