The Hacker News
βœ”
163K subscribers
2.89K photos
19 videos
4 files
8.84K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
[Webinar] Ghost Identities in Autonomous AI...

Live session on securing non-human identities across cloud environments.

Learn to discover service accounts and API keys, remediate excessive permissions, and automate removal of ghost identities before risk escalates.

πŸ”— Watch it here β†’ https://thehackernews.com/2026/04/webinar-find-and-eliminate-orphaned-non.html
πŸ‘6πŸ”₯3
⚠️ Researchers uncovered PowMix Botnet, active since Dec 2025.

Randomized C2 beaconing and phishing ZIP β†’ LNK β†’ PowerShell chains enable in-memory control and persistence.

RondoDox separately exploits 170+ flaws for DDoS and crypto mining.

πŸ”—Read β†’ https://thehackernews.com/2026/04/newly-discovered-powmix-botnet-hits.html
😁6πŸ”₯3⚑2
🚨 CISA flags active exploitation of an Apache ActiveMQ flaw enabling remote code execution.

Attackers abuse the Jolokia API to run OS commands. Default credsβ€”and in some versions no authβ€”make it easier to exploit.

πŸ”— Read β†’ https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html
πŸ”₯9
⚠️ A global operation just disrupted DDoS-for-hire networks used by cybercriminals.

53 domains seized, 4 arrests in Operation PowerOFF across 21 countries. Authorities accessed 3M+ user accounts tied to these services.

πŸ”— Read β†’ https://thehackernews.com/2026/04/operation-poweroff-seizes-53-ddos.html
πŸ”₯11⚑4πŸ‘4😁3
πŸ”₯ NIST will now prioritize CVE analysis.

263% rise in vulnerabilities forced it to enrich only high-risk cases (KEV, federal, critical software). Others stay listed but without full analysis, marked β€œNot Scheduled.”

πŸ”— Read about it here β†’ https://thehackernews.com/2026/04/nist-limits-cve-enrichment-after-263.html
πŸ‘15πŸ”₯6😱3
Google updated Android 17 privacy rules while reporting 8.3B ads blocked and 24.9M accounts suspended in 2025.

Apps must now limit contact and location access or justify it. Separately, AI is stopping most malicious ads before users see them.

πŸ”— Read β†’ https://thehackernews.com/2026/04/google-blocks-83b-policy-violating-ads.html
πŸ‘17πŸ‘7⚑3πŸ€”3😱1
⚑ Researchers confirm exploitation of three Microsoft Defender flawsβ€”one patched (CVE-2026-33825) , two unpatched.

Attackers escalate privileges and can block Defender updates.

πŸ”— Learn how these flaws are used in attacks β†’ https://thehackernews.com/2026/04/three-microsoft-defender-zero-days.html
⚑16πŸ‘8πŸ€”4😱4😁2πŸ”₯1
Attackers are exploiting CVE-2024-3721 in TBK DVRs to deploy Mirai variant Nexcorium.

It spreads via old exploits and default creds, persists on devices, and launches DDoS attacks. EoL TP-Link routers are also being targeted via known flaws.

πŸ”— Read β†’ https://thehackernews.com/2026/04/mirai-variant-nexcorium-exploits-cve.html
πŸ‘11πŸ”₯5😁2
Sanctioned #cryptocurrency exchange Grinex is shutting down after a $13.74M hack.

Stolen funds were quickly moved and swapped to avoid freezing. The platform is linked to Garantex, flagged for laundering over $100M.

πŸ”— Read β†’ https://thehackernews.com/2026/04/1374m-hack-shuts-down-sanctioned-grinex.html
πŸ”₯16πŸ‘1
The EU says its age verification app is ready for rollout.

Users can prove age with ID without sharing personal data. The system is anonymous, open source, and built to support child safety rules across platforms.

πŸ”— What the EU’s system actually does β†’ https://thehackernews.com/2026/04/threatsday-bulletin-17-year-old-excel.html#anonymous-age-checks
πŸ€”46😱18πŸ‘11😁10🀯10πŸ”₯6
πŸ”₯ Vercel disclosed a BREACH after an attacker used a compromised 3rd-party AI tool to take over an employee account.

Some internal systems, non-sensitive variables, and limited customer credentials were exposed. No evidence sensitive data was accessed.

πŸ”— Read β†’ https://thehackernews.com/2026/04/vercel-breach-tied-to-context-ai-hack.html
😁14πŸ‘7πŸ‘4πŸ”₯2
Researchers found OT malware targeting Israeli water systems.

ZionSiphon alters chlorine and pressure controls, scanning Modbus/DNP3/S7comm and spreading via USB. It activates only inside Israeli IP ranges + OT setups, but current code is unfinished.

πŸ”— Read β†’ https://thehackernews.com/2026/04/researchers-detect-zionsiphon-malware.html
πŸ‘26😱8⚑7πŸ‘4πŸ”₯1😁1
πŸ›‘ A design flaw in Anthropic’s MCP allows remote command execution on AI systems.

150M+ downloads affected as unsafe STDIO defaults expose 7,000+ services, including tools like LangChain and Flowise.

Anthropic calls the behavior β€œexpected,” leaving the risk across the AI supply chain.

πŸ”— Read β†’ https://thehackernews.com/2026/04/anthropic-mcp-design-vulnerability.html
πŸ”₯16πŸ‘5
AI tools look flawless in demosβ€”but break in real operations.

Clean data and ideal prompts don’t exist in production. Messy inputs, latency, edge cases, and weak integrations quickly surface.

πŸ”— What breaks when AI leaves the demo β†’ https://thehackernews.com/2026/04/why-most-ai-deployments-stall-after-demo.html
πŸ‘7πŸ”₯4
Stop using Spreadsheets & PDFs for Pentest Reporting.

Move from static files to live findings, automate remediation, and prove risk reduction.

πŸ”— See it in action β†’ https://thn.news/plextrac-pentest
πŸ”₯8πŸ‘4😁4
This week didn’t break anything. It bent everything:

⚑ Vercel hacked
🌐 DDoS busted
πŸ€– PowMix botnet
πŸ“’ Push fraud
πŸ“ Obsidian RAT
⬇️ CPUID trojan
🧩 Chrome spyware
🧠 AI cyber
πŸ’° Vect ransomware
πŸ’¬ Teams trap
πŸ—‚οΈ CGrabber steal
πŸ“§ Mail breach
πŸ”‘ Access trade
πŸ› οΈ Adaptix C2
🧬 Adware backdoor
πŸ’‰ SQL attacks
πŸ–₯️ VM stealth
🎭 Fake installer

πŸ”— Scroll through the full recap β†’ https://thehackernews.com/2026/04/weekly-recap-vercel-hack-push-fraud.html
πŸ”₯8πŸ‘5⚑2
⚠️ SGLang has a critical flaw enabling remote code execution (CVSS 9.8) via malicious GGUF model files.

A crafted Jinja2 template runs when /v1/rerank is triggered, executing attacker code on the server.

πŸ”— How GGUF templates become an RCE path β†’ https://thehackernews.com/2026/04/sglang-cve-2026-5760-cvss-98-enables.html
πŸ”₯6πŸ‘4⚑2
⚠️ CISA added 8 actively exploited vulnerabilities to KEV across Cisco, Quest, PaperCut, TeamCity, Kentico, and Zimbra.

Includes 3 Cisco SD-WAN flaws and a Quest KACE bug (CVSS 10.0) enabling user impersonation.

Federal patch deadlines: April 23 (Cisco), May 4 (others).

πŸ”— Read β†’ https://thehackernews.com/2026/04/cisa-adds-8-exploited-flaws-to-kev-sets.html
πŸ‘4πŸ”₯2
96% of security teams can’t confirm if risks are exploitable.

In this analysis, Jean-Philippe Salles of Filigran shows CTEM is failing at prioritization and validation, with 42% of SOC time wasted on low-value work.

The gap is poor use of threat intelligence.

πŸ”— Why CTEM breaks without intel-driven context β†’ https://thehackernews.com/expert-insights/2026/04/why-threat-intelligence-is-missing-link.html
πŸ”₯9😁6
Google fixed an Antigravity IDE flaw that enabled arbitrary code execution via a search tool input.

Attackers could inject commands, bypass sandbox controls, and run scripts automatically. Similar prompt injection flaws are now seen across AI dev tools.

πŸ”— Read β†’ https://thehackernews.com/2026/04/google-patches-antigravity-ide-flaw.html
πŸ‘4😁3πŸ”₯2
πŸ›‘ Android malware is hijacking NFC payments via a real app.

Researchers found NGate abusing HandyPay to relay card data and steal PINs for ATM withdrawals. Spread via fake lottery sites and spoofed app pages, targeting Brazil since Nov 2025.

πŸ”— Read β†’ https://thehackernews.com/2026/04/ngate-campaign-targets-brazil.html
πŸ‘6πŸ”₯3😁2😱2