The Hacker News
βœ”
163K subscribers
2.9K photos
19 videos
4 files
8.85K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
Over 99% of Mythos-discovered vulnerabilities remain unpatched. The Glasswing report lands in July. The window between patch publication and AI-powered weaponization is collapsing.

Picus Security published 12 vendor-neutral recommendations for security teams preparing for what comes after.

Get your copy now: https://thn.news/post-mythos-actions
πŸ”₯5🀯4😁3
A 24-year-old linked to Scattered Spider pleaded guilty after stealing $8 million in digital assets from multiple companies.

The campaign used SMS phishing to capture employee credentials, then SIM swapping to take over accounts across telecom, tech, and crypto firms.

πŸ”— Read β†’ https://thehackernews.com/2026/04/weekly-recap-vercel-hack-push-fraud.html#:~:text=British%20National%20Pleads%20Guilty%20to%20Scattered%20Spider%20Campaign
πŸ”₯10πŸ‘5😱4😁1
🚨 Researchers found 22 vulnerabilities in serial-to-IP converters, with ~20,000 devices exposed online.

Exploitation can enable device takeover and tampering with data between legacy systems and IP networks, impacting industrial operations.

πŸ”— Read β†’ https://thehackernews.com/2026/04/22-bridgebreak-flaws-expose-20000.html
πŸ”₯14😱5⚑2πŸ‘2😁2
πŸ›‘ A SystemBC-linked server exposed 1,570+ infected systems, mostly corporate.

An affiliate of The Gentlemen #ransomware used the proxy malware for covert access and stagingβ€”not all were confirmed ransomware victims.

πŸ”— Read β†’ https://thehackernews.com/2026/04/systembc-c2-server-reveals-1570-victims.html
⚑6πŸ”₯5πŸ‘3
Many companies have backups but still can’t recover from ransomware.

As Acronis’ Subramani Rao explains, backups often fail before encryption as attackers disable, delete, or corrupt them after gaining access.

Recovery breaks down due to compromised systems and slow validation.

πŸ”— Why backup doesn’t equal recovery in real attacks β†’ https://thehackernews.com/expert-insights/2026/04/why-your-backups-might-not-save-you.html
πŸ‘7πŸ”₯3
⚠️ A Python sandbox for untrusted code has a 9.3 flaw (CVE-2026-5752).

A Pyodide bug enables sandbox escape and root command execution. The project is unmaintained, so the issue remains UNPATCHED.

πŸ”— Learn more β†’ https://thehackernews.com/2026/04/cohere-ai-terrarium-sandbox-flaw.html
πŸ‘5πŸ”₯2⚑1😁1
⚑ Security teams track MTTR as a metric. Leadership sees every hour of dwell time as risk.

Delays rarely come from staffingβ€”they come from disconnected threat intel, manual lookups, and tool switching that add up over time.

πŸ”— Learn why MTTR slows down inside most SOCs β†’ https://thehackernews.com/2026/04/5-places-where-mature-socs-keep-mttr.html
πŸ‘5πŸ”₯3
πŸ›‘ China-linked APT targets India’s banks with updated malware.

LOTUSLITE v1.1 uses phishing, signed executables, and DLL sideloading to gain accessβ€”focused on espionage, not theft. Shift from U.S. govt targets to Indian financial systems.

πŸ”— Details β†’ https://thehackernews.com/2026/04/mustang-pandas-new-lotuslite-variant.html
πŸ‘8😁5πŸ”₯3⚑1
⚠️ Microsoft patched CVE-2026-40372 (CVSS 9.1) in ASP .NET Core enabling SYSTEM-level escalation.

A crypto flaw let attackers forge payloads and decrypt auth data in apps using vulnerable Data Protection on Linux/macOS.

πŸ”— Read β†’ https://thehackernews.com/2026/04/microsoft-patches-critical-aspnet-core.html
πŸ”₯6πŸ‘3πŸ€”3😁2
⚠️ Kaspersky found a new wiper targeting Venezuela’s energy sector.

Lotus Wiper fully destroys systemsβ€”no ransom, no recovery. It uses scripts to disable defenses, then wipes drives, deletes backups, and erases files using native Windows tools.

πŸ”— Details β†’ https://thehackernews.com/2026/04/lotus-wiper-malware-targets-venezuelan.html
πŸ€”10πŸ‘8🀯6πŸ”₯3😱3
Moltbook exposed 1.5M API tokens and 35,000 emails via an open database.

Agents also stored internal tokens and third-party credentials together in plaintext, creating cross-app access paths no one reviewed.

πŸ”— How β€œtoxic combinations” form across SaaS β†’ https://thehackernews.com/2026/04/toxic-combinations-when-cross-app.html
πŸ”₯12πŸ‘7😁2⚑1
Join 15+ SANS Institute instructors in a panel-style webinar to gain practical tools, proven tactics, and real-world tradecraft you can apply immediately. Detect threats sooner and respond with precision.

15+ Cybersecurity Experts. 1 Can't-Miss Webinar. Register β†’ https://thn.news/sans-2026-secure-fortress
πŸ”₯8
πŸ›‘ A Linux backdoor is using Microsoft’s cloud to stay hidden.

Harvester’s GoGra uses Outlook mailboxes as C2, executing commands via email, returning results, then deleting traces to evade detection.

Targets likely include India and Afghanistan.

πŸ”— Read β†’ https://thehackernews.com/2026/04/harvester-deploys-linux-gogra-backdoor.html
πŸ‘14πŸ”₯10😁4πŸ‘2
πŸ›‘ Supply chain attacks are stacking across npm, PyPI, and GitHub.

CanisterSprawl worm steals npm tokens via postinstall scripts, republishes infected packages, and spreads across ecosystems.

Other campaigns add backdoored packages, LLM proxy abuse, and GitHub Actions exploits.

πŸ”— Read β†’ https://thehackernews.com/2026/04/self-propagating-supply-chain-worm.html
πŸ”₯7😁6πŸ‘1
⚠️ WARNING: Checkmarx KICS Docker repo breachedβ€”malicious images replaced trusted tags.

The modified images could encrypt and exfiltrate scan data, risking exposure of credentials in IaC files. Related VS Code extensions also ran unverified remote code.

πŸ”— Details β†’ https://thehackernews.com/2026/04/malicious-kics-docker-images-and-vs.html
😁7πŸ”₯6😱5πŸ‘1
⚑ Apple fixed an iOS bug where deleted notifications stayed stored on devices.

The flaw let message data persist after apps like Signal were removed. It surfaced after forensic extraction. The patch now clears and prevents retention.

πŸ”— Details β†’ https://thehackernews.com/2026/04/apple-patches-ios-flaw-that-stored.html
πŸ‘15πŸ”₯9😁5⚑3πŸ‘1πŸ€”1
πŸ”₯ Vercel found more compromised accounts, some predating the breach.

Attackers used malware β†’ Google Workspace β†’ Vercel access, then mapped systems and decrypted environment variables. OAuth trust enabled lateral movement.

πŸ”— Details here β†’ https://thehackernews.com/2026/04/vercel-finds-more-compromised-accounts.html
⚑8πŸ”₯4πŸ‘3
⚠️ A China-aligned APT, GopherWhisper, targeted Mongolian government systems.

It uses Slack, Discord, Outlook, and file-io for control and data theft, deploying Go-based backdoors across at least 12 confirmed systems.

πŸ”— Details β†’ https://thehackernews.com/2026/04/china-linked-gopherwhisper-infects-12.html
⚑8πŸ‘4πŸ”₯4
Anthropic delayed its new AI after it proved too effective at finding and exploiting bugs.

It uncovered decades-old flaws and built working exploitsβ€”but under 1% were patched. The bottleneck is no longer discovery. It’s fixing at speed.

πŸ”— Learn how AI is overwhelming vulnerability patching β†’ https://thehackernews.com/2026/04/project-glasswing-proved-ai-can-find.html
πŸ”₯14😁5⚑4πŸ€”4
Move from AI ethics to AI execution. Here’s how to secure your AI deployment. Join Uncharted on May 5 for a technical deep dive.

Register here: https://thn.news/ai-summit-x
πŸ”₯8πŸ‘2😁2πŸ‘1
πŸ”₯ Internet’s on fire again...

πŸ’Έ $290 million DeFi hack
⚠️ Live RCE exploits
πŸ“¦ Rogue npm packages
πŸ€– AI prompt attacks
πŸ•΅οΈ App data grab
πŸ”‘ Passkey push
🧠 Backdoor claims
πŸ’€ Ransomware feud
🧩 Cryptor kits
πŸ“© Blank phishing
βš™οΈ Binary hijack
πŸ€ RAT bundle
🍏 macOS abuse
πŸ“‘ SIM farms
πŸ‡ͺπŸ‡Ί EU sanctions
πŸͺ€ Bot farm bust
🎭 StealTok extensions
🌐 Joomla backdoor
πŸ›’ Leak Bazaar
🌍 RDP scan spike
🧨 Perforce leak

πŸ”— Catch the full ThreatsDay Bulletin for this week β†’ https://thehackernews.com/2026/04/threatsday-bulletin-290m-defi-hack.html
πŸ”₯17πŸ‘4⚑1