The Hacker News
βœ”
163K subscribers
2.89K photos
19 videos
4 files
8.83K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
πŸ›‘ LiteLLM CVE-2026-42208 exploited in ~36 hours.

A pre-auth SQL injection exposed credential tables with LLM and cloud keysβ€”turning a simple flaw into account-level risk.

No PoC needed; advisory and schema were enough.

πŸ”— Read details β†’ https://thehackernews.com/2026/04/litellm-cve-2026-42208-sql-injection.html
😁9⚑3πŸ‘3
⚠️ CISA added two actively exploited vulnerabilities to KEV, affecting Windows and ScreenConnect.

A Windows flaw links to an incomplete patch tied to APT28 campaigns. ScreenConnect bugs are now used in Medusa ransomware attacks.

πŸ”— Read β†’ https://thehackernews.com/2026/04/cisa-adds-actively-exploited.html
😁5πŸ‘3πŸ”₯1
🚨 WARNING: cPanel patched an auth flaw affecting all supported versionsβ€”forcing providers to restrict access.

Namecheap blocked ports 2083/2087, disabling control panel access until patches deployed.

πŸ”— Read β†’ https://thehackernews.com/2026/04/critical-cpanel-authentication.html
πŸ‘8😁7⚑3πŸ€”3
Security teams close hundreds of vulnerabilities and still can’t prove they’re safer.

Only ~2% of exposures matter when mapped to real attack paths and critical assets. The rest is noise from tools that miss context and exploitability.

πŸ”— Why most platforms miss real risk β†’ https://thehackernews.com/2026/04/what-to-look-for-in-exposure-management.html
😁6πŸ‘3πŸ”₯2
BeyondTrust’s latest Microsoft Vulnerabilities Report is out, and the numbers should concern every security leader.

Critical vulnerabilities doubled, Azure & Dynamics surged 9x, and 40% of all flaws were tied to Elevation of Privilege.

More insights: https://thn.news/msft-vuln-report

#MVR2026 #LeastPrivilege
πŸ‘3😁2πŸ”₯1
πŸ›‘ A wave of attacks is using layered npm dependencies to deliver hidden malware.

Fake SDKs, AI-assisted commits, and job scams all route through packages that pull second-stage payloads, stealing crypto wallets, credentials, and source code. Linked to North Korean campaigns targeting developers.

πŸ”— Learn how these attacks connect across npm, PyPI, and GitHub β†’ https://thehackernews.com/2026/04/new-wave-of-dprk-attacks-uses-ai.html
😱8πŸ‘7⚑4
⚠️ ALERT β€” SAP related npm packages were just found shipping credential-stealing malware.

A preinstall script runs on install, steals tokens, and injects GitHub Actions to self-propagate, exfiltrating encrypted secrets via victim-owned repos.

πŸ”— Read β†’ https://thehackernews.com/2026/04/sap-npm-packages-compromised-by-mini.html
😱7πŸ‘3😁1
πŸ›‘ Gemini and Cursor vulnerabilities exposed direct code execution in dev workflows.

#Gemini CLI (CVSS 10.0) auto-trusted folders in CI, letting malicious .gemini/ configs from PRs run on hosts. #Cursor bugs triggered hidden Git hooks and exposed local API keys via extensions.

πŸ”— Details β†’ https://thehackernews.com/2026/04/google-fixes-cvss-10-gemini-cli-ci-rce.html
😁13πŸ‘4πŸ”₯1
⚠️ UPDATE: #cPanel flaw now tracked as CVE-2026-41940 (CVSS 9.8)β€”an auth bypass granting unauthenticated admin access.

Actively exploited as a 0-day for weeks. Root cause: CRLF injection lets attackers forge sessions and escalate to root.

πŸ”— Exploit mechanics and real-world impact β†’ https://thehackernews.com/2026/04/critical-cpanel-authentication.html
πŸ‘9πŸ‘1😁1
⚠️ A new #Linux flaw mirrors Dirty Pipeβ€”but adds cross-container impact.

β€œCopy Fail” (CVE-2026-31431) lets any local user overwrite cached system files and run them as root. No race condition.

Works across major Linux distros since 2017.

πŸ”— Read β†’ https://thehackernews.com/2026/04/new-linux-copy-fail-vulnerability.html
😱12😁6πŸ‘4⚑1🀯1
🚨 Attackers are targeting enterprise admins with fake tools and running control through #Ethereum smart contracts.

Malware spreads via SEO-poisoned #GitHub repos, then pulls live C2 from blockchain. No domains to block. Access lands on high-privilege systems.

πŸ”— Learn how this campaign turns search results into enterprise breaches β†’ https://thehackernews.com/2026/04/etherrat-distribution-spoofing.html
😁5πŸ‘4πŸ”₯1
⚠️ Malware now ships its payload inside the installer.

DEEP#DOOR embeds a Python backdoor in a script, extracts it at runtime, and avoids external downloads.

Using tunneling, it keeps access and steals credentials with minimal trace.

πŸ”— Read β†’ https://thehackernews.com/2026/04/new-python-backdoor-uses-tunneling.html
😱6πŸ‘3πŸ€”3
AI-enabled cyber attacks are on the rise. Are you prepared? Most orgs aren’t as prepared as they think for AI-enabled attacks, but it’s never too late to start.

The cyber risk playbook for the AI threat era draws on research from over 200 GRC, IT, and cybersecurity professionals to gain new insights into AI-enabled attacks and the need for proactive cyber resilience.

Get the playbook today β†’ https://thn.news/nyc-cyber-training
πŸ‘3πŸ€”3😁1
πŸ”₯ Cyber chaos exploding this week...

β€’ Fake cell towers
β€’ npm .env theft
β€’ Extensions sell data
β€’ 3.4M servers exposed
β€’ Vidar tops stealers
β€’ 38 OpenEMR flaws
β€’ Komari backdoor used
β€’ Saiga 2FA kits
β€’ Black Axe arrests
β€’ PhantomRPC unpatched
β€’ Robinhood phishing trick
β€’ arXiv leaks keys
β€’ Qinglong crypto mining
β€’ PyPI supply attack

πŸ›‘οΈ Full list here β†’ https://thehackernews.com/2026/04/threatsday-bulletin-sms-blaster-busts.html
πŸ‘7πŸ”₯5😁4πŸ€”4⚑1πŸ‘1
🚨 Supply chain attacks are escalating...

A widely used AI dev tool, PyTorch Lightning, was compromised on PyPI and turned into a credential stealer.

β†’ Malicious code runs on import
β†’ No user action needed
β†’ Credentials silently stolen

Read: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html
😱7😁5πŸ”₯4πŸ‘2🀯1
πŸ€¦β€β™‚οΈ Another supply chain hit.

intercom-client npm package compromised
β†’ Malicious preinstall hook executes on install
β†’ Credentials targeted across dev & CI/CD

Linked to ongoing Mini Shai-Hulud campaign.

Read this update here: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html#intercom-npm-package-compromised-as-part-of-mini-shai-hulud
πŸ‘9😁6πŸ”₯5
⚠️ Update: Mini Shai-Hulud is spreading across ecosystems.

β†’ intercom-client (npm) and intercom-php (Packagist) compromised
β†’ Install-time hooks deploy credential stealer

Attack targets GitHub tokens, cloud creds, SSH keys, Kubernetes, Vault, Docker, and .env files.

Read: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html#intercom-npm-and-packagist-package-compromised-as-part-of-mini-shai-hulud

Campaign linked to TeamPCP and earlier Lightning compromise.
🀯8😁4πŸ‘3πŸ‘2⚑1
😬 Poisoned Ruby gems + Go modules used in a supply chain attack.

β€’ Steal AWS creds, SSH keys, configs
β€’ Tamper GitHub Actions via fake binaries
β€’ Add SSH access for persistence

Read β†’ https://thehackernews.com/2026/05/poisoned-ruby-gems-and-go-modules.html
πŸ‘6😁3πŸ€”2
πŸ›‘ Two cybersecurity professionals were sentenced to four years each for helping deploy BlackCat ransomware across the U.S. in 2023.

They took a share of ransom payments, including about $1.2 million in Bitcoin from one victim.

Read β†’ https://thehackernews.com/2026/05/two-cybersecurity-professionals-get-4.html
πŸ€”13πŸ‘11⚑4πŸ‘1😱1
Cybersecurity market: $38 B β†’ $69 B by 2030

Yet MSPs still lose deals:
β€’ 77% can’t create urgency
β€’ 66% face cost pushback
β€’ 8+ decision-makers per deal

Fix: sell outcomes, not tech

Read more β†’ https://thehackernews.com/2026/05/top-five-sales-challenges-costing-msps.html
πŸ‘5πŸ”₯1πŸ‘1😁1
⚠️ China-linked hackers targeted governments across Asia + a NATO state (Poland), exploiting Exchange/IIS flaws to deploy ShadowPad.

At the same time: journalists & activists hit with phishing campaigns.

Two ops. Same priorities.

Details here β†’ https://thehackernews.com/2026/05/china-linked-hackers-target-asian.html
πŸ”₯13πŸ‘7πŸ‘3😁2