The Hacker News
βœ”
163K subscribers
2.88K photos
19 videos
4 files
8.82K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
🚨 WARNING: cPanel patched an auth flaw affecting all supported versionsβ€”forcing providers to restrict access.

Namecheap blocked ports 2083/2087, disabling control panel access until patches deployed.

πŸ”— Read β†’ https://thehackernews.com/2026/04/critical-cpanel-authentication.html
πŸ‘8😁7⚑3πŸ€”3
Security teams close hundreds of vulnerabilities and still can’t prove they’re safer.

Only ~2% of exposures matter when mapped to real attack paths and critical assets. The rest is noise from tools that miss context and exploitability.

πŸ”— Why most platforms miss real risk β†’ https://thehackernews.com/2026/04/what-to-look-for-in-exposure-management.html
😁6πŸ‘3πŸ”₯2
BeyondTrust’s latest Microsoft Vulnerabilities Report is out, and the numbers should concern every security leader.

Critical vulnerabilities doubled, Azure & Dynamics surged 9x, and 40% of all flaws were tied to Elevation of Privilege.

More insights: https://thn.news/msft-vuln-report

#MVR2026 #LeastPrivilege
πŸ‘3😁2πŸ”₯1
πŸ›‘ A wave of attacks is using layered npm dependencies to deliver hidden malware.

Fake SDKs, AI-assisted commits, and job scams all route through packages that pull second-stage payloads, stealing crypto wallets, credentials, and source code. Linked to North Korean campaigns targeting developers.

πŸ”— Learn how these attacks connect across npm, PyPI, and GitHub β†’ https://thehackernews.com/2026/04/new-wave-of-dprk-attacks-uses-ai.html
😱8πŸ‘7⚑4
⚠️ ALERT β€” SAP related npm packages were just found shipping credential-stealing malware.

A preinstall script runs on install, steals tokens, and injects GitHub Actions to self-propagate, exfiltrating encrypted secrets via victim-owned repos.

πŸ”— Read β†’ https://thehackernews.com/2026/04/sap-npm-packages-compromised-by-mini.html
😱7πŸ‘3😁1
πŸ›‘ Gemini and Cursor vulnerabilities exposed direct code execution in dev workflows.

#Gemini CLI (CVSS 10.0) auto-trusted folders in CI, letting malicious .gemini/ configs from PRs run on hosts. #Cursor bugs triggered hidden Git hooks and exposed local API keys via extensions.

πŸ”— Details β†’ https://thehackernews.com/2026/04/google-fixes-cvss-10-gemini-cli-ci-rce.html
😁13πŸ‘4πŸ”₯1
⚠️ UPDATE: #cPanel flaw now tracked as CVE-2026-41940 (CVSS 9.8)β€”an auth bypass granting unauthenticated admin access.

Actively exploited as a 0-day for weeks. Root cause: CRLF injection lets attackers forge sessions and escalate to root.

πŸ”— Exploit mechanics and real-world impact β†’ https://thehackernews.com/2026/04/critical-cpanel-authentication.html
πŸ‘9πŸ‘1😁1
⚠️ A new #Linux flaw mirrors Dirty Pipeβ€”but adds cross-container impact.

β€œCopy Fail” (CVE-2026-31431) lets any local user overwrite cached system files and run them as root. No race condition.

Works across major Linux distros since 2017.

πŸ”— Read β†’ https://thehackernews.com/2026/04/new-linux-copy-fail-vulnerability.html
😱12😁6πŸ‘4⚑1🀯1
🚨 Attackers are targeting enterprise admins with fake tools and running control through #Ethereum smart contracts.

Malware spreads via SEO-poisoned #GitHub repos, then pulls live C2 from blockchain. No domains to block. Access lands on high-privilege systems.

πŸ”— Learn how this campaign turns search results into enterprise breaches β†’ https://thehackernews.com/2026/04/etherrat-distribution-spoofing.html
😁5πŸ‘4πŸ”₯1
⚠️ Malware now ships its payload inside the installer.

DEEP#DOOR embeds a Python backdoor in a script, extracts it at runtime, and avoids external downloads.

Using tunneling, it keeps access and steals credentials with minimal trace.

πŸ”— Read β†’ https://thehackernews.com/2026/04/new-python-backdoor-uses-tunneling.html
😱6πŸ‘3πŸ€”3
AI-enabled cyber attacks are on the rise. Are you prepared? Most orgs aren’t as prepared as they think for AI-enabled attacks, but it’s never too late to start.

The cyber risk playbook for the AI threat era draws on research from over 200 GRC, IT, and cybersecurity professionals to gain new insights into AI-enabled attacks and the need for proactive cyber resilience.

Get the playbook today β†’ https://thn.news/nyc-cyber-training
πŸ‘3πŸ€”3😁1
πŸ”₯ Cyber chaos exploding this week...

β€’ Fake cell towers
β€’ npm .env theft
β€’ Extensions sell data
β€’ 3.4M servers exposed
β€’ Vidar tops stealers
β€’ 38 OpenEMR flaws
β€’ Komari backdoor used
β€’ Saiga 2FA kits
β€’ Black Axe arrests
β€’ PhantomRPC unpatched
β€’ Robinhood phishing trick
β€’ arXiv leaks keys
β€’ Qinglong crypto mining
β€’ PyPI supply attack

πŸ›‘οΈ Full list here β†’ https://thehackernews.com/2026/04/threatsday-bulletin-sms-blaster-busts.html
πŸ‘7πŸ”₯5😁4πŸ€”4⚑1πŸ‘1
🚨 Supply chain attacks are escalating...

A widely used AI dev tool, PyTorch Lightning, was compromised on PyPI and turned into a credential stealer.

β†’ Malicious code runs on import
β†’ No user action needed
β†’ Credentials silently stolen

Read: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html
😱7😁5πŸ”₯4πŸ‘2🀯1
πŸ€¦β€β™‚οΈ Another supply chain hit.

intercom-client npm package compromised
β†’ Malicious preinstall hook executes on install
β†’ Credentials targeted across dev & CI/CD

Linked to ongoing Mini Shai-Hulud campaign.

Read this update here: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html#intercom-npm-package-compromised-as-part-of-mini-shai-hulud
πŸ‘9😁6πŸ”₯5
⚠️ Update: Mini Shai-Hulud is spreading across ecosystems.

β†’ intercom-client (npm) and intercom-php (Packagist) compromised
β†’ Install-time hooks deploy credential stealer

Attack targets GitHub tokens, cloud creds, SSH keys, Kubernetes, Vault, Docker, and .env files.

Read: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html#intercom-npm-and-packagist-package-compromised-as-part-of-mini-shai-hulud

Campaign linked to TeamPCP and earlier Lightning compromise.
🀯8😁4πŸ‘3πŸ‘2⚑1
😬 Poisoned Ruby gems + Go modules used in a supply chain attack.

β€’ Steal AWS creds, SSH keys, configs
β€’ Tamper GitHub Actions via fake binaries
β€’ Add SSH access for persistence

Read β†’ https://thehackernews.com/2026/05/poisoned-ruby-gems-and-go-modules.html
πŸ‘6😁3πŸ€”2
πŸ›‘ Two cybersecurity professionals were sentenced to four years each for helping deploy BlackCat ransomware across the U.S. in 2023.

They took a share of ransom payments, including about $1.2 million in Bitcoin from one victim.

Read β†’ https://thehackernews.com/2026/05/two-cybersecurity-professionals-get-4.html
πŸ€”13πŸ‘11⚑4πŸ‘1😱1
Cybersecurity market: $38 B β†’ $69 B by 2030

Yet MSPs still lose deals:
β€’ 77% can’t create urgency
β€’ 66% face cost pushback
β€’ 8+ decision-makers per deal

Fix: sell outcomes, not tech

Read more β†’ https://thehackernews.com/2026/05/top-five-sales-challenges-costing-msps.html
πŸ‘5πŸ”₯1πŸ‘1😁1
⚠️ China-linked hackers targeted governments across Asia + a NATO state (Poland), exploiting Exchange/IIS flaws to deploy ShadowPad.

At the same time: journalists & activists hit with phishing campaigns.

Two ops. Same priorities.

Details here β†’ https://thehackernews.com/2026/05/china-linked-hackers-target-asian.html
πŸ”₯13πŸ‘7πŸ‘3😁2
⚠️ Two cybercrime groups are executing rapid SaaS attacks with minimal trace.

Cordial Spider and Snarky Spider use vishing and AiTM phishing to steal credentials, bypass MFA, and access multiple platforms through SSO.

Read: https://thehackernews.com/2026/05/cybercrime-groups-using-vishing-and-sso.html
πŸ”₯12πŸ‘2😁1
πŸ›‘ 30,000 Facebook accounts compromised in a phishing campaign using Google AppSheet emails.

A Vietnamese-linked operation called AccountDumpling targeted Facebook Business users, stole credentials, sent data to Telegram, and resold accounts.

Read: https://thehackernews.com/2026/05/30000-facebook-accounts-hacked-via.html
😁21🀯10πŸ”₯5πŸ€”4πŸ‘2πŸ‘1