The Hacker News
βœ”
163K subscribers
2.88K photos
19 videos
4 files
8.82K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
🚨 Supply chain attacks are escalating...

A widely used AI dev tool, PyTorch Lightning, was compromised on PyPI and turned into a credential stealer.

β†’ Malicious code runs on import
β†’ No user action needed
β†’ Credentials silently stolen

Read: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html
😱7😁5πŸ”₯4πŸ‘2🀯1
πŸ€¦β€β™‚οΈ Another supply chain hit.

intercom-client npm package compromised
β†’ Malicious preinstall hook executes on install
β†’ Credentials targeted across dev & CI/CD

Linked to ongoing Mini Shai-Hulud campaign.

Read this update here: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html#intercom-npm-package-compromised-as-part-of-mini-shai-hulud
πŸ‘9😁6πŸ”₯5
⚠️ Update: Mini Shai-Hulud is spreading across ecosystems.

β†’ intercom-client (npm) and intercom-php (Packagist) compromised
β†’ Install-time hooks deploy credential stealer

Attack targets GitHub tokens, cloud creds, SSH keys, Kubernetes, Vault, Docker, and .env files.

Read: https://thehackernews.com/2026/04/pytorch-lightning-compromised-in-pypi.html#intercom-npm-and-packagist-package-compromised-as-part-of-mini-shai-hulud

Campaign linked to TeamPCP and earlier Lightning compromise.
🀯8😁4πŸ‘3πŸ‘2⚑1
😬 Poisoned Ruby gems + Go modules used in a supply chain attack.

β€’ Steal AWS creds, SSH keys, configs
β€’ Tamper GitHub Actions via fake binaries
β€’ Add SSH access for persistence

Read β†’ https://thehackernews.com/2026/05/poisoned-ruby-gems-and-go-modules.html
πŸ‘6😁3πŸ€”2
πŸ›‘ Two cybersecurity professionals were sentenced to four years each for helping deploy BlackCat ransomware across the U.S. in 2023.

They took a share of ransom payments, including about $1.2 million in Bitcoin from one victim.

Read β†’ https://thehackernews.com/2026/05/two-cybersecurity-professionals-get-4.html
πŸ€”13πŸ‘11⚑4πŸ‘1😱1
Cybersecurity market: $38 B β†’ $69 B by 2030

Yet MSPs still lose deals:
β€’ 77% can’t create urgency
β€’ 66% face cost pushback
β€’ 8+ decision-makers per deal

Fix: sell outcomes, not tech

Read more β†’ https://thehackernews.com/2026/05/top-five-sales-challenges-costing-msps.html
πŸ‘5πŸ”₯1πŸ‘1😁1
⚠️ China-linked hackers targeted governments across Asia + a NATO state (Poland), exploiting Exchange/IIS flaws to deploy ShadowPad.

At the same time: journalists & activists hit with phishing campaigns.

Two ops. Same priorities.

Details here β†’ https://thehackernews.com/2026/05/china-linked-hackers-target-asian.html
πŸ”₯13πŸ‘7πŸ‘3😁2
⚠️ Two cybercrime groups are executing rapid SaaS attacks with minimal trace.

Cordial Spider and Snarky Spider use vishing and AiTM phishing to steal credentials, bypass MFA, and access multiple platforms through SSO.

Read: https://thehackernews.com/2026/05/cybercrime-groups-using-vishing-and-sso.html
πŸ”₯12πŸ‘2😁1
πŸ›‘ 30,000 Facebook accounts compromised in a phishing campaign using Google AppSheet emails.

A Vietnamese-linked operation called AccountDumpling targeted Facebook Business users, stole credentials, sent data to Telegram, and resold accounts.

Read: https://thehackernews.com/2026/05/30000-facebook-accounts-hacked-via.html
😁21🀯10πŸ”₯5πŸ€”4πŸ‘2πŸ‘1
🚨 Cybersecurity firm Trellix confirms a breach.

Attackers accessed part of its source code repository; no exploitation or release impact found. Investigation ongoing with forensic experts and law enforcement.

Details ➜ https://thehackernews.com/2026/05/trellix-confirms-source-code-breach.html
😁15😱6πŸ‘3πŸ”₯2
🚨 New analysis reveals browser extensions legally selling user data.

80 extensions affect 6.5M+ usersβ€”ad blockers and streaming tools includedβ€”collecting and reselling browsing, viewing, and demographic data.

All disclosed in privacy policies.

Read: https://thehackernews.com/2026/04/threatsday-bulletin-sms-blaster-busts.html#extensions-legally-sell-user-data
πŸ‘12πŸ”₯9😁9πŸ€”4
⚠️ A new #Linux flaw is now under active exploitation.

CISA added CVE-2026-31431 to its KEV list. The bug lets low-privilege users gain full root access. Patches released.

Fix deadline: May 15, 2026.

Read: https://thehackernews.com/2026/05/cisa-adds-actively-exploited-linux-root.html
😱30πŸ€”8πŸ”₯7⚑6πŸ‘2πŸ‘1
276 suspects arrested in a global crackdown on crypto investment scams.

Dubai Police, FBI, and Chinese authorities shut down 9 scam centers targeting Americans. $701 M in crypto seized. FBI alerts helped save $562 M for nearly 9,000 victims.

Read: https://thehackernews.com/2026/05/global-crackdown-arrests-276-shuts-9.html
πŸ‘19πŸ”₯13😁3πŸ€”1🀯1
CVE-2026-41940 (cPanel) exploited within 24h

β€’ 44,000 IPs linked to scanning/brute-force activity
β€’ Targets: Southeast Asia gov/military + MSPs
β€’ Enables auth bypass β†’ full system control
β€’ Mirai variants and Sorry ransomware observed

Read: https://thehackernews.com/2026/05/critical-cpanel-vulnerability.html
😁21🀯11πŸ”₯6⚑2πŸ‘2
🚨 Silver Fox targets India & Russia with phishing attacks. 1,600+ emails spread ValleyRAT + new ABCDoor backdoor via tax-themed lures.

Uses RustSL loader, geofencing, and reboot-based persistence.

Read: https://thehackernews.com/2026/05/silver-fox-deploys-abcdoor-malware-via.html
πŸ‘5πŸ”₯3πŸ‘3⚑1
AI is accelerating cybercrime at a dangerous pace.

2025 data:
πŸ”Έ 454,600 malicious packages
πŸ”Έ Exploit time down to 44 days
πŸ”Έ 28.3% of vulnerabilities hit within 24 hours
πŸ”Έ Even nontechnical actors are launching major attacks.

Read ⬇️ https://thehackernews.com/2026/05/2026-year-of-ai-assisted-attacks.html
πŸ‘9😁1😱1
Media is too big
VIEW IN TELEGRAM
SOC 2 compliance has been a second job for too long.

Procure the tools. Wire the integrations. Chase the evidence. File the ticket. Wait. Follow up. Audit anyway.

Today, that changes.

Introducing Rippling Automated Compliance for SOC 2: the first compliance solution built directly into the platform that already runs your HR, IT, and access controls. Integrate your data to allow evidence collection to begin. Issues get fixed at the source. Your audit doesn't have to be a fire drill.

Other tools sit on top of your stack and report on what's broken. Rippling IS the stack to help you stay audit-ready.

SOC 2 built in. Not bolted on.

Learn about Automated Compliance for SOC 2 β†’ https://thn.news/compliance-automation
😁9πŸ‘2
⚑ The internet took a beating this week.

β€’ cPanel servers wiped
β€’ Linux 100% kernel hack
β€’ TeamPCP supply chain storm
β€’ GitHub one-push RCE
β€’ AI-powered phishing kits
β€’ Ransomware +389%
β€’ Scattered Spider arrest

...and many MORE STORIES.

Full recap πŸ‘‡ https://thehackernews.com/2026/05/weekly-recap-ai-powered-phishing.html
⚑14πŸ‘7😁5πŸ‘1
⚠️ Critical flaws hit MOVEit Automation.

A CVSS 9.8 bug allows authentication bypass, while another enables privilege escalation. Progress Software has issued patchesβ€”no exploitation reported yet.

Read: https://thehackernews.com/2026/05/progress-patches-critical-moveit.html
⚑7πŸ‘2
🚨 A phishing campaign is quietly breaching dozens of organizations.

Since April 2025, VENOMOUS#HELPER has hit 80+ targets β€” mostly in the U.S. Attackers use legitimate RMM tools like SimpleHelp & ScreenConnect to gain persistent, stealth access.

Read: https://thehackernews.com/2026/05/phishing-campaign-hits-80-orgs-using.html
πŸ‘7😁6πŸ”₯4πŸ‘2😱2
AI just crossed a new security threshold.

According to Augusto Barros at Prophet Security , β€œClaude Mythos” autonomously executed full corporate network takeovers β€” succeeding 30% of the time.

Tasks that take human experts ~20 hours… now happen in minutes. Attacker speed is collapsing.

Read the full analysis: https://thehackernews.com/expert-insights/2026/05/mythos-is-coming-what-next-six-months.html
πŸ”₯9😱5πŸ‘4πŸ€”1