The Hacker News
βœ”
163K subscribers
2.91K photos
19 videos
4 files
8.85K links
⭐ Official THN Telegram Channel β€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

πŸ“¨ Contact: admin@thehackernews.com

🌐 Website: https://thehackernews.com
Download Telegram
🚨 12 vulnerabilities in the vm2 Node.js library enable sandbox escape and arbitrary code execution.

Flaws (CVSS up to 10.0) affect versions up to 3.11.1; patches released through 3.11.2.

Read the full story: https://thehackernews.com/2026/05/vm2-nodejs-library-vulnerabilities.html
😁7πŸ‘4⚑2πŸ”₯2
🚨 Phishing is now behind 60% of breachesβ€”and often the first step in ransomware attacks.

In 2024, 32% of attacks led to payments totaling $813 million, as AI-crafted emails increasingly bypass security and exploit user trust.

Analysis by Austin O'Saben of Kaseya breaks it down.

Read: https://thehackernews.com/expert-insights/2026/05/from-phishing-to-recovery-breaking.html
πŸ‘11πŸ”₯5⚑2😁2
🚨 Three PyPI packages uploaded July 16–22, 2025 delivered ZiChatBot malware on Windows and Linux.

The malware uses Zulip APIs as C2 and persists via registry and cron.

Read: https://thehackernews.com/2026/05/pypi-packages-deliver-zichatbot-malware.html
⚑7πŸ‘2πŸ”₯2😁1
πŸ”Ž Incident response retainers still face delays during breaches without pre-provisioned access.

Short log retention and weak identity visibility increase attacker dwell time and impact.

See how this slows containment: https://thehackernews.com/2026/05/day-zero-readiness-operational-gaps.html
😁8πŸ‘3
⚑ This week’s #ThreatsDay is a reminder that the internet is held together with duct tape.

β€’ Fake AI apps stealing creds
β€’ Poisoned packages hitting devs
β€’ SMS scams everywhere
β€’ Browser passwords sitting in memory
β€’ Malware hiding in ads + GitHub repos
β€’ AI shrinking exploit timelines to hours

Same attacks. Bigger blast radius.

Read: https://thehackernews.com/2026/05/threatsday-bulletin-edge-plaintext.html
πŸ‘10
🚨 PAN-OS flaw "CVE-2026-0300" exploited for unauthenticated RCE with root access.

Attacks began April 9, achieved within a week, followed by espionage and lateral movement by April 29.

Full details and timeline: https://thehackernews.com/2026/05/pan-os-rce-exploit-under-active-use.html
πŸ”₯9πŸ‘5
AI is your biggest compliance blind spot. And most teams don't know it yet.

New attack surfaces. AI-generated code hitting production. Vendor relationships that didn't exist six months ago. The SOC 2 framework wasn't built for any of this and patching it with manual processes isn't going to cut it.

Rippling just launched Automated Compliance for SOC 2 to help companies get ahead of exactly this problem. Now we're bringing together a panel of CISOs to go deeper: what does a modern compliance program actually look like when AI is embedded in how you build, hire, and operate?

Join Mandy Andress (CISO, Elastic), Yassir Abousselham (CISO, Calendly), and Adrian Ludwig (CISO, Rippling) on May 6 to get ahead of it.

If you own security at a growing company, this is the conversation you need to be in.

πŸŽ™Compliance in the AI Era: Rethinking SOC 2 & Beyond.

Reserve your seat β†’ https://thn.news/compliance-webinar
πŸ‘7πŸ‘4
🚨 PCPJack malware exploits 5 CVEs to spread across cloud systems.

Steals credentials from Docker, Kubernetes, AWS and more, exfiltrating via Telegram while moving laterally across networks.

Read details: https://thehackernews.com/2026/05/pcpjack-credential-stealer-exploits-5.html
πŸ‘4🀯4😁3πŸ‘1
🚨 Ivanti Endpoint Manager Mobile flaw (CVE-2026-6973) is being exploited in limited attacks, enabling remote code execution with admin access.

CISA has added it to its KEV catalog, with federal agencies ordered to patch by May 10, 2026.

Read: https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html
😁5πŸ‘3πŸ”₯3
This media is not supported in your browser
VIEW IN TELEGRAM
🚨 A new UNPATCHED Linux kernel β€œDirty Frag” LPE flaw enables root access on Ubuntu, RHEL, Fedora and other distributions.

Researchers released a working proof-of-concept exploit capable of gaining root in a single command.

Details here: https://thehackernews.com/2026/05/linux-kernel-dirty-frag-lpe-exploit.html
🀯24πŸ”₯13πŸ‘5😱5
🚨 A new Linux backdoor β€œPamDOORa” is being sold on the cybercrime forum after its price dropped from $1,600 to $900.

The PAM-based malware enables persistent SSH access, steals credentials, and tampers with authentication logs on compromised systems.

Details: https://thehackernews.com/2026/05/new-linux-pamdoora-backdoor-uses-pam.html
πŸ”₯16🀯10⚑3πŸ‘1πŸ‘1
🚨 QLNX, a previously undocumented #Linux RAT, is targeting developers and DevOps systems to steal npm, PyPI, AWS, Kubernetes, Docker, and CI/CD credentials.

The malware uses fileless execution, PAM backdoors, eBPF rootkits, and 58 remote commands to maintain covert access and hijack software supply chains.

Learn more about QLNX here: https://thehackernews.com/2026/05/quasar-linux-rat-steals-developer.html
⚑8πŸ”₯5πŸ‘2
🚨 Nearly 1% of confirmed enterprise incidents came from low-severity or informational alerts.

Analysis of 25M+ alerts reveals ~1 missed breach per week at average scale.

Forensic scans of 82,000 endpoints uncovered 2,600 active infections β€” 51% already marked "mitigated" by EDR.

Full report and findings: https://thehackernews.com/2026/05/one-missed-threat-per-week-what-25m.html
πŸ”₯10πŸ‘2
🚨 28 fraudulent apps on the Google Play Store racked up over 7.3 million downloads before removal.

They promised call, SMS, and #WhatsApp histories for any phone number β€” but delivered only fake data after users paid up to $80.

The CallPhantom scam mainly hit #Android users in India and Asia-Pacific.

Full read β†’ https://thehackernews.com/2026/05/fake-call-history-apps-stole-payments.html
😁11πŸ‘4⚑3
πŸ›‘ REMINDER: Today, May 8, 2026 β€” #Instagram officially disabled end-to-end encryption for Direct Messages.

β€’ Meta can now read all your chats.
β€’ Download everything NOW or lose it.
β€’ Switch to WhatsApp for encryption.

Details: https://thehackernews.com/2026/03/meta-to-shut-down-instagram-end-to-end.html
😁33😱18🀯7πŸ”₯5πŸ‘5πŸ‘3⚑1
🚨 TCLBANKER, a previously undocumented Brazilian banking trojan, is targeting 59 banking, fintech, and #cryptocurrency platforms.

The malware spreads through #WhatsApp Web and Microsoft Outlook, using DLL side-loading, keylogging, and fake credential overlays to evade detection and steal banking credentials.

Read: https://thehackernews.com/2026/05/tclbanker-banking-trojan-targets.html
πŸ‘10😁8🀯5😱3πŸ”₯1
🚨 cPanel and WHM patched three new vulnerabilities enabling file read, Perl code execution, privilege escalation, and DoS attacks.

The fixes follow recent exploitation of another cPanel zero-day to deploy Mirai variants and Sorry ransomware.

Details: https://thehackernews.com/2026/05/cpanel-whm-patch-3-new-vulnerabilities.html
πŸ‘13πŸ‘6😁5🀯4πŸ”₯1
🚨 CVE-2026-7482 in Ollama could let remote attackers leak process memory from more than 300,000 exposed servers using crafted GGUF files.

Separate unpatched Windows flaws enable persistent code execution through Ollama’s update mechanism.

Full details and mitigations: https://thehackernews.com/2026/05/ollama-out-of-bounds-read-vulnerability.html
πŸ”₯22😁5⚑3πŸ‘2
Your biggest security risk in 2026 isn’t malware.
It’s the tools you already trust.

Attackers are ditching malicious files and β€œliving off the land” with PowerShell, WMIC, Certutil and native binaries that your security tools barely blink at.

84% of high-severity incidents now do this.

Read why β†’ https://thehackernews.com/expert-insights/2026/05/your-biggest-security-risk-isnt-malware.html
πŸ”₯11πŸ‘6πŸ‘5😁1
🚨 WARNING: A malicious Hugging Face repository impersonating #OpenAI’s Privacy Filter model reached #1 trending with about 244,000 downloads in 18 hours while delivering a Rust-based infostealer to Windows users.

Hugging Face disabled the repo; researchers also linked the infrastructure to a ValleyRAT campaign.

Read: https://thehackernews.com/2026/05/fake-openai-privacy-filter-repo-hits-1.html
😁15πŸ‘4πŸ€”4πŸ”₯3
The internet had another normal week...

πŸ’€ Poisoned installers
πŸ”₯ Firewall zero-days
🐧 Linux rootkits
☁️ Cloud hijacks
🎣 OAuth theft
πŸͺ€ ClickFix traps
πŸ€– AI bug hunting
⚠️ Fake updates everywhere

⚑ Weekly cyber recap just dropped: https://thehackernews.com/2026/05/weekly-recap-linux-rootkit-macos-crypto.html
πŸ”₯9🀯5πŸ‘4