The Hacker News
Відкрити в Telegram
⭐ Official THN Telegram Channel — A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking. 📨 Contact: admin@thehackernews.com 🌐 Website: https://thehackernews.com
Показати більше2025 рік у цифрах

153 581
Підписники
+4924 години
+3937 днів
+1 38530 день
Архів дописів
Фото недоступнеДивитись в Telegram
🛑 Trust Wallet confirmed a security breach in its Chrome extension.
Malicious code was inserted into version 2.68, stealing wallet recovery phrases and draining about $7 million.
Users must update to v2.69.
🔗 Read details here → https://thehackernews.com/2025/12/trust-wallet-chrome-extension-bug.html
👏 11🔥 6😁 2👍 1🤔 1
Фото недоступнеДивитись в Telegram
🛑 Trust Wallet says a bug in its Chrome extension led to real losses. About $7M was drained after malicious code landed in version 2.68, targeting wallet recovery phrases.
Hundreds of users were affected.
🔗 Read → https://thehackernews.com/2025/12/trust-wallet-chrome-extension-bug.html
😱 3
Фото недоступнеДивитись в Telegram
China-linked Evasive Panda ran a targeted DNS poisoning campaign to silently push spyware through fake software updates, Kaspersky reports.
🔗 Learn how poisoned DNS enabled stealth espionage → https://thehackernews.com/2025/12/china-linked-evasive-panda-ran-dns.html
👍 6😁 3🤯 1😱 1
Фото недоступнеДивитись в Telegram
ThreatsDayBulletin: Cyber threats are shifting tactics this week.
Stealthy loaders now hide in trusted tools, AI chatbot flaws and Docker prompt injection exploits can leak data, and commodity loaders deliver RATs to industry targets.
Android NFC malware and fake PoCs add to the risk.
🔗 Read → https://thehackernews.com/2025/12/threatsday-bulletin-stealth-loaders-ai.html
👍 7🔥 1🤯 1
Фото недоступнеДивитись в Telegram
Stolen vault backups from the 2022 LastPass breach are still paying out.
$35 Million+ traced as attackers crack weak master passwords years later, draining crypto through 2025.
TRM Labs links laundering to Russian exchanges and mixers, despite CoinJoin use.
🔗 Read → https://thehackernews.com/2025/12/lastpass-2022-breach-led-to-years-long.html
🔥 12
Фото недоступнеДивитись в Telegram
Fortinet confirms active exploitation of a FortiOS SSL VPN flaw that bypasses 2FA.
CVE-2020-12812 lets attackers log in by changing the case of a username when LDAP is misconfigured.
The bug can allow admin or VPN access without second-factor checks.
🔗 Read → https://thehackernews.com/2025/12/fortinet-warns-of-active-exploitation.html
👍 10😁 7😱 4🔥 2
Фото недоступнеДивитись в Telegram
CISA added a Digiever NVR bug to its exploited list after confirmed attacks.
CVE-2023-52163 allows remote code execution through command injection once logged in.
Researchers link it to Mirai and ShadowV2 botnets. The device is end-of-life and unpatched.
🔗 Read → https://thehackernews.com/2025/12/cisa-flags-actively-exploited-digiever.html
👍 8
Фото недоступнеДивитись в Telegram
A new MacSync malware variant hit macOS via a signed and notarized app, letting it bypass Apple Gatekeeper.
The fake messaging installer ran like a legitimate app until Apple revoked the certificate.
🔗 Read → https://thehackernews.com/2025/12/new-macsync-macos-stealer-uses-signed.html
😁 9👍 6🤯 6😱 1
Фото недоступнеДивитись в Telegram
Nomani investment scams rose 62% in 2025, ESET says.
Campaigns now run on YouTube as well as Facebook, pushing fake returns with AI-made videos.
64,000+ scam URLs were blocked this year.
🔗 How the fraud chain works → https://thehackernews.com/2025/12/nomani-investment-scam-surges-62-using.html
⚡ 12😱 6👍 4😁 3
Фото недоступнеДивитись в Telegram
Cybercrime shifted in 2025. 70.5% of data breaches hit SMBs, not large enterprises.
Attackers moved to smaller firms after big companies hardened defenses and rejected ransoms. Volume replaced payout size.
🔗 What the data shows from 2025 breaches → https://thehackernews.com/2025/12/attacks-are-evolving-3-ways-to-protect.html
👍 12😁 3🤯 2😱 2🔥 1
U.S. SEC has charged multiple companies over a crypto scam that took $14M from retail investors.
The scheme used WhatsApp investment clubs and fake AI trading signals to push victims onto non-existent crypto platforms.
No real trading ever happened.
🔗 Read → https://thehackernews.com/2025/12/sec-files-charges-over-14-million.html
👍 6😱 4🔥 3
Фото недоступнеДивитись в Telegram
Italy fined Apple €98.6m over how App Tracking Transparency works in the App Store.
Regulators say third-party apps must show double consent prompts, while Apple’s own apps get one-tap approval.
🔗 Read → https://thehackernews.com/2025/12/italy-fines-apple-986-million-over-att.html
🔥 17👏 6🤔 2
Фото недоступнеДивитись в Telegram
🛑 Two Chrome extensions were caught intercepting browser traffic and stealing credentials from 170+ sites.
They pose as VPN tools, charge subscriptions, then silently proxy traffic and exfiltrate credentials in plaintext.
One has been active since 2017, the other since 2023.
🔗 Details → https://thehackernews.com/2025/12/two-chrome-extensions-caught-secretly.html
👍 16🤯 12👏 3🔥 2
Фото недоступнеДивитись в Telegram
Watch how Passwd handles shared passwords, API keys, and system access for Google Workspace teams.
Centralized admin control with audit trails replaces informal sharing without introducing a new login layer or tool sprawl.
🔗 Learn more → https://thehackernews.com/2025/12/passwd-walkthrough-of-google-workspace.html
🤔 11👍 2
Фото недоступнеДивитись в Telegram
What happens when your security vendor is too distracted by a merger to help you fix a vulnerability?
New insights from JFrog explore the risks of vendor instability in a consolidating market.
Don't let your AppSec stack become a liability. Read the analysis: https://thn.news/sec-vendor-risks-x
👍 7👏 4
Фото недоступнеДивитись в Telegram
INTERPOL led a cybercrime sweep across Africa. 574 arrests and $3M recovered after targeting BEC, extortion, and ransomware in 19 countries.
Separately, a Ukrainian Nefilim ransomware affiliate pleaded guilty in the U.S.
🔗 Details from both cases → https://thehackernews.com/2025/12/interpol-arrests-574-in-africa.html
😁 5🤯 5😱 2🤔 1
Фото недоступнеДивитись в Telegram
Purdue University tested deepfake detectors where they actually break: real, compressed social media video.
Not clean demos. Not lab data.
The benchmark shows why false-acceptance rate matters more than accuracy when camera feeds drive access and trust.
🔗 What the benchmark reveals → https://thehackernews.com/expert-insights/2025/12/purdue-universitys-real-world-deepfake.html
🤯 8😁 5👏 2
Фото недоступнеДивитись в Telegram
💪 The U.S. Justice Department seized fraud infrastructure used to steal bank logins at scale.
Criminals ran fake bank ads on Google and Bing, captured credentials, and drained real accounts.
$14.6M in confirmed losses so far.
🔗 Read details here → https://thehackernews.com/2025/12/us-doj-seizes-fraud-domain-behind-146.html
😱 9🔥 7
Фото недоступнеДивитись в Telegram
⚠️ ALERT — A critical RCE flaw (CVSS 9.9) was found in the n8n workflow automation platform.
CVE-2025-68613 lets authenticated users execute arbitrary code, enabling full instance takeover, data access, and system-level actions.
More than 103k exposed instances are observed globally.
🔗 Details → https://thehackernews.com/2025/12/critical-n8n-flaw-cvss-99-enables.html
⚡ 10😱 9🔥 3😁 3👍 2
Фото недоступнеДивитись в Telegram
FCC added foreign-made drones and critical components to its Covered List, blocking new U.S. approvals and imports under a national-security finding.
New DJI, Autel and other foreign models won’t enter the market unless DoD or DHS approves.
🔗 Read → https://thehackernews.com/2025/12/fcc-bans-foreign-made-drones-and-key.html
👍 7🤯 2⚡ 1🔥 1
