uz
Feedback
The Hacker News

The Hacker News

Kanalga Telegramโ€™da oโ€˜tish

โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking. ๐Ÿ“จ Contact: admin@thehackernews.com ๐ŸŒ Website: https://thehackernews.com

Ko'proq ko'rsatish
2025 yil raqamlardasnowflakes fon
card fon
153 666
Obunachilar
+4924 soatlar
+3847 kunlar
+1 47630 kunlar
Postlar arxiv
Photo unavailableShow in Telegram
๐Ÿ”ฅ OpenAI just launched an AI #cybersecurity researcher. It finds bugs, proves theyโ€™re real, and patches them โ€” all by itself. Powered by GPT-5, itโ€™s already discovered 10 vulnerabilities. The age of autonomous bug hunters starts now โ†’ https://thehackernews.com/2025/10/openai-unveils-aardvark-gpt-5-agent.html
Hammasini ko'rsatish...
โšก 27๐Ÿ˜ฑ 15๐Ÿ”ฅ 10๐Ÿ˜ 9๐Ÿ‘ 5๐Ÿค” 4๐Ÿ‘ 1
Photo unavailableShow in Telegram
Nation-state hackers built Airstalk, a new malware abusing VMware Workspace ONEโ€™s MDM API as a covert C2 channel. Signed with a stolen cert, itโ€™s exfiltrating browser data from BPO networks. Full analysis โ†“ https://thehackernews.com/2025/10/nation-state-hackers-deploy-new.html
Hammasini ko'rsatish...
๐Ÿ‘ 14๐Ÿ‘ 3๐Ÿคฏ 3
Photo unavailableShow in Telegram
๐Ÿšจ China-backed hackers exploited an unpatched Windows shortcut bug to breach European diplomats. UNC6384 used fake โ€œEU Commissionโ€ and NATO meeting invites to plant PlugX malware (CVE-2025-9491) โ€” still unpatched by Microsoft. Full story โ†“ https://thehackernews.com/2025/10/china-linked-hackers-exploit-windows.html
Hammasini ko'rsatish...
๐Ÿ˜ฑ 16๐Ÿ˜ 7๐Ÿ‘ 2๐Ÿคฏ 1
Photo unavailableShow in Telegram
โš ๏ธ Chinese hackers are exploiting a critical 9.3 CVE (CVE-2025-61932) in Motex Lanscope Endpoint Manager. It lets them run SYSTEM-level commands and plant a Gokcpdoor backdoor with new multiplexed C2 channels. Active attacks confirmed โ†“ https://thehackernews.com/2025/10/china-linked-tick-group-exploits.html
Hammasini ko'rsatish...
๐Ÿ‘ 16๐Ÿ˜ฑ 4โšก 1๐Ÿคฏ 1
Photo unavailableShow in Telegram
Most MSPs are walking straight into a trap. Clients now expect enterprise-level cybersecurity โ€” but many providers are still selling basic IT support. The result? Lost clients, slower growth, and higher risk exposure. Is your MSP ready to lead with security? โ†“ https://thehackernews.com/2025/10/the-msp-cybersecurity-readiness-guide.html
Hammasini ko'rsatish...
๐Ÿ‘ 9
Photo unavailableShow in Telegram
CISA and NSA just issued a warning: Exchange servers are still getting hacked. Now a new WSUS flaw (CVE-2025-59287) lets attackers run code remotely. Even patched systems arenโ€™t fully safe. If you manage Exchange or WSUS, read this โ†“ https://thehackernews.com/2025/10/cisa-and-nsa-issue-urgent-guidance-to.html
Hammasini ko'rsatish...
โšก 17๐Ÿ˜ฑ 4๐Ÿ‘ 1๐Ÿ˜ 1
Photo unavailableShow in Telegram
A Mac app just bypassed macOS permission checks โ€” silently turning on the mic and camera. ThreatLockerโ€™s new Device Access Control (DAC) for macOS, now in Beta, flags hidden risks like unencrypted drives, SMBv1, and weak sharing settings โ€” before attackers can exploit them. Learn more โ†“ https://thehackernews.com/2025/10/a-new-security-layer-for-macos-takes.html
Hammasini ko'rsatish...
๐Ÿ”ฅ 11๐Ÿ‘ 6
Photo unavailableShow in Telegram
Developers accidentally leaked VS Code tokens โ€” letting attackers publish fake extensions. Eclipse has revoked the tokens and added new safeguards after a campaign dubbed โ€œGlassWorm.โ€ Read โ†’ https://thehackernews.com/2025/10/eclipse-foundation-revokes-leaked-open.html
Hammasini ko'rsatish...
๐Ÿ”ฅ 9๐Ÿ˜ 7๐Ÿ‘ 1
Photo unavailableShow in Telegram
CISA added a new VMware zero-day to its KEV list. CVE-2025-41244 (CVSS 7.8) lets local users on VMs with VMware Tools + Aria Operations gain root access. Exploited since Oct 2024 by China-linked UNC5174. Patch released last month โ†“ https://thehackernews.com/2025/10/cisa-flags-vmware-zero-day-exploited-by.html
Hammasini ko'rsatish...
๐Ÿ‘ 11๐Ÿ‘ 2
Photo unavailableShow in Telegram
๐Ÿ’€ Google says it blocks over 10 billion scam calls and messages every month. But scammers have adapted โ€” theyโ€™ve gone social. Now they send fake job offers in group chats, even adding fake โ€œfriendsโ€ to make it look real. The new scam tactic most experts overlooked โ†“ https://thehackernews.com/2025/10/googles-built-in-ai-defenses-on-android.html
Hammasini ko'rsatish...
๐Ÿ˜ 22๐Ÿค” 14๐Ÿ‘ 4๐Ÿ”ฅ 3
Photo unavailableShow in Telegram
๐Ÿ”ฅ A tool built for defenders is now arming attackers. AdaptixC2 โ€” an open-source C2 in Golang โ€” was made for red teams. Now, Russian ransomware gangs use it in fake Microsoft Teams help-desk scams. Details โ†“ https://thehackernews.com/2025/10/russian-ransomware-gangs-weaponize-open.html
Hammasini ko'rsatish...
๐Ÿคฏ 9๐Ÿค” 4๐Ÿ”ฅ 3
Photo unavailableShow in Telegram
โš ๏ธ โ€œPatch everythingโ€ is dead. At the BAS Summit, CISOs said it straight โ€” not every vuln matters, only the exploitable ones do. Breach simulation shows where you bleed, not where scanners scream. Proof beats panic. Read how BAS powers real defense โ†’ https://thehackernews.com/2025/10/the-death-of-security-checkbox-bas-is.html
Hammasini ko'rsatish...
๐Ÿ”ฅ 5
Photo unavailableShow in Telegram
๐Ÿšจ A single line of JavaScript can crash any Chromium browser. Researcher Jose Pino calls it Brash โ€” it abuses how document.title handles rapid updates. 24 million title changes per second = instant crash. Still unpatched. Details โ†“ https://thehackernews.com/2025/10/new-brash-exploit-crashes-chromium.html
Hammasini ko'rsatish...
๐Ÿ”ฅ 11๐Ÿ˜ 7๐Ÿคฏ 7
Photo unavailableShow in Telegram
โšก Cybercrime just got quieter, cheaper, and a lot more precise. ๐Ÿ’ฅ DNS flaws exploited ๐Ÿ’ฅ Rust binaries hiding payloads ๐Ÿ’ฅ Supply-chain heists rising ๐Ÿ’ฅ New RATs everywhere Your weekly ThreatsDay recap has it all โ†’ https://thehackernews.com/2025/10/threatsday-bulletin-dns-poisoning-flaw.html
Hammasini ko'rsatish...
๐Ÿ‘ 11๐Ÿ‘ 4โšก 2๐Ÿ˜ 2๐Ÿ”ฅ 1
Photo unavailableShow in Telegram
๐Ÿšจ PhantomRaven hit the npm registry โ€” 126 malicious packages, 86K+ installs, stealing npm tokens, GitHub creds, and CI/CD secrets. They hide malware in remote dynamic dependencies that show 0 deps, so scanners miss them. Details โ†’ https://thehackernews.com/2025/10/phantomraven-malware-found-in-126-npm.html
Hammasini ko'rsatish...
๐Ÿคฏ 11๐Ÿ”ฅ 3๐Ÿ‘ 1
Photo unavailableShow in Telegram
๐Ÿšจ PHP servers are under attack. Mirai, Mozi, and Gafgyt botnets are exploiting old CVEs to hijack WordPress and Craft CMS sites. Some break-ins start from leftover PhpStorm debug sessions still running in production. Check if yours is exposed โ†“ https://thehackernews.com/2025/10/experts-reports-sharp-increase-in.html
Hammasini ko'rsatish...
๐Ÿ‘ 11๐Ÿ”ฅ 2๐Ÿ˜ 2๐Ÿ‘ 1
Photo unavailableShow in Telegram
โš ๏ธ AI browsers like ChatGPT Atlas and Perplexity Comet can be tricked into using fake data. A new exploit โ€” โ€œAI-targeted cloakingโ€ โ€” lets attackers show one version of a page to humans and another to AI crawlers. Same old SEO trick. New weapon: misinformation at scale. Read how it works โ†“ https://thehackernews.com/2025/10/new-ai-targeted-cloaking-attack-tricks.html
Hammasini ko'rsatish...
๐Ÿ˜ 15๐Ÿ‘ 1
Photo unavailableShow in Telegram
โšก Your AI-driven compliance might already be non-compliant. Regulators arenโ€™t ready โ€” but you can be. Join the live session Nov 3 to uncover hidden risks and real fixes. Register free โ†’ https://thehackernews.com/2025/10/discover-practical-ai-tactics-for-grc.html
Hammasini ko'rsatish...
๐Ÿ˜ 8
Photo unavailableShow in Telegram
๐Ÿ”ด The next big breach wonโ€™t start with a stolen password. Itโ€™ll come from your own AI. Agentic AIs are the new โ€œconfused deputiesโ€ โ€” doing what attackers tell them, with the access you gave them. The scariest part? You trained the threat โ†“ https://thehackernews.com/2025/10/preparing-for-digital-battlefield-of.html
Hammasini ko'rsatish...
๐Ÿคฏ 7๐Ÿ˜ 5๐Ÿ‘ 3๐Ÿ”ฅ 1
Photo unavailableShow in Telegram
๐Ÿšจ Russian hackers breached Ukrainian networks โ€” no malware needed. They hijacked Windows tools (PowerShell, RDPClip, OpenSSH) to steal data and stay hidden for months. Real fileless persistence โ€” living in memory, invisible to AV. Learn how they did it & how to detect it โ†“ https://thehackernews.com/2025/10/russian-hackers-target-ukrainian.html
Hammasini ko'rsatish...
๐Ÿคฏ 18๐Ÿ”ฅ 8๐Ÿ˜ 8๐Ÿ‘ 1