The Hacker News (@thehackersnews) 's Twitter Profile
The Hacker News

@thehackersnews

#1 Most trusted source for cybersecurity news, insights & analysis — driving action for those who lead and secure.

ID: 209811713

linkhttps://thehackernews.com/ calendar_today29-10-2010 23:55:25

41,41K Tweet

923,923K Followers

2,2K Following

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 UPDATE: Insider breach at Coinbase exposed data of 69,461 users — incident occurred Dec 26, 2024, but wasn’t discovered until May 11, 2025. Details just dropped in Maine AG filing. Read: thehackernews.com/2025/05/coinba…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 CI/CD pipelines move fast—but security often lags behind. Misconfigs, weak containers, and unchecked code can open real attack paths. Wazuh spots what others miss—and stops it cold. 🔍 See the risks + how to fix them → thehackernews.com/2025/05/securi…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 From Inbox to Full Compromise: Hackers are hitting Russian businesses with phishing emails disguised as docs, delivering PureRAT malware for full-system access, password theft & crypto hijacking. 🎯 Attacks have quadrupled in early 2025. 🔗 Details: thehackernews.com/2025/05/purera…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

⚠️ Russia’s cyber war isn’t just on the battlefield—it’s hitting inboxes across the West. APT28 (Fancy Bear) is targeting logistics, defense & IT firms in 14 countries to track aid to Ukraine. Outlook, Roundcube, VPNs—even border cameras compromised. 🔗 Learn more:

⚠️ Russia’s cyber war isn’t just on the battlefield—it’s hitting inboxes across the West.

APT28 (Fancy Bear) is targeting logistics, defense & IT firms in 14 countries to track aid to Ukraine.

Outlook, Roundcube, VPNs—even border cameras compromised.

🔗 Learn more:
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🔥 Biggest Info-Stealer Takedown of 2025! 🚨 2,300+ domains seized | 10M+ infections cut off. Lumma Stealer—the world’s top info-stealer—just got dismantled by a global strike led by Microsoft, FBI, and Europol. 🔗 Read this story → thehackernews.com/2025/05/fbi-an…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

Most companies think their identity security is under control—It’s not. 🚨 <4% have fully automated ID workflows 🔑 89% depend on users to manually enable MFA 📉 52% faced breaches from manual ID tasks Read latest 2025 report → thehackernews.com/2025/05/identi…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 3 Critical Flaws. 1 Exploit Chain. No Fix. Versa Concerto's SD-WAN platform has 3 severe CVEs—one rated 10.0—that can let attackers bypass auth, escalate privileges & gain full system control via reverse shell. 🔗 Read this story → thehackernews.com/2025/05/unpatc…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 China-linked UNC5221 hackers exploited Ivanti EPMM zero-days (CVE-2025-4427 & 4428) immediately after disclosure, targeting mobile endpoints in defense, healthcare, and finance sectors. Full report → thehackernews.com/2025/05/chines…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🛑 WARNING — Any user to Domain Admin? Akamai researchers demoed BadSuccessor, an attack abusing the new dMSA feature—enabled by default—to escalate privileges in Active Directory. ✅ Works in 91% of orgs. ❌ No patch yet Details here → thehackernews.com/2025/05/critic…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

⚡ Webinar ALERT! Cybersecurity isn't enough—you must prove it. Courts, regulators, and insurers demand "reasonable" programs, and vague efforts won't suffice. Learn what this means and how to comply. 📅 Register for this free session now → thehackernews.com/2025/05/webina…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

⚠️ A Chinese-speaking threat actor quietly breached U.S. local gov systems via a critical flaw in Cityworks. They didn’t just break in—they stayed—deploying Cobalt Strike & VShell via Rust-based TetraLoader. Full report → thehackernews.com/2025/05/chines…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

💥 Hidden code. Stolen secrets. Weaponized AI. GitLab’s AI assistant Duo was vulnerable to indirect prompt injection—letting attackers quietly steal source code, embed malicious links, and exfiltrate zero-days. Learn more: thehackernews.com/2025/05/gitlab…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 New CISA Alert: Hackers exploited CVE-2025-3928 in Commvault’s Metallic SaaS, compromising M365 credentials. This isn’t an isolated case—it’s part of a broader campaign targeting SaaS apps with default configs and excessive permissions. 🔍 Details: thehackernews.com/2025/05/cisa-w…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🔥 Europol just dropped the hammer: 300 servers taken down, €3.5M in crypto seized, and 20 international arrest warrants issued—key QakBot and TrickBot operatives named. At the same time, Operation RapTor arrested 270 dark web vendors across 10 countries, seizing €184M in cash

🔥 Europol just dropped the hammer: 300 servers taken down, €3.5M in crypto seized, and 20 international arrest warrants issued—key QakBot and TrickBot operatives named.

At the same time, Operation RapTor arrested 270 dark web vendors across 10 countries, seizing €184M in cash
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🛡️ 99.45% detection. 0.07% false positives. SafeLine is now the top open-source WAF on GitHub (16.4K+ ⭐) — built for teams needing full control, zero-day defense, and advanced bot protection. 👉 See why it’s outpacing cloud WAFs → thehackernews.com/2025/05/safeli…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 5,300 routers hijacked—not to attack, but to spy. A shadowy group dubbed ViciousTrap is turning Cisco routers across 84 countries into a massive honeypot-style network—not to attack, but to silently watch. 🔍 Exploiting CVE-2023-20118 👻 Dropping a script called NetGhost

🚨 5,300 routers hijacked—not to attack, but to spy.

A shadowy group dubbed ViciousTrap is turning Cisco routers across 84 countries into a massive honeypot-style network—not to attack, but to silently watch.

🔍 Exploiting CVE-2023-20118
👻 Dropping a script called NetGhost
The Hacker News (@thehackersnews) 's Twitter Profile Photo

Hackers are turning TikTok into a malware delivery tool. From ClickFix to fake Spotify "boosts"—hackers are now using AI-generated TikToks to trick users into running malicious commands. One video got 500K views before takedown. See full report → thehackernews.com/2025/05/hacker…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

👀 SSE platforms cover a lot—but not everything. The browser is now where real work (and risk) happens. Think GenAI, personal logins, silent extensions. 🧩 A quiet gap with big consequences. 📥 Download the new report: thehackernews.com/2025/05/reeval…