Mohit Kumar (@unix_root) 's Twitter Profile
Mohit Kumar

@unix_root

Founder — @TheHackersNews | Cyber Alchemist | Curious by Nature, Educator by Choice, Disciplined by Trading, Solution-Driven by Coding.

ID: 418821190

linkhttps://thehackernews.com/ calendar_today22-11-2011 16:25:39

18,18K Tweet

31,31K Takipçi

5,5K Takip Edilen

The Hacker News (@thehackersnews) 's Twitter Profile Photo

⚠️ WARNING: Oracle just confirmed a new vulnerability (CVE-2025-61884) in E-Business Suite. No login required. Full data access possible. Even worse—similar flaws were just exploited by Cl0p-linked actors. Read the latest news here → thehackernews.com/2025/10/new-or…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

Hackers just turned GitHub into their command center. When police take down their servers, the malware just… reboots itself from GitHub. The twist? It hides configs inside images using steganography. This isn’t a glitch — it’s resilience by design. Read how it works →

Hackers just turned GitHub into their command center.

When police take down their servers, the malware just… reboots itself from GitHub.

The twist? It hides configs inside images using steganography. This isn’t a glitch — it’s resilience by design.

Read how it works →
The Hacker News (@thehackersnews) 's Twitter Profile Photo

⚡ Latest Weekly Recap is out... 🚨 Oracle 0-Day exploited 🤖 Nation-state AI abuse on the rise 🎣 npm phishing spreading fast 💀 New ransomware cartel emerges …and more The threat landscape is moving fast — here’s what defenders need to know. 🔗 thehackernews.com/2025/10/weekly…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 Attackers are turning Discord into a command center — using webhooks to steal API keys and config files right from npm, PyPI, and Ruby installs. ⚙️ North Korean actors even pushed 300+ fake packages with 50K+ downloads. Details here → thehackernews.com/2025/10/npm-py…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 Billions lost. Operations frozen. Ransomware in 2025 is faster, smarter, and nearly unstoppable. LockBit, Lazarus, and FunkLocker are already inside corporate networks worldwide. Help your SOC detect threats early and respond with confidence ⬇️ thn.news/enterprise-thr…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 A Chinese APT hid inside ArcGIS for over a year. They turned a legit Java extension into a web shell. 🔑 Added a hardcoded key → exclusive access 💾 Hid it in backups → survived restores That’s what “living off the land” really means ↓ thehackernews.com/2025/10/chines…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

⚠️ Heads-up! SAP just re-patched a critical CVSS 10.0 flaw (CVE-2025-42944) in NetWeaver AS Java — a deserialization bug that lets attackers execute commands without authentication. Apply. The. Fix. → thehackernews.com/2025/10/new-sa…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🍪 A cookie that spawns a shell 💀 A critical flaw (CVE-2025-2611, CVSS 9.3) in ICTBroadcast autodialer software is under active exploitation. Attackers inject commands via the BROADCAST session cookie for unauthenticated remote code execution. No patch yet — check your stack

🍪 A cookie that spawns a shell 💀

A critical flaw (CVE-2025-2611, CVSS 9.3) in ICTBroadcast autodialer software is under active exploitation.

Attackers inject commands via the BROADCAST session cookie for unauthenticated remote code execution.

No patch yet — check your stack
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🔴 Microsoft just dropped fixes for 183 security flaws. 3 are already being exploited — including one buried in every Windows PC since XP. ...and at the same time, it is ending Windows 10 support (unless you pay). Details + patch info ↓ thehackernews.com/2025/10/two-ne…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 China-linked “Jewelbug” hackers quietly lived inside a Russian IT provider for 5 months. They used Microsoft’s own debugger to slip past defenses — and exfiltrated data to Yandex Cloud. Full story ↓ thehackernews.com/2025/10/chines…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 CISA just flagged a 10.0-severity flaw in Adobe Experience Manager. A single debug page can open the door to remote code execution — no login required. Attackers are already exploiting it, and many orgs still haven’t patched. Details ↓ thehackernews.com/2025/10/cisa-f…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 Hackers just turned a Cisco zero-day (CVE-2025-20352) into a Linux rootkit dropper—hitting routers before the patch dropped. The backdoor’s universal password was “disco.” Learn more about the Operation Zero Disco ↓ thehackernews.com/2025/10/hacker…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

Researchers uncovered "LinkPro," a Golang-based Linux rootkit that uses eBPF to hide processes and activate remotely via a secret “magic packet.” It spread through a malicious Docker image deployed on vulnerable Jenkins servers. Full report ↓ thehackernews.com/2025/10/linkpr…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

⚡ North Korean hackers just used the blockchain to hide malware — the first time ever seen. Google says they used EtherHiding to plant code inside smart contracts, making it nearly impossible to remove and easy to update for just $1.37 in gas fees. Full story ↓

⚡ North Korean hackers just used the blockchain to hide malware — the first time ever seen.

Google says they used EtherHiding to plant code inside smart contracts, making it nearly impossible to remove and easy to update for just $1.37 in gas fees.

Full story ↓
The Hacker News (@thehackersnews) 's Twitter Profile Photo

Get an inside look at Georgetown's Cybersecurity Risk Management program. Register for the virtual sample class on October 29. Attend here → thn.news/georgetown-cyb…

Get an inside look at Georgetown's Cybersecurity Risk Management program. Register for the virtual sample class on October 29.

Attend here → thn.news/georgetown-cyb…
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🚨 CVE-2025-9242 — Critical WatchGuard Fireware flaw (CVSS 9.3) Unauthenticated attackers can exploit a 520-byte overflow in IKEv2 before cert checks, executing code on VPN firewalls — even spawning a Python shell over TCP. Patch now ↓ thehackernews.com/2025/10/resear…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

📄 You open a tax doc. 💻 Windows quietly loads malware. 🛑 Your AV dies. 💀 You’re owned. That’s how Winos 4.0 and HoldingHands RAT are spreading right now — using Windows’ own Task Scheduler against it. Details here ↓ thehackernews.com/2025/10/silver…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

💣 Europol just dismantled a SIM farm-for-hire platform that powered 49 million fake accounts used for global fraud. It let anyone rent verified phone numbers from 80+ countries — to scam, extort, or launder money. Details → thehackernews.com/2025/10/europo…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

⚠️ Update: Contagious Interview now uses OtterCandy — a Node.js RAT + info-stealer tied to North Korean actors. Hides in npm/supply-chain lures, uses socket[.]io C2 to steal browser passwords & crypto wallets. v2 adds Suiet/Trust/Rabby harvesting + Windows registry wipes. Read

⚠️ Update: Contagious Interview now uses OtterCandy — a Node.js RAT + info-stealer tied to North Korean actors.

Hides in npm/supply-chain lures, uses socket[.]io C2 to steal browser passwords & crypto wallets. v2 adds Suiet/Trust/Rabby harvesting + Windows registry wipes.

Read
The Hacker News (@thehackersnews) 's Twitter Profile Photo

🕵️ China says the NSA hacked its national time servers — the system that keeps everything in sync. If that clock went down, it could’ve hit banks, power grids, even space launches. The attack used foreign SMS exploits, forged certs, and 42 stealth tools. Read →

🕵️ China says the NSA hacked its national time servers — the system that keeps everything in sync.

If that clock went down, it could’ve hit banks, power grids, even space launches.

The attack used foreign SMS exploits, forged certs, and 42 stealth tools.

Read →