The Hacker NewsThe maintainer of Notepad++ has revealed that state-sponsored attackers hijacked the utility’s update mechanism to redirect update traffic to malicious servers instead.
“The attack involved [an] infrastructure-level compromise that allowed malicious actors to intercept and redirect update traffic destined for notepad-plus-plus.org,” developer Don Ho said. “The compromise occurred at the hostingRead More
Author: chouaibcher@gmail.com
-

Notepad++ Official Update Mechanism Hijacked to Deliver Malware to Select Users
-

Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected
The Hacker NewsFortinet has begun releasing security updates to address a critical flaw impacting FortiOS that has come under active exploitation in the wild.
The vulnerability, assigned the CVE identifier CVE-2026-24858 (CVSS score: 9.4), has been described as an authentication bypass related to FortiOS single sign-on (SSO). The flaw also affects FortiManager and FortiAnalyzer. The company said it’sRead More -

Microsoft Warns Python Infostealers Target macOS via Fake Ads and Installers
The Hacker NewsMicrosoft has warned that information-stealing attacks are “rapidly expanding” beyond Windows to target Apple macOS environments by leveraging cross-platform languages like Python and abusing trusted platforms for distribution at scale.
The tech giant’s Defender Security Research Team said it observed macOS-targeted infostealer campaigns using social engineering techniques such as ClickFix sinceRead More -

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
The Hacker NewsThis week didn’t produce one big headline. It produced many small signals — the kind that quietly shape what attacks will look like next.
Researchers tracked intrusions that start in ordinary places: developer workflows, remote tools, cloud access, identity paths, and even routine user actions. Nothing looked dramatic on the surface. That’s the point. Entry is becoming lessRead More -

The Buyer’s Guide to AI Usage Control
The Hacker NewsToday’s “AI everywhere” reality is woven into everyday workflows across the enterprise, embedded in SaaS platforms, browsers, copilots, extensions, and a rapidly expanding universe of shadow tools that appear faster than security teams can track. Yet most organizations still rely on legacy controls that operate far away from where AI interactions actually occur. The result is a wideningRead More
-

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
The Hacker NewsThe elusive Iranian threat group known as Infy (aka Prince of Persia) has evolved its tactics as part of efforts to hide its tracks, even as it readied new command-and-control (C2) infrastructure coinciding with the end of the widespread internet blackout the regime imposed at the start of January 2026.
“The threat actor stopped maintaining its C2 servers on January 8 for the first time since weRead More -

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows
The Hacker NewsA new, critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in the execution of arbitrary system commands.
The flaw, tracked as CVE-2026-25049 (CVSS score: 9.4), is the result of inadequate sanitization that bypasses safeguards put in place to address CVE-2025-68613 (CVSS score: 9.9), another critical defect thatRead More -

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign
The Hacker NewsCybersecurity researchers have disclosed details of an active web traffic hijacking campaign that has targeted NGINX installations and management panels like Baota (BT) in an attempt to route it through the attacker’s infrastructure.
Datadog Security Labs said it observed threat actors associated with the recent React2Shell (CVE-2025-55182, CVSS score: 10.0) exploitation using malicious NGINXRead More -

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
The Hacker NewsA previously undocumented cyber espionage group operating from Asia broke into the networks of at least 70 government and critical infrastructure organizations across 37 countries over the past year, according to new findings from Palo Alto Networks Unit 42.
In addition, the hacking crew has been observed conducting active reconnaissance against government infrastructure associated with 155Read More -

How Samsung Knox Helps Stop Your Network Security Breach
The Hacker NewsAs you know, enterprise network security has undergone significant evolution over the past decade. Firewalls have become more intelligent, threat detection methods have advanced, and access controls are now more detailed. However (and it’s a big “however”), the increasing use of mobile devices in business operations necessitates network security measures that are specificallyRead More