๐จ Machine identities now outnumber humans 100:1. GitGuardian found 70% of leaked secrets from 2022 remain active in 2025, fueling major breaches like US Treasury & Toyota.
Secrets spread across repos, pipelines, cloudsโbeyond traditional vaultsโ reach.
Non-human identity risk is a top OWASP threat in 2025.
Full story โ https://thehackernews.com/2025/06/non-human-identities-how-to-address.html
Secrets spread across repos, pipelines, cloudsโbeyond traditional vaultsโ reach.
Non-human identity risk is a top OWASP threat in 2025.
Full story โ https://thehackernews.com/2025/06/non-human-identities-how-to-address.html
๐4
๐จ Zero-click AI exploit in Microsoft 365 Copilot (CVE-2025-32711, CVSS 9.3) lets attackers steal sensitive data silently via emailโno user interaction needed.
Details โ https://thehackernews.com/2025/06/zero-click-ai-vulnerability-exposes.html
Already patched, but shows serious AI security risks ahead.
Details โ https://thehackernews.com/2025/06/zero-click-ai-vulnerability-exposes.html
Already patched, but shows serious AI security risks ahead.
๐16โก10๐4๐ค4
โจ Webinar Alert! Artificial Intelligence isnโt just transforming tech โ itโs creating invisible, unchecked identities hackers exploit to breach your systems silently.
Traditional security canโt see or stop them.
If you use AI, youโre at risk.
LEARN out how to secure these hidden non-human identities โ https://thehackernews.com/2025/06/ai-agents-run-on-secret-accounts-learn.html
Traditional security canโt see or stop them.
If you use AI, youโre at risk.
LEARN out how to secure these hidden non-human identities โ https://thehackernews.com/2025/06/ai-agents-run-on-secret-accounts-learn.html
๐9๐คฏ4๐ฑ2
โ ๏ธ New TokenBreak ATTACK lets attackers bypass AI content filters by tweaking just one letterโmaking harmful prompts slip past unnoticed.
It fools many text classifiers while keeping meaning clear to humans and AI, enabling prompt injections.
Read more โ https://thehackernews.com/2025/06/new-tokenbreak-attack-bypasses-ai.html
It fools many text classifiers while keeping meaning clear to humans and AI, enabling prompt injections.
Read more โ https://thehackernews.com/2025/06/new-tokenbreak-attack-bypasses-ai.html
๐5๐4๐ค3๐คฏ1
VexTrioโs cybercrime network hijacks hundreds of thousands of websites to spread scams & malware through fake ads and push alerts.
Even after a setback in late 2024, they keep running using clever DNS tricks & Russian servers.
What;s really going on โ https://thehackernews.com/2025/06/wordpress-sites-turned-weapon-how.html
Even after a setback in late 2024, they keep running using clever DNS tricks & Russian servers.
What;s really going on โ https://thehackernews.com/2025/06/wordpress-sites-turned-weapon-how.html
๐คฏ12๐ฅ5๐3๐1๐ค1๐ฑ1
This media is not supported in your browser
VIEW IN TELEGRAM
๐จ WARNING: Apple just confirmed a serious zero-click flaw in Messages was actively exploited to spy on journalists using Israeli spyware Paragon Graphite โ no user action needed.
Details here โ https://thehackernews.com/2025/06/apple-zero-click-flaw-in-messages.html
Details here โ https://thehackernews.com/2025/06/apple-zero-click-flaw-in-messages.html
๐คฏ31๐ค8๐ฅ6๐3๐ฑ2๐1
๐จ Ransomware gangs are exploiting unpatched SimpleHelp flaws to hit utility billing customers with double extortion attacks โ since Jan 2025.
CISA warns: patch now or risk serious breaches.
Read โ https://thehackernews.com/2025/06/ransomware-gangs-exploit-unpatched.html
Meanwhile, new Fog ransomware uses legit employee monitoring software to stay hidden and persistent for weeks.
CISA warns: patch now or risk serious breaches.
Read โ https://thehackernews.com/2025/06/ransomware-gangs-exploit-unpatched.html
Meanwhile, new Fog ransomware uses legit employee monitoring software to stay hidden and persistent for weeks.
๐14๐ฅ2
Security teams drown in alertsโbut real risks slip through unnoticed.
Continuous Threat Exposure Management (CTEM) shifts focus from alerts to actual attack paths, prioritizing prevention over reaction.
Stop chasing every alert. Start managing risk with purpose.
Read more โ https://thehackernews.com/2025/06/ctem-is-new-soc-shifting-from.html
Continuous Threat Exposure Management (CTEM) shifts focus from alerts to actual attack paths, prioritizing prevention over reaction.
Stop chasing every alert. Start managing risk with purpose.
Read more โ https://thehackernews.com/2025/06/ctem-is-new-soc-shifting-from.html
๐7๐1
๐จ Over 269,000 legit websites hijacked with hidden JavaScript redirecting search engine visitors to malware and scams.
Using a stealthy JSFireTruck obfuscation, attackers fingerprint devices to serve fake CAPTCHAs, tech support scams, and malwareโevading detection at scale.
Learn how this massive campaign works โ https://thehackernews.com/2025/06/over-269000-websites-infected-with.html
Using a stealthy JSFireTruck obfuscation, attackers fingerprint devices to serve fake CAPTCHAs, tech support scams, and malwareโevading detection at scale.
Learn how this massive campaign works โ https://thehackernews.com/2025/06/over-269000-websites-infected-with.html
๐คฏ9๐5
Discord invite links are being hijacked to deliver malware that steals crypto wallets and personal data.
Attackers reuse expired/deleted invites, redirecting to fake servers, tricking users into running malicious PowerShell scripts disguised as verification.
Full details here โ https://thehackernews.com/2025/06/discord-invite-link-hijacking-delivers.html
This Multi-stage attack uses Pastebin & GitHub to evade security tools.
Attackers reuse expired/deleted invites, redirecting to fake servers, tricking users into running malicious PowerShell scripts disguised as verification.
Full details here โ https://thehackernews.com/2025/06/discord-invite-link-hijacking-delivers.html
This Multi-stage attack uses Pastebin & GitHub to evade security tools.
๐35๐ค12๐8๐ฅ3๐3๐คฏ1
โ ๏ธ A fake Python package just stole AWS tokens, Jamf data & CI/CD secrets โ from devs at Grab.
The malware posed as a legit helper for ML workflows, hid a multi-stage info-stealer, and targeted macOS too.
Details here โ https://thehackernews.com/2025/06/malicious-pypi-package-masquerades-as.html
The malware posed as a legit helper for ML workflows, hid a multi-stage info-stealer, and targeted macOS too.
Details here โ https://thehackernews.com/2025/06/malicious-pypi-package-masquerades-as.html
๐ฑ19๐ฅ12๐10โก5๐2๐2
๐จ Most cybersecurity providers are leaving money on the table.
Still selling one-off audits or patch jobs? You're missing the shift.
Strategic services like vCISO programs arenโt just higher valueโtheyโre recurring revenue machines.
How to evolve your offering โ https://thehackernews.com/2025/06/playbook-transforming-your.html
Still selling one-off audits or patch jobs? You're missing the shift.
Strategic services like vCISO programs arenโt just higher valueโtheyโre recurring revenue machines.
How to evolve your offering โ https://thehackernews.com/2025/06/playbook-transforming-your.html
๐7๐ฅ3๐3
๐จ New ransomware โAnubisโ can encrypt your filesโand then erase them forever.
Even if you pay, recovery is impossible. Victims span healthcare, hospitality & more.
This rare dual-threat ups the pressure to pay.
Details here โ https://thehackernews.com/2025/06/anubis-ransomware-encrypts-and-wipes.html
Even if you pay, recovery is impossible. Victims span healthcare, hospitality & more.
This rare dual-threat ups the pressure to pay.
Details here โ https://thehackernews.com/2025/06/anubis-ransomware-encrypts-and-wipes.html
๐คฏ19๐ฅ10๐ฑ7โก3๐2
๐จ U.S. seizes $7.7M linked to North Korean IT worker scam targeting crypto firms.
Fake identities, AI tools, and Zoom hacks helped funnel millions to fund Pyongyangโs weapons program.
Hereโs how deep the deception goes โ https://thehackernews.com/2025/06/us-seizes-774m-in-crypto-tied-to-north.html
Fake identities, AI tools, and Zoom hacks helped funnel millions to fund Pyongyangโs weapons program.
Hereโs how deep the deception goes โ https://thehackernews.com/2025/06/us-seizes-774m-in-crypto-tied-to-north.html
๐18๐ค8๐คฏ7๐6โก5
๐จ WhatsApp ads are finally hereโinside your Status updates.
Meta says itโs privacy-friendly, but itโs tapping your location, device data, and even Facebook activity to target you.
Hereโs whatโs changing โ https://thehackernews.com/2025/06/meta-starts-showing-ads-on-whatsapp.html
Meta says itโs privacy-friendly, but itโs tapping your location, device data, and even Facebook activity to target you.
Hereโs whatโs changing โ https://thehackernews.com/2025/06/meta-starts-showing-ads-on-whatsapp.html
๐ฑ25๐16๐คฏ14๐5โก3๐ค2๐ฅ1๐1
๐จ VPNs are now a business risk โ not just a security hole.
Hackers are using AI to scan for flaws 24/7. One bug in your VPN, and itโs open season.
The fix? Stop trusting the network. Start securing access.
Details here โ https://thehackernews.com/expert-insights/2025/04/its-time-to-rethink-your-security-for.html
Hackers are using AI to scan for flaws 24/7. One bug in your VPN, and itโs open season.
The fix? Stop trusting the network. Start securing access.
Details here โ https://thehackernews.com/expert-insights/2025/04/its-time-to-rethink-your-security-for.html
๐18๐ฅ3๐1๐คฏ1
๐จ CISA just flagged a live exploit in TP-Link routers (CVE-2023-33538, CVSS 8.8) โ attackers can run system commands remotely.
Worse? Many affected models may be end-of-life, with no fix coming.
Hereโs what you need to know โ https://thehackernews.com/2025/06/tp-link-router-flaw-cve-2023-33538.html
Worse? Many affected models may be end-of-life, with no fix coming.
Hereโs what you need to know โ https://thehackernews.com/2025/06/tp-link-router-flaw-cve-2023-33538.html
๐ฑ17๐5๐ฅ1
๐จ Langflow flaw (CVSS 9.8) now exploited in the wild โ installs new Flodrix botnet
No login needed. One HTTP request = full remote control.
Targets AI servers for encrypted DDoS via TOR.
Details here โ https://thehackernews.com/2025/06/new-flodrix-botnet-variant-exploits.html
No login needed. One HTTP request = full remote control.
Targets AI servers for encrypted DDoS via TOR.
Details here โ https://thehackernews.com/2025/06/new-flodrix-botnet-variant-exploits.html
๐11๐ฅ4๐1
๐จ Sitecore flaw gives hackers full access โ with a single-character password.
A default login of โbโ can be chained to remote code execution. It works pre-auth.
Used by banks, airlines, global firms. The blast radius is huge.
Hereโs what you need to know โ https://thehackernews.com/2025/06/hard-coded-b-password-in-sitecore-xp.html
A default login of โbโ can be chained to remote code execution. It works pre-auth.
Used by banks, airlines, global firms. The blast radius is huge.
Hereโs what you need to know โ https://thehackernews.com/2025/06/hard-coded-b-password-in-sitecore-xp.html
๐11๐ฅ4๐2๐ฑ1
๐จ Ransomware is now destroying your backups first.
Hackers are targeting snapshots, wiping cloud copies, and deleting recovery paths โ before locking your systems.
The worst part? Many orgs donโt realize it until itโs too late.
Hereโs how to bulletproof your backups โ https://thehackernews.com/2025/06/how-to-protect-your-backups-from-ransomware-attacks.html
Hackers are targeting snapshots, wiping cloud copies, and deleting recovery paths โ before locking your systems.
The worst part? Many orgs donโt realize it until itโs too late.
Hereโs how to bulletproof your backups โ https://thehackernews.com/2025/06/how-to-protect-your-backups-from-ransomware-attacks.html
๐คฏ13๐7๐4๐ฅ3๐2๐ฑ1
๐จ 24 million secrets exposed on GitHubโand AI is making it worse.
Repos using Copilot are 40% more likely to leak credentials.
Think API keys, SSH tokensโฆ the stuff attackers love.
The worst part? Most devs donโt even know theyโre leaking them.
Hereโs how to fix it โ https://thehackernews.com/expert-insights/2025/06/exposed-developer-secrets-are-big.html
Repos using Copilot are 40% more likely to leak credentials.
Think API keys, SSH tokensโฆ the stuff attackers love.
The worst part? Most devs donโt even know theyโre leaking them.
Hereโs how to fix it โ https://thehackernews.com/expert-insights/2025/06/exposed-developer-secrets-are-big.html
๐15๐ฑ4๐3๐ฅ2