🚨 Compliance ≠ Trust.
Join Vanta and Matt Johansen, Founder & Security Researcher at Vulnerable U, on July 23 to unpack the new Trust Maturity Report and explore what real security trust looks like—at every stage of growth.
Don’t miss the session: Security, AI, and Trust: Reviewing Vanta’s Trust Maturity Report → https://thn.news/trust-ai-security-webinar
Join Vanta and Matt Johansen, Founder & Security Researcher at Vulnerable U, on July 23 to unpack the new Trust Maturity Report and explore what real security trust looks like—at every stage of growth.
Don’t miss the session: Security, AI, and Trust: Reviewing Vanta’s Trust Maturity Report → https://thn.news/trust-ai-security-webinar
🔥8
🚨 85% of work now happens in the browser—yet most orgs still can’t see what’s pasted into ChatGPT.
A new guide exposes how GenAI, BYOD, and rogue extensions turned the browser into the #1 blind spot in enterprise security.
Get the fix → https://thehackernews.com/2025/07/a-new-maturity-model-for-browser.html
A new guide exposes how GenAI, BYOD, and rogue extensions turned the browser into the #1 blind spot in enterprise security.
Get the fix → https://thehackernews.com/2025/07/a-new-maturity-model-for-browser.html
😱13👍3
🚨 Verified? Think again.
Malicious extensions can pose as trusted in VS Code, IntelliJ, Visual Studio & #Cursor—bypassing checks and running OS commands.
The “verified” badge isn’t protection. Even Microsoft’s filters missed it.
Full details → https://thehackernews.com/2025/07/new-flaw-in-ides-like-visual-studio.html
Malicious extensions can pose as trusted in VS Code, IntelliJ, Visual Studio & #Cursor—bypassing checks and running OS commands.
The “verified” badge isn’t protection. Even Microsoft’s filters missed it.
Full details → https://thehackernews.com/2025/07/new-flaw-in-ides-like-visual-studio.html
🤯20🤔14👍5😁2😱1
🚨 Russia-linked hackers are now blurring the line between cybercrime and espionage.
TA829 & UNK_GreenSec are using identical tactics—fake job lures, IPFS malware, REM Proxies—to drop ransomware and spy tools.
Read details → https://thehackernews.com/2025/07/ta829-and-unkgreensec-share-tactics-and.html
TA829 & UNK_GreenSec are using identical tactics—fake job lures, IPFS malware, REM Proxies—to drop ransomware and spy tools.
Read details → https://thehackernews.com/2025/07/ta829-and-unkgreensec-share-tactics-and.html
😁17👍3🤔3
🚨 Critical RCE flaw hits Anthropic’s AI dev tool.
Just visiting a malicious site could let hackers run code on your machine.
It targets localhost—using a 19-year-old browser bug.
MCP Inspector < v0.14.1 is at risk.
Patch now → https://thehackernews.com/2025/07/critical-vulnerability-in-anthropics.html
Just visiting a malicious site could let hackers run code on your machine.
It targets localhost—using a 19-year-old browser bug.
MCP Inspector < v0.14.1 is at risk.
Patch now → https://thehackernews.com/2025/07/critical-vulnerability-in-anthropics.html
👏9👍3🔥2
🚨 Hackers are now using AI tools like Vercel's v0 to spin up fake login pages—just from text prompts.
They’re cloning trusted brands, hosting on legit platforms, and bypassing old phishing methods.
The AI phishing era is here.
Read details here → https://thehackernews.com/2025/07/vercels-v0-ai-tool-weaponized-by.html
They’re cloning trusted brands, hosting on legit platforms, and bypassing old phishing methods.
The AI phishing era is here.
Read details here → https://thehackernews.com/2025/07/vercels-v0-ai-tool-weaponized-by.html
👍14👏8🔥5😱1
🚨 AI agents are leaking sensitive enterprise data — and most orgs don’t even know it.
GenAI tools often connect to S3, SharePoint, Google Drive… without proper controls.
The risk? Silent breaches.
Join the webinar on July 7 to learn how to secure your AI workflows ↓ https://thehacker.news/securing-ai-agents-workflows?source=social
GenAI tools often connect to S3, SharePoint, Google Drive… without proper controls.
The risk? Silent breaches.
Join the webinar on July 7 to learn how to secure your AI workflows ↓ https://thehacker.news/securing-ai-agents-workflows?source=social
😁9👍1👏1
🚨 U.S. sanctions Russian hosting firm Aeza Group for fueling ransomware, data theft & drug trade.
Its CEO ran dark web drug markets. Its servers powered RomCom, RedLine, and Doppelganger ops.
This wasn't just hosting—it was cybercrime infrastructure.
READ → https://thehackernews.com/2025/07/us-sanctions-russian-bulletproof.html
Its CEO ran dark web drug markets. Its servers powered RomCom, RedLine, and Doppelganger ops.
This wasn't just hosting—it was cybercrime infrastructure.
READ → https://thehackernews.com/2025/07/us-sanctions-russian-bulletproof.html
🤔9👍5🤯5
🚨 Hackers now talk you into getting hacked.
PDF phishing emails impersonate Microsoft, PayPal, DocuSign—urging you to call fake support lines.
On the call, they steal your info or install malware.
FBI, Cisco, and Varonis warn: it’s rising fast.
Read how it works → https://thehackernews.com/2025/07/hackers-using-pdfs-to-impersonate.html
PDF phishing emails impersonate Microsoft, PayPal, DocuSign—urging you to call fake support lines.
On the call, they steal your info or install malware.
FBI, Cisco, and Varonis warn: it’s rising fast.
Read how it works → https://thehackernews.com/2025/07/hackers-using-pdfs-to-impersonate.html
😁13🤔4🤯4⚡2
🚨 Nearly 80% of cyberattacks now look like normal user behavior.
EDR alone can’t see through it—and attackers know it.
The fix? Elite SOCs are layering in Network Detection & Response (NDR) to catch what endpoints miss.
Here’s how it works ↓ https://thehackernews.com/2025/07/that-network-traffic-looks-legit-but-it.html
EDR alone can’t see through it—and attackers know it.
The fix? Elite SOCs are layering in Network Detection & Response (NDR) to catch what endpoints miss.
Here’s how it works ↓ https://thehackernews.com/2025/07/that-network-traffic-looks-legit-but-it.html
😁7🤔4🔥2👍1
🚀 Just dropped: the SAIL (Secure AI Lifecycle) Framework - open-source & free
Pillar Security teamed up with AI security leaders from companies like Google, Salesforce, and ServiceNow to create the first process-driven playbook for building and shipping secure AI applications.
🔸 7 development phases with actionable controls
🔸 70 + AI-specific risks and their mitigations
🔸 Mapped to NIST AI RMF, ISO 42001, OWASP & DASF
🔗 The framework is free and open to the community: https://thn.news/ai-security-sail-guide
Pillar Security teamed up with AI security leaders from companies like Google, Salesforce, and ServiceNow to create the first process-driven playbook for building and shipping secure AI applications.
🔸 7 development phases with actionable controls
🔸 70 + AI-specific risks and their mitigations
🔸 Mapped to NIST AI RMF, ISO 42001, OWASP & DASF
🔗 The framework is free and open to the community: https://thn.news/ai-security-sail-guide
👏9🔥3👍1
🚨 North Korean hackers are targeting crypto firms, Mac users, and national security experts—using fake Zoom links, job sites, and research requests.
They’re spreading malware through Nim, AppleScript, PowerShell, even GitHub & Dropbox.
See how it works → https://thehackernews.com/2025/07/north-korean-hackers-target-web3-with.html
They’re spreading malware through Nim, AppleScript, PowerShell, even GitHub & Dropbox.
See how it works → https://thehackernews.com/2025/07/north-korean-hackers-target-web3-with.html
🤔18🤯7👍5🔥2😁1
🚨 Cisco just patched a 10.0 CVSS flaw that let attackers log in as root—no config needed.
The backdoor? A static dev credential left in production.
It affected all Unified CM v15.0.1 builds.
Full details → https://thehackernews.com/2025/07/critical-cisco-vulnerability-in-unified.html
The backdoor? A static dev credential left in production.
It affected all Unified CM v15.0.1 builds.
Full details → https://thehackernews.com/2025/07/critical-cisco-vulnerability-in-unified.html
😁17👏6🤯3👍2🔥2
🚨 Chinese hackers hit France’s critical sectors using 3 Ivanti zero-days — and then patched them to keep others out.
Rootkits, web shells, and resale of access hint at a black-market cyber operation selling to state-linked buyers.
Find details here → https://thehackernews.com/2025/07/chinese-hackers-exploit-ivanti-csa-zero.html
Rootkits, web shells, and resale of access hint at a black-market cyber operation selling to state-linked buyers.
Find details here → https://thehackernews.com/2025/07/chinese-hackers-exploit-ivanti-csa-zero.html
😁17👏4😱4👍3🔥2
🚨 40+ fake crypto wallet extensions on Firefox were stealing users’ keys and IPs — in plain sight.
They cloned real wallets like MetaMask & Coinbase, faked 5-star reviews, and exfiltrated secrets to a remote server.
Full story → https://thehackernews.com/2025/07/over-40-malicious-firefox-extensions.html
They cloned real wallets like MetaMask & Coinbase, faked 5-star reviews, and exfiltrated secrets to a remote server.
Full story → https://thehackernews.com/2025/07/over-40-malicious-firefox-extensions.html
😁16🤯9👍3⚡2
🚨 DEVMAN is a new threat actor already claiming 40 victims across Asia, EU, LATAM, and Africa.
It's affiliated with Qilin, RansomHub, and DragonForce RaaS groups, targeting business and government.
Read technical analysis of the ransomware it uses on #ANYRUN's blog: https://thn.news/devman-ransomware-analysis-tg
It's affiliated with Qilin, RansomHub, and DragonForce RaaS groups, targeting business and government.
Read technical analysis of the ransomware it uses on #ANYRUN's blog: https://thn.news/devman-ransomware-analysis-tg
👏13👍6
🚨 Most AI SOC tools can’t triage new threats.
They rely on pre-trained models that only handle known attack types—leaving your team exposed.
Radiant’s adaptive AI learns in real time, triages any alert, and cuts response time from days to minutes.
Details here → https://thehackernews.com/2025/07/the-hidden-weaknesses-in-ai-soc-tools.html
They rely on pre-trained models that only handle known attack types—leaving your team exposed.
Radiant’s adaptive AI learns in real time, triages any alert, and cuts response time from days to minutes.
Details here → https://thehackernews.com/2025/07/the-hidden-weaknesses-in-ai-soc-tools.html
😁13👍4🤔1
🚨 Android adware is spiraling out of control:
🔸 352 hidden apps faked icons, flooded 1.2B ad bids/day
🔸 “Evil twin” apps clone legit ones to hijack ad revenue
🔸 NFC malware lets attackers withdraw cash remotely
🔸 SMS stealers hit 100K phones, draining bank accounts
What you need to know → https://thehackernews.com/2025/07/mobile-security-alert-352-iconads-fraud.html
🔸 352 hidden apps faked icons, flooded 1.2B ad bids/day
🔸 “Evil twin” apps clone legit ones to hijack ad revenue
🔸 NFC malware lets attackers withdraw cash remotely
🔸 SMS stealers hit 100K phones, draining bank accounts
What you need to know → https://thehackernews.com/2025/07/mobile-security-alert-352-iconads-fraud.html
🤯10😁7🔥4👍2
⚡ Google just got hit with a $314M verdict — for secretly using your mobile data while idle.
Phones sat still. It sent 900+ background transfers a day — and you paid for it.
Details here → https://thehackernews.com/2025/07/google-ordered-to-pay-314m-for-misusing.html
Phones sat still. It sent 900+ background transfers a day — and you paid for it.
Details here → https://thehackernews.com/2025/07/google-ordered-to-pay-314m-for-misusing.html
🤯41👍12🔥11👏4😁4😱1
🚨 Critical Sudo flaw lets any local user get root access on Linux.
No sudo rules required. Default configs are vulnerable.
It’s been hiding in plain sight—since 2013.
Fixes just dropped. Patch now.
Full details → https://thehackernews.com/2025/07/critical-sudo-vulnerabilities-let-local.html
No sudo rules required. Default configs are vulnerable.
It’s been hiding in plain sight—since 2013.
Fixes just dropped. Patch now.
Full details → https://thehackernews.com/2025/07/critical-sudo-vulnerabilities-let-local.html
😁26🤯10⚡9🤔6👏1
🚨 New APT group “NightEagle” is hacking Microsoft Exchange with stealthy tools and unpatched exploits.
Targets? China’s AI, military, and quantum tech sectors.
Activity aligns with North American time zones.
Here’s what’s known so far → https://thehackernews.com/2025/07/nighteagle-apt-exploits-microsoft.html
Targets? China’s AI, military, and quantum tech sectors.
Activity aligns with North American time zones.
Here’s what’s known so far → https://thehackernews.com/2025/07/nighteagle-apt-exploits-microsoft.html
🔥13👏5🤯4😁1