The Hacker News
151K subscribers
1.84K photos
9 videos
3 files
7.75K links
Official THN Telegram Channel — A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

📨 Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
🚨 Hackers are now using AI tools like Vercel's v0 to spin up fake login pages—just from text prompts.

They’re cloning trusted brands, hosting on legit platforms, and bypassing old phishing methods.

The AI phishing era is here.

Read details here → https://thehackernews.com/2025/07/vercels-v0-ai-tool-weaponized-by.html
👍14👏8🔥5😱1
🚨 AI agents are leaking sensitive enterprise data — and most orgs don’t even know it.

GenAI tools often connect to S3, SharePoint, Google Drive… without proper controls.

The risk? Silent breaches.

Join the webinar on July 7 to learn how to secure your AI workflows ↓ https://thehacker.news/securing-ai-agents-workflows?source=social
😁9👍1👏1
🚨 U.S. sanctions Russian hosting firm Aeza Group for fueling ransomware, data theft & drug trade.

Its CEO ran dark web drug markets. Its servers powered RomCom, RedLine, and Doppelganger ops.

This wasn't just hosting—it was cybercrime infrastructure.

READ → https://thehackernews.com/2025/07/us-sanctions-russian-bulletproof.html
🤔9👍5🤯5
🚨 Hackers now talk you into getting hacked.

PDF phishing emails impersonate Microsoft, PayPal, DocuSign—urging you to call fake support lines.

On the call, they steal your info or install malware.

FBI, Cisco, and Varonis warn: it’s rising fast.

Read how it works → https://thehackernews.com/2025/07/hackers-using-pdfs-to-impersonate.html
😁13🤔4🤯42
🚨 Nearly 80% of cyberattacks now look like normal user behavior.

EDR alone can’t see through it—and attackers know it.

The fix? Elite SOCs are layering in Network Detection & Response (NDR) to catch what endpoints miss.

Here’s how it works ↓ https://thehackernews.com/2025/07/that-network-traffic-looks-legit-but-it.html
😁7🤔4🔥2👍1
🚀 Just dropped: the SAIL (Secure AI Lifecycle) Framework - open-source & free

Pillar Security teamed up with AI security leaders from companies like Google, Salesforce, and ServiceNow to create the first process-driven playbook for building and shipping secure AI applications.

🔸 7 development phases with actionable controls
🔸 70 + AI-specific risks and their mitigations
🔸 Mapped to NIST AI RMF, ISO 42001, OWASP & DASF

🔗 The framework is free and open to the community: https://thn.news/ai-security-sail-guide
👏9🔥3👍1
🚨 North Korean hackers are targeting crypto firms, Mac users, and national security experts—using fake Zoom links, job sites, and research requests.

They’re spreading malware through Nim, AppleScript, PowerShell, even GitHub & Dropbox.

See how it works → https://thehackernews.com/2025/07/north-korean-hackers-target-web3-with.html
🤔18🤯7👍5🔥2😁1
🚨 Cisco just patched a 10.0 CVSS flaw that let attackers log in as root—no config needed.

The backdoor? A static dev credential left in production.

It affected all Unified CM v15.0.1 builds.

Full details → https://thehackernews.com/2025/07/critical-cisco-vulnerability-in-unified.html
😁17👏6🤯3👍2🔥2
🚨 Chinese hackers hit France’s critical sectors using 3 Ivanti zero-days — and then patched them to keep others out.

Rootkits, web shells, and resale of access hint at a black-market cyber operation selling to state-linked buyers.

Find details here → https://thehackernews.com/2025/07/chinese-hackers-exploit-ivanti-csa-zero.html
😁17👏4😱4👍3🔥2
🚨 40+ fake crypto wallet extensions on Firefox were stealing users’ keys and IPs — in plain sight.

They cloned real wallets like MetaMask & Coinbase, faked 5-star reviews, and exfiltrated secrets to a remote server.

Full story → https://thehackernews.com/2025/07/over-40-malicious-firefox-extensions.html
😁16🤯9👍32
🚨 DEVMAN is a new threat actor already claiming 40 victims across Asia, EU, LATAM, and Africa.

It's affiliated with Qilin, RansomHub, and DragonForce RaaS groups, targeting business and government.

Read technical analysis of the ransomware it uses on #ANYRUN's blog: https://thn.news/devman-ransomware-analysis-tg
👏13👍6
🚨 Most AI SOC tools can’t triage new threats.

They rely on pre-trained models that only handle known attack types—leaving your team exposed.

Radiant’s adaptive AI learns in real time, triages any alert, and cuts response time from days to minutes.

Details here → https://thehackernews.com/2025/07/the-hidden-weaknesses-in-ai-soc-tools.html
😁13👍4🤔1
🚨 Android adware is spiraling out of control:

🔸 352 hidden apps faked icons, flooded 1.2B ad bids/day
🔸 “Evil twin” apps clone legit ones to hijack ad revenue
🔸 NFC malware lets attackers withdraw cash remotely
🔸 SMS stealers hit 100K phones, draining bank accounts

What you need to know → https://thehackernews.com/2025/07/mobile-security-alert-352-iconads-fraud.html
🤯10😁7🔥4👍2
Google just got hit with a $314M verdict — for secretly using your mobile data while idle.

Phones sat still. It sent 900+ background transfers a day — and you paid for it.

Details here → https://thehackernews.com/2025/07/google-ordered-to-pay-314m-for-misusing.html
🤯41👍12🔥11👏4😁4😱1
🚨 Critical Sudo flaw lets any local user get root access on Linux.

No sudo rules required. Default configs are vulnerable.
It’s been hiding in plain sight—since 2013.

Fixes just dropped. Patch now.

Full details → https://thehackernews.com/2025/07/critical-sudo-vulnerabilities-let-local.html
😁26🤯109🤔6👏1
🚨 New APT group “NightEagle” is hacking Microsoft Exchange with stealthy tools and unpatched exploits.

Targets? China’s AI, military, and quantum tech sectors.

Activity aligns with North American time zones.

Here’s what’s known so far → https://thehackernews.com/2025/07/nighteagle-apt-exploits-microsoft.html
🔥13👏5🤯4😁1
🚨 AI agents are leaking sensitive data — quietly, constantly, and inside your trusted tools.

Don’t wait for a breach.

Join the free webinar to secure your GenAI workflows → https://thehackernews.com/2025/07/your-ai-agents-might-be-leaking-data.html
🤔16😁2
🚨 1,500+ malicious IPs are scanning for exposed Java debug ports right now.

Hackers are using misconfigured JDWP to hijack CI/CD tools like TeamCity, dropping stealth crypto miners.

Worse? They're hiding wallets, killing rival payloads, and mimicking system processes.

Here’s how it works → https://thehackernews.com/2025/07/alert-exposed-jdwp-interfaces-lead-to.html
😁12🔥5👏2
🚨 Taiwan warns: RedNote, TikTok, WeChat & others send your data—including face scans & contacts—back to China.

RedNote broke all 15 security rules. TikTok, 13.

Chinese law requires companies to hand over this data.

Full details → https://thehackernews.com/2025/07/taiwan-nsb-alerts-public-on-data-risks.html
👏30😁15👍126😱4🔥3
🚨 APT36 spoofed India’s Defence Ministry website to deliver DRAT V2 malware.

A fake press release tricks users into pasting a command—giving attackers full remote control.

Targets include defense, oil, railways, and foreign affairs.

Details here → https://thehackernews.com/2025/07/tag-140-deploys-drat-v2-rat-targeting.html
🤯23🔥9😁4👍3
🚨 Employees are feeding company secrets into ChatGPT—and you might never know it.

Blocking AI apps doesn’t stop the risk. It just hides it.

Shadow AI is exploding as workers find workarounds. The real danger? You’ve lost visibility.

Here’s how to take control → https://thehackernews.com/expert-insights/2025/07/shadow-ai-how-to-mitigate-hidden-risks.html
😁16👍12🔥3