๐จ Nearly 80% of cyberattacks now look like normal user behavior.
EDR alone canโt see through itโand attackers know it.
The fix? Elite SOCs are layering in Network Detection & Response (NDR) to catch what endpoints miss.
Hereโs how it works โ https://thehackernews.com/2025/07/that-network-traffic-looks-legit-but-it.html
EDR alone canโt see through itโand attackers know it.
The fix? Elite SOCs are layering in Network Detection & Response (NDR) to catch what endpoints miss.
Hereโs how it works โ https://thehackernews.com/2025/07/that-network-traffic-looks-legit-but-it.html
๐7๐ค4๐ฅ2๐1
๐ Just dropped: the SAIL (Secure AI Lifecycle) Framework - open-source & free
Pillar Security teamed up with AI security leaders from companies like Google, Salesforce, and ServiceNow to create the first process-driven playbook for building and shipping secure AI applications.
๐ธ 7 development phases with actionable controls
๐ธ 70 + AI-specific risks and their mitigations
๐ธ Mapped to NIST AI RMF, ISO 42001, OWASP & DASF
๐ The framework is free and open to the community: https://thn.news/ai-security-sail-guide
Pillar Security teamed up with AI security leaders from companies like Google, Salesforce, and ServiceNow to create the first process-driven playbook for building and shipping secure AI applications.
๐ธ 7 development phases with actionable controls
๐ธ 70 + AI-specific risks and their mitigations
๐ธ Mapped to NIST AI RMF, ISO 42001, OWASP & DASF
๐ The framework is free and open to the community: https://thn.news/ai-security-sail-guide
๐9๐ฅ3๐1
๐จ North Korean hackers are targeting crypto firms, Mac users, and national security expertsโusing fake Zoom links, job sites, and research requests.
Theyโre spreading malware through Nim, AppleScript, PowerShell, even GitHub & Dropbox.
See how it works โ https://thehackernews.com/2025/07/north-korean-hackers-target-web3-with.html
Theyโre spreading malware through Nim, AppleScript, PowerShell, even GitHub & Dropbox.
See how it works โ https://thehackernews.com/2025/07/north-korean-hackers-target-web3-with.html
๐ค18๐คฏ7๐5๐ฅ2๐1
๐จ Cisco just patched a 10.0 CVSS flaw that let attackers log in as rootโno config needed.
The backdoor? A static dev credential left in production.
It affected all Unified CM v15.0.1 builds.
Full details โ https://thehackernews.com/2025/07/critical-cisco-vulnerability-in-unified.html
The backdoor? A static dev credential left in production.
It affected all Unified CM v15.0.1 builds.
Full details โ https://thehackernews.com/2025/07/critical-cisco-vulnerability-in-unified.html
๐17๐6๐คฏ3๐2๐ฅ2
๐จ Chinese hackers hit Franceโs critical sectors using 3 Ivanti zero-days โ and then patched them to keep others out.
Rootkits, web shells, and resale of access hint at a black-market cyber operation selling to state-linked buyers.
Find details here โ https://thehackernews.com/2025/07/chinese-hackers-exploit-ivanti-csa-zero.html
Rootkits, web shells, and resale of access hint at a black-market cyber operation selling to state-linked buyers.
Find details here โ https://thehackernews.com/2025/07/chinese-hackers-exploit-ivanti-csa-zero.html
๐17๐4๐ฑ4๐3๐ฅ2
๐จ 40+ fake crypto wallet extensions on Firefox were stealing usersโ keys and IPs โ in plain sight.
They cloned real wallets like MetaMask & Coinbase, faked 5-star reviews, and exfiltrated secrets to a remote server.
Full story โ https://thehackernews.com/2025/07/over-40-malicious-firefox-extensions.html
They cloned real wallets like MetaMask & Coinbase, faked 5-star reviews, and exfiltrated secrets to a remote server.
Full story โ https://thehackernews.com/2025/07/over-40-malicious-firefox-extensions.html
๐16๐คฏ9๐3โก2
๐จ DEVMAN is a new threat actor already claiming 40 victims across Asia, EU, LATAM, and Africa.
It's affiliated with Qilin, RansomHub, and DragonForce RaaS groups, targeting business and government.
Read technical analysis of the ransomware it uses on #ANYRUN's blog: https://thn.news/devman-ransomware-analysis-tg
It's affiliated with Qilin, RansomHub, and DragonForce RaaS groups, targeting business and government.
Read technical analysis of the ransomware it uses on #ANYRUN's blog: https://thn.news/devman-ransomware-analysis-tg
๐13๐6
๐จ Most AI SOC tools canโt triage new threats.
They rely on pre-trained models that only handle known attack typesโleaving your team exposed.
Radiantโs adaptive AI learns in real time, triages any alert, and cuts response time from days to minutes.
Details here โ https://thehackernews.com/2025/07/the-hidden-weaknesses-in-ai-soc-tools.html
They rely on pre-trained models that only handle known attack typesโleaving your team exposed.
Radiantโs adaptive AI learns in real time, triages any alert, and cuts response time from days to minutes.
Details here โ https://thehackernews.com/2025/07/the-hidden-weaknesses-in-ai-soc-tools.html
๐13๐4๐ค1
๐จ Android adware is spiraling out of control:
๐ธ 352 hidden apps faked icons, flooded 1.2B ad bids/day
๐ธ โEvil twinโ apps clone legit ones to hijack ad revenue
๐ธ NFC malware lets attackers withdraw cash remotely
๐ธ SMS stealers hit 100K phones, draining bank accounts
What you need to know โ https://thehackernews.com/2025/07/mobile-security-alert-352-iconads-fraud.html
๐ธ 352 hidden apps faked icons, flooded 1.2B ad bids/day
๐ธ โEvil twinโ apps clone legit ones to hijack ad revenue
๐ธ NFC malware lets attackers withdraw cash remotely
๐ธ SMS stealers hit 100K phones, draining bank accounts
What you need to know โ https://thehackernews.com/2025/07/mobile-security-alert-352-iconads-fraud.html
๐คฏ10๐7๐ฅ4๐2
โก Google just got hit with a $314M verdict โ for secretly using your mobile data while idle.
Phones sat still. It sent 900+ background transfers a day โ and you paid for it.
Details here โ https://thehackernews.com/2025/07/google-ordered-to-pay-314m-for-misusing.html
Phones sat still. It sent 900+ background transfers a day โ and you paid for it.
Details here โ https://thehackernews.com/2025/07/google-ordered-to-pay-314m-for-misusing.html
๐คฏ41๐12๐ฅ11๐4๐4๐ฑ1
๐จ Critical Sudo flaw lets any local user get root access on Linux.
No sudo rules required. Default configs are vulnerable.
Itโs been hiding in plain sightโsince 2013.
Fixes just dropped. Patch now.
Full details โ https://thehackernews.com/2025/07/critical-sudo-vulnerabilities-let-local.html
No sudo rules required. Default configs are vulnerable.
Itโs been hiding in plain sightโsince 2013.
Fixes just dropped. Patch now.
Full details โ https://thehackernews.com/2025/07/critical-sudo-vulnerabilities-let-local.html
๐26๐คฏ10โก9๐ค6๐1
๐จ New APT group โNightEagleโ is hacking Microsoft Exchange with stealthy tools and unpatched exploits.
Targets? Chinaโs AI, military, and quantum tech sectors.
Activity aligns with North American time zones.
Hereโs whatโs known so far โ https://thehackernews.com/2025/07/nighteagle-apt-exploits-microsoft.html
Targets? Chinaโs AI, military, and quantum tech sectors.
Activity aligns with North American time zones.
Hereโs whatโs known so far โ https://thehackernews.com/2025/07/nighteagle-apt-exploits-microsoft.html
๐ฅ13๐5๐คฏ4๐1
๐จ AI agents are leaking sensitive data โ quietly, constantly, and inside your trusted tools.
Donโt wait for a breach.
Join the free webinar to secure your GenAI workflows โ https://thehackernews.com/2025/07/your-ai-agents-might-be-leaking-data.html
Donโt wait for a breach.
Join the free webinar to secure your GenAI workflows โ https://thehackernews.com/2025/07/your-ai-agents-might-be-leaking-data.html
๐ค16๐2
๐จ 1,500+ malicious IPs are scanning for exposed Java debug ports right now.
Hackers are using misconfigured JDWP to hijack CI/CD tools like TeamCity, dropping stealth crypto miners.
Worse? They're hiding wallets, killing rival payloads, and mimicking system processes.
Hereโs how it works โ https://thehackernews.com/2025/07/alert-exposed-jdwp-interfaces-lead-to.html
Hackers are using misconfigured JDWP to hijack CI/CD tools like TeamCity, dropping stealth crypto miners.
Worse? They're hiding wallets, killing rival payloads, and mimicking system processes.
Hereโs how it works โ https://thehackernews.com/2025/07/alert-exposed-jdwp-interfaces-lead-to.html
๐12๐ฅ5๐2
๐จ Taiwan warns: RedNote, TikTok, WeChat & others send your dataโincluding face scans & contactsโback to China.
RedNote broke all 15 security rules. TikTok, 13.
Chinese law requires companies to hand over this data.
Full details โ https://thehackernews.com/2025/07/taiwan-nsb-alerts-public-on-data-risks.html
RedNote broke all 15 security rules. TikTok, 13.
Chinese law requires companies to hand over this data.
Full details โ https://thehackernews.com/2025/07/taiwan-nsb-alerts-public-on-data-risks.html
๐30๐15๐12โก6๐ฑ4๐ฅ3
๐จ APT36 spoofed Indiaโs Defence Ministry website to deliver DRAT V2 malware.
A fake press release tricks users into pasting a commandโgiving attackers full remote control.
Targets include defense, oil, railways, and foreign affairs.
Details here โ https://thehackernews.com/2025/07/tag-140-deploys-drat-v2-rat-targeting.html
A fake press release tricks users into pasting a commandโgiving attackers full remote control.
Targets include defense, oil, railways, and foreign affairs.
Details here โ https://thehackernews.com/2025/07/tag-140-deploys-drat-v2-rat-targeting.html
๐คฏ23๐ฅ9๐4๐3
๐จ Employees are feeding company secrets into ChatGPTโand you might never know it.
Blocking AI apps doesnโt stop the risk. It just hides it.
Shadow AI is exploding as workers find workarounds. The real danger? Youโve lost visibility.
Hereโs how to take control โ https://thehackernews.com/expert-insights/2025/07/shadow-ai-how-to-mitigate-hidden-risks.html
Blocking AI apps doesnโt stop the risk. It just hides it.
Shadow AI is exploding as workers find workarounds. The real danger? Youโve lost visibility.
Hereโs how to take control โ https://thehackernews.com/expert-insights/2025/07/shadow-ai-how-to-mitigate-hidden-risks.html
๐16๐12๐ฅ3
๐จ Hackers took over a US water plant using the default password: 1111.
Yes, that still worksโin 2025.
Default passwords are quietly powering ransomware, DDoS, and supply chain attacks worldwide.
Full story + what to do about it โ https://thehackernews.com/2025/07/manufacturing-security-why-default.html
Yes, that still worksโin 2025.
Default passwords are quietly powering ransomware, DDoS, and supply chain attacks worldwide.
Full story + what to do about it โ https://thehackernews.com/2025/07/manufacturing-security-why-default.html
๐48๐คฏ18๐6๐ค3๐2๐ฅ2
The EU has established two major cybersecurity regulations that impact software and infrastructure teams alike.
๐ธ NIS2: Applies to operators of essential services (energy, transport, banking, healthcare).
๐ธCRA: Applies to any digital product sold in the EU, requiring secure-by-design from dev to patch.
If you build, maintain, or ship software in/into the EU โ youโll likely need to comply. Learn more about timelines, overlap with other global regulations, and more: https://thn.news/nis2-eu-cyber-resilience
๐ธ NIS2: Applies to operators of essential services (energy, transport, banking, healthcare).
๐ธCRA: Applies to any digital product sold in the EU, requiring secure-by-design from dev to patch.
If you build, maintain, or ship software in/into the EU โ youโll likely need to comply. Learn more about timelines, overlap with other global regulations, and more: https://thn.news/nis2-eu-cyber-resilience
๐25๐2
๐จ 8,500+ SMB users tricked into downloading malware disguised as ChatGPT, Zoom, and Outlook tools.
Hackers are hijacking Google search ads to push trojanized software, steal logins, and drain crypto wallets.
Even real brand help pages are being spoofed.
Full story โ https://thehackernews.com/2025/07/seo-poisoning-campaign-targets-8500.html
Hackers are hijacking Google search ads to push trojanized software, steal logins, and drain crypto wallets.
Even real brand help pages are being spoofed.
Full story โ https://thehackernews.com/2025/07/seo-poisoning-campaign-targets-8500.html
๐15๐8๐ค7๐ฅ4๐3
๐จ CISA just flagged 4 old bugs as actively exploited โ including a 2014 buffer overflow.
One flaw tied to Chinese hackers leaking Citrix session tokens & credentials right now.
The worst part? Some attacks need no credentials.
Full details โ https://thehackernews.com/2025/07/cisa-adds-four-critical-vulnerabilities.html
One flaw tied to Chinese hackers leaking Citrix session tokens & credentials right now.
The worst part? Some attacks need no credentials.
Full details โ https://thehackernews.com/2025/07/cisa-adds-four-critical-vulnerabilities.html
๐7๐คฏ4๐1