The Hacker News
โœ”
151K subscribers
1.83K photos
9 videos
3 files
7.74K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: [email protected]

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿšจ Chinese hackers hit Franceโ€™s critical sectors using 3 Ivanti zero-days โ€” and then patched them to keep others out.

Rootkits, web shells, and resale of access hint at a black-market cyber operation selling to state-linked buyers.

Find details here โ†’ https://thehackernews.com/2025/07/chinese-hackers-exploit-ivanti-csa-zero.html
๐Ÿ˜17๐Ÿ‘4๐Ÿ˜ฑ4๐Ÿ‘3๐Ÿ”ฅ2
๐Ÿšจ 40+ fake crypto wallet extensions on Firefox were stealing usersโ€™ keys and IPs โ€” in plain sight.

They cloned real wallets like MetaMask & Coinbase, faked 5-star reviews, and exfiltrated secrets to a remote server.

Full story โ†’ https://thehackernews.com/2025/07/over-40-malicious-firefox-extensions.html
๐Ÿ˜16๐Ÿคฏ9๐Ÿ‘3โšก2
๐Ÿšจ DEVMAN is a new threat actor already claiming 40 victims across Asia, EU, LATAM, and Africa.

It's affiliated with Qilin, RansomHub, and DragonForce RaaS groups, targeting business and government.

Read technical analysis of the ransomware it uses on #ANYRUN's blog: https://thn.news/devman-ransomware-analysis-tg
๐Ÿ‘13๐Ÿ‘6
๐Ÿšจ Most AI SOC tools canโ€™t triage new threats.

They rely on pre-trained models that only handle known attack typesโ€”leaving your team exposed.

Radiantโ€™s adaptive AI learns in real time, triages any alert, and cuts response time from days to minutes.

Details here โ†’ https://thehackernews.com/2025/07/the-hidden-weaknesses-in-ai-soc-tools.html
๐Ÿ˜13๐Ÿ‘4๐Ÿค”1
๐Ÿšจ Android adware is spiraling out of control:

๐Ÿ”ธ 352 hidden apps faked icons, flooded 1.2B ad bids/day
๐Ÿ”ธ โ€œEvil twinโ€ apps clone legit ones to hijack ad revenue
๐Ÿ”ธ NFC malware lets attackers withdraw cash remotely
๐Ÿ”ธ SMS stealers hit 100K phones, draining bank accounts

What you need to know โ†’ https://thehackernews.com/2025/07/mobile-security-alert-352-iconads-fraud.html
๐Ÿคฏ10๐Ÿ˜7๐Ÿ”ฅ4๐Ÿ‘2
โšก Google just got hit with a $314M verdict โ€” for secretly using your mobile data while idle.

Phones sat still. It sent 900+ background transfers a day โ€” and you paid for it.

Details here โ†’ https://thehackernews.com/2025/07/google-ordered-to-pay-314m-for-misusing.html
๐Ÿคฏ41๐Ÿ‘12๐Ÿ”ฅ11๐Ÿ‘4๐Ÿ˜4๐Ÿ˜ฑ1
๐Ÿšจ Critical Sudo flaw lets any local user get root access on Linux.

No sudo rules required. Default configs are vulnerable.
Itโ€™s been hiding in plain sightโ€”since 2013.

Fixes just dropped. Patch now.

Full details โ†’ https://thehackernews.com/2025/07/critical-sudo-vulnerabilities-let-local.html
๐Ÿ˜26๐Ÿคฏ10โšก9๐Ÿค”6๐Ÿ‘1
๐Ÿšจ New APT group โ€œNightEagleโ€ is hacking Microsoft Exchange with stealthy tools and unpatched exploits.

Targets? Chinaโ€™s AI, military, and quantum tech sectors.

Activity aligns with North American time zones.

Hereโ€™s whatโ€™s known so far โ†’ https://thehackernews.com/2025/07/nighteagle-apt-exploits-microsoft.html
๐Ÿ”ฅ13๐Ÿ‘5๐Ÿคฏ4๐Ÿ˜1
๐Ÿšจ AI agents are leaking sensitive data โ€” quietly, constantly, and inside your trusted tools.

Donโ€™t wait for a breach.

Join the free webinar to secure your GenAI workflows โ†’ https://thehackernews.com/2025/07/your-ai-agents-might-be-leaking-data.html
๐Ÿค”16๐Ÿ˜2
๐Ÿšจ 1,500+ malicious IPs are scanning for exposed Java debug ports right now.

Hackers are using misconfigured JDWP to hijack CI/CD tools like TeamCity, dropping stealth crypto miners.

Worse? They're hiding wallets, killing rival payloads, and mimicking system processes.

Hereโ€™s how it works โ†’ https://thehackernews.com/2025/07/alert-exposed-jdwp-interfaces-lead-to.html
๐Ÿ˜12๐Ÿ”ฅ5๐Ÿ‘2
๐Ÿšจ Taiwan warns: RedNote, TikTok, WeChat & others send your dataโ€”including face scans & contactsโ€”back to China.

RedNote broke all 15 security rules. TikTok, 13.

Chinese law requires companies to hand over this data.

Full details โ†’ https://thehackernews.com/2025/07/taiwan-nsb-alerts-public-on-data-risks.html
๐Ÿ‘30๐Ÿ˜15๐Ÿ‘12โšก6๐Ÿ˜ฑ4๐Ÿ”ฅ3
๐Ÿšจ APT36 spoofed Indiaโ€™s Defence Ministry website to deliver DRAT V2 malware.

A fake press release tricks users into pasting a commandโ€”giving attackers full remote control.

Targets include defense, oil, railways, and foreign affairs.

Details here โ†’ https://thehackernews.com/2025/07/tag-140-deploys-drat-v2-rat-targeting.html
๐Ÿคฏ23๐Ÿ”ฅ9๐Ÿ˜4๐Ÿ‘3
๐Ÿšจ Employees are feeding company secrets into ChatGPTโ€”and you might never know it.

Blocking AI apps doesnโ€™t stop the risk. It just hides it.

Shadow AI is exploding as workers find workarounds. The real danger? Youโ€™ve lost visibility.

Hereโ€™s how to take control โ†’ https://thehackernews.com/expert-insights/2025/07/shadow-ai-how-to-mitigate-hidden-risks.html
๐Ÿ˜16๐Ÿ‘12๐Ÿ”ฅ3
๐Ÿšจ Hackers took over a US water plant using the default password: 1111.

Yes, that still worksโ€”in 2025.

Default passwords are quietly powering ransomware, DDoS, and supply chain attacks worldwide.

Full story + what to do about it โ†’ https://thehackernews.com/2025/07/manufacturing-security-why-default.html
๐Ÿ˜48๐Ÿคฏ18๐Ÿ‘6๐Ÿค”3๐Ÿ‘2๐Ÿ”ฅ2
The EU has established two major cybersecurity regulations that impact software and infrastructure teams alike.

๐Ÿ”ธ NIS2: Applies to operators of essential services (energy, transport, banking, healthcare).
๐Ÿ”ธCRA: Applies to any digital product sold in the EU, requiring secure-by-design from dev to patch.

If you build, maintain, or ship software in/into the EU โ€” youโ€™ll likely need to comply. Learn more about timelines, overlap with other global regulations, and more: https://thn.news/nis2-eu-cyber-resilience
๐Ÿ‘25๐Ÿ‘2
๐Ÿšจ 8,500+ SMB users tricked into downloading malware disguised as ChatGPT, Zoom, and Outlook tools.

Hackers are hijacking Google search ads to push trojanized software, steal logins, and drain crypto wallets.

Even real brand help pages are being spoofed.

Full story โ†’ https://thehackernews.com/2025/07/seo-poisoning-campaign-targets-8500.html
๐Ÿ˜15๐Ÿ‘8๐Ÿค”7๐Ÿ”ฅ4๐Ÿ‘3
๐Ÿšจ CISA just flagged 4 old bugs as actively exploited โ€” including a 2014 buffer overflow.

One flaw tied to Chinese hackers leaking Citrix session tokens & credentials right now.

The worst part? Some attacks need no credentials.

Full details โ†’ https://thehackernews.com/2025/07/cisa-adds-four-critical-vulnerabilities.html
๐Ÿ‘7๐Ÿคฏ4๐Ÿ‘1
๐Ÿšจ New Batavia spyware targets Russian orgs via fake contract emailsโ€”active since July 2024.

It steals internal documents, system logs, screenshotsโ€”even scans USBs. Now linked to over 100 phishing hits.

Details + NordDragonScan campaign โ†’ https://thehackernews.com/2025/07/researchers-uncover-batavia-windows.html
๐Ÿ‘10๐Ÿ˜5๐Ÿค”5
๐Ÿšจ Over 17,000 fake news sites are scamming investors in 50+ countries.

They mimic CNN, BBC & othersโ€”then funnel victims into fake crypto platforms like Trap10 & Solara.

The worst part? Even real websites are being hijacked to host these traps.

Full story โ†’ https://thehackernews.com/2025/07/baittrap-over-17000-fake-news-websites.html
๐Ÿ‘8๐Ÿ‘3
๐Ÿšจ A stealthy new botnet called RondoDox is hijacking Linux DVRs & routersโ€”then hiding in plain sight.

It kills security tools, rewrites system commands, and mimics traffic from Discord, Minecraft, and Fortnite to stay invisible.

Learn how it spreads โ†’ https://thehackernews.com/2025/07/rondodox-botnet-exploits-flaws-in-tbk.html
๐Ÿ˜ฑ18๐Ÿ‘6
๐Ÿšจ Does your org run on Microsoft?

Discover the 2025 Microsoft Vulnerabilities Report by BeyondTrust: 5-yr vuln trends, deep CVE insights & expert commentary. Your roadmap to stronger security.

Grab your free copy โžก๏ธ https://thn.news/microsoft-vulnerability-report
๐Ÿ‘5๐Ÿ”ฅ1