๐จ Chinese hackers hit Franceโs critical sectors using 3 Ivanti zero-days โ and then patched them to keep others out.
Rootkits, web shells, and resale of access hint at a black-market cyber operation selling to state-linked buyers.
Find details here โ https://thehackernews.com/2025/07/chinese-hackers-exploit-ivanti-csa-zero.html
Rootkits, web shells, and resale of access hint at a black-market cyber operation selling to state-linked buyers.
Find details here โ https://thehackernews.com/2025/07/chinese-hackers-exploit-ivanti-csa-zero.html
๐17๐4๐ฑ4๐3๐ฅ2
๐จ 40+ fake crypto wallet extensions on Firefox were stealing usersโ keys and IPs โ in plain sight.
They cloned real wallets like MetaMask & Coinbase, faked 5-star reviews, and exfiltrated secrets to a remote server.
Full story โ https://thehackernews.com/2025/07/over-40-malicious-firefox-extensions.html
They cloned real wallets like MetaMask & Coinbase, faked 5-star reviews, and exfiltrated secrets to a remote server.
Full story โ https://thehackernews.com/2025/07/over-40-malicious-firefox-extensions.html
๐16๐คฏ9๐3โก2
๐จ DEVMAN is a new threat actor already claiming 40 victims across Asia, EU, LATAM, and Africa.
It's affiliated with Qilin, RansomHub, and DragonForce RaaS groups, targeting business and government.
Read technical analysis of the ransomware it uses on #ANYRUN's blog: https://thn.news/devman-ransomware-analysis-tg
It's affiliated with Qilin, RansomHub, and DragonForce RaaS groups, targeting business and government.
Read technical analysis of the ransomware it uses on #ANYRUN's blog: https://thn.news/devman-ransomware-analysis-tg
๐13๐6
๐จ Most AI SOC tools canโt triage new threats.
They rely on pre-trained models that only handle known attack typesโleaving your team exposed.
Radiantโs adaptive AI learns in real time, triages any alert, and cuts response time from days to minutes.
Details here โ https://thehackernews.com/2025/07/the-hidden-weaknesses-in-ai-soc-tools.html
They rely on pre-trained models that only handle known attack typesโleaving your team exposed.
Radiantโs adaptive AI learns in real time, triages any alert, and cuts response time from days to minutes.
Details here โ https://thehackernews.com/2025/07/the-hidden-weaknesses-in-ai-soc-tools.html
๐13๐4๐ค1
๐จ Android adware is spiraling out of control:
๐ธ 352 hidden apps faked icons, flooded 1.2B ad bids/day
๐ธ โEvil twinโ apps clone legit ones to hijack ad revenue
๐ธ NFC malware lets attackers withdraw cash remotely
๐ธ SMS stealers hit 100K phones, draining bank accounts
What you need to know โ https://thehackernews.com/2025/07/mobile-security-alert-352-iconads-fraud.html
๐ธ 352 hidden apps faked icons, flooded 1.2B ad bids/day
๐ธ โEvil twinโ apps clone legit ones to hijack ad revenue
๐ธ NFC malware lets attackers withdraw cash remotely
๐ธ SMS stealers hit 100K phones, draining bank accounts
What you need to know โ https://thehackernews.com/2025/07/mobile-security-alert-352-iconads-fraud.html
๐คฏ10๐7๐ฅ4๐2
โก Google just got hit with a $314M verdict โ for secretly using your mobile data while idle.
Phones sat still. It sent 900+ background transfers a day โ and you paid for it.
Details here โ https://thehackernews.com/2025/07/google-ordered-to-pay-314m-for-misusing.html
Phones sat still. It sent 900+ background transfers a day โ and you paid for it.
Details here โ https://thehackernews.com/2025/07/google-ordered-to-pay-314m-for-misusing.html
๐คฏ41๐12๐ฅ11๐4๐4๐ฑ1
๐จ Critical Sudo flaw lets any local user get root access on Linux.
No sudo rules required. Default configs are vulnerable.
Itโs been hiding in plain sightโsince 2013.
Fixes just dropped. Patch now.
Full details โ https://thehackernews.com/2025/07/critical-sudo-vulnerabilities-let-local.html
No sudo rules required. Default configs are vulnerable.
Itโs been hiding in plain sightโsince 2013.
Fixes just dropped. Patch now.
Full details โ https://thehackernews.com/2025/07/critical-sudo-vulnerabilities-let-local.html
๐26๐คฏ10โก9๐ค6๐1
๐จ New APT group โNightEagleโ is hacking Microsoft Exchange with stealthy tools and unpatched exploits.
Targets? Chinaโs AI, military, and quantum tech sectors.
Activity aligns with North American time zones.
Hereโs whatโs known so far โ https://thehackernews.com/2025/07/nighteagle-apt-exploits-microsoft.html
Targets? Chinaโs AI, military, and quantum tech sectors.
Activity aligns with North American time zones.
Hereโs whatโs known so far โ https://thehackernews.com/2025/07/nighteagle-apt-exploits-microsoft.html
๐ฅ13๐5๐คฏ4๐1
๐จ AI agents are leaking sensitive data โ quietly, constantly, and inside your trusted tools.
Donโt wait for a breach.
Join the free webinar to secure your GenAI workflows โ https://thehackernews.com/2025/07/your-ai-agents-might-be-leaking-data.html
Donโt wait for a breach.
Join the free webinar to secure your GenAI workflows โ https://thehackernews.com/2025/07/your-ai-agents-might-be-leaking-data.html
๐ค16๐2
๐จ 1,500+ malicious IPs are scanning for exposed Java debug ports right now.
Hackers are using misconfigured JDWP to hijack CI/CD tools like TeamCity, dropping stealth crypto miners.
Worse? They're hiding wallets, killing rival payloads, and mimicking system processes.
Hereโs how it works โ https://thehackernews.com/2025/07/alert-exposed-jdwp-interfaces-lead-to.html
Hackers are using misconfigured JDWP to hijack CI/CD tools like TeamCity, dropping stealth crypto miners.
Worse? They're hiding wallets, killing rival payloads, and mimicking system processes.
Hereโs how it works โ https://thehackernews.com/2025/07/alert-exposed-jdwp-interfaces-lead-to.html
๐12๐ฅ5๐2
๐จ Taiwan warns: RedNote, TikTok, WeChat & others send your dataโincluding face scans & contactsโback to China.
RedNote broke all 15 security rules. TikTok, 13.
Chinese law requires companies to hand over this data.
Full details โ https://thehackernews.com/2025/07/taiwan-nsb-alerts-public-on-data-risks.html
RedNote broke all 15 security rules. TikTok, 13.
Chinese law requires companies to hand over this data.
Full details โ https://thehackernews.com/2025/07/taiwan-nsb-alerts-public-on-data-risks.html
๐30๐15๐12โก6๐ฑ4๐ฅ3
๐จ APT36 spoofed Indiaโs Defence Ministry website to deliver DRAT V2 malware.
A fake press release tricks users into pasting a commandโgiving attackers full remote control.
Targets include defense, oil, railways, and foreign affairs.
Details here โ https://thehackernews.com/2025/07/tag-140-deploys-drat-v2-rat-targeting.html
A fake press release tricks users into pasting a commandโgiving attackers full remote control.
Targets include defense, oil, railways, and foreign affairs.
Details here โ https://thehackernews.com/2025/07/tag-140-deploys-drat-v2-rat-targeting.html
๐คฏ23๐ฅ9๐4๐3
๐จ Employees are feeding company secrets into ChatGPTโand you might never know it.
Blocking AI apps doesnโt stop the risk. It just hides it.
Shadow AI is exploding as workers find workarounds. The real danger? Youโve lost visibility.
Hereโs how to take control โ https://thehackernews.com/expert-insights/2025/07/shadow-ai-how-to-mitigate-hidden-risks.html
Blocking AI apps doesnโt stop the risk. It just hides it.
Shadow AI is exploding as workers find workarounds. The real danger? Youโve lost visibility.
Hereโs how to take control โ https://thehackernews.com/expert-insights/2025/07/shadow-ai-how-to-mitigate-hidden-risks.html
๐16๐12๐ฅ3
๐จ Hackers took over a US water plant using the default password: 1111.
Yes, that still worksโin 2025.
Default passwords are quietly powering ransomware, DDoS, and supply chain attacks worldwide.
Full story + what to do about it โ https://thehackernews.com/2025/07/manufacturing-security-why-default.html
Yes, that still worksโin 2025.
Default passwords are quietly powering ransomware, DDoS, and supply chain attacks worldwide.
Full story + what to do about it โ https://thehackernews.com/2025/07/manufacturing-security-why-default.html
๐48๐คฏ18๐6๐ค3๐2๐ฅ2
The EU has established two major cybersecurity regulations that impact software and infrastructure teams alike.
๐ธ NIS2: Applies to operators of essential services (energy, transport, banking, healthcare).
๐ธCRA: Applies to any digital product sold in the EU, requiring secure-by-design from dev to patch.
If you build, maintain, or ship software in/into the EU โ youโll likely need to comply. Learn more about timelines, overlap with other global regulations, and more: https://thn.news/nis2-eu-cyber-resilience
๐ธ NIS2: Applies to operators of essential services (energy, transport, banking, healthcare).
๐ธCRA: Applies to any digital product sold in the EU, requiring secure-by-design from dev to patch.
If you build, maintain, or ship software in/into the EU โ youโll likely need to comply. Learn more about timelines, overlap with other global regulations, and more: https://thn.news/nis2-eu-cyber-resilience
๐25๐2
๐จ 8,500+ SMB users tricked into downloading malware disguised as ChatGPT, Zoom, and Outlook tools.
Hackers are hijacking Google search ads to push trojanized software, steal logins, and drain crypto wallets.
Even real brand help pages are being spoofed.
Full story โ https://thehackernews.com/2025/07/seo-poisoning-campaign-targets-8500.html
Hackers are hijacking Google search ads to push trojanized software, steal logins, and drain crypto wallets.
Even real brand help pages are being spoofed.
Full story โ https://thehackernews.com/2025/07/seo-poisoning-campaign-targets-8500.html
๐15๐8๐ค7๐ฅ4๐3
๐จ CISA just flagged 4 old bugs as actively exploited โ including a 2014 buffer overflow.
One flaw tied to Chinese hackers leaking Citrix session tokens & credentials right now.
The worst part? Some attacks need no credentials.
Full details โ https://thehackernews.com/2025/07/cisa-adds-four-critical-vulnerabilities.html
One flaw tied to Chinese hackers leaking Citrix session tokens & credentials right now.
The worst part? Some attacks need no credentials.
Full details โ https://thehackernews.com/2025/07/cisa-adds-four-critical-vulnerabilities.html
๐7๐คฏ4๐1
๐จ New Batavia spyware targets Russian orgs via fake contract emailsโactive since July 2024.
It steals internal documents, system logs, screenshotsโeven scans USBs. Now linked to over 100 phishing hits.
Details + NordDragonScan campaign โ https://thehackernews.com/2025/07/researchers-uncover-batavia-windows.html
It steals internal documents, system logs, screenshotsโeven scans USBs. Now linked to over 100 phishing hits.
Details + NordDragonScan campaign โ https://thehackernews.com/2025/07/researchers-uncover-batavia-windows.html
๐10๐5๐ค5
๐จ Over 17,000 fake news sites are scamming investors in 50+ countries.
They mimic CNN, BBC & othersโthen funnel victims into fake crypto platforms like Trap10 & Solara.
The worst part? Even real websites are being hijacked to host these traps.
Full story โ https://thehackernews.com/2025/07/baittrap-over-17000-fake-news-websites.html
They mimic CNN, BBC & othersโthen funnel victims into fake crypto platforms like Trap10 & Solara.
The worst part? Even real websites are being hijacked to host these traps.
Full story โ https://thehackernews.com/2025/07/baittrap-over-17000-fake-news-websites.html
๐8๐3
๐จ A stealthy new botnet called RondoDox is hijacking Linux DVRs & routersโthen hiding in plain sight.
It kills security tools, rewrites system commands, and mimics traffic from Discord, Minecraft, and Fortnite to stay invisible.
Learn how it spreads โ https://thehackernews.com/2025/07/rondodox-botnet-exploits-flaws-in-tbk.html
It kills security tools, rewrites system commands, and mimics traffic from Discord, Minecraft, and Fortnite to stay invisible.
Learn how it spreads โ https://thehackernews.com/2025/07/rondodox-botnet-exploits-flaws-in-tbk.html
๐ฑ18๐6
๐จ Does your org run on Microsoft?
Discover the 2025 Microsoft Vulnerabilities Report by BeyondTrust: 5-yr vuln trends, deep CVE insights & expert commentary. Your roadmap to stronger security.
Grab your free copy โก๏ธ https://thn.news/microsoft-vulnerability-report
Discover the 2025 Microsoft Vulnerabilities Report by BeyondTrust: 5-yr vuln trends, deep CVE insights & expert commentary. Your roadmap to stronger security.
Grab your free copy โก๏ธ https://thn.news/microsoft-vulnerability-report
๐5๐ฅ1