The Hacker News
151K subscribers
1.84K photos
9 videos
3 files
7.75K links
Official THN Telegram Channel — A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

📨 Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
🚨 Most AI SOC tools can’t triage new threats.

They rely on pre-trained models that only handle known attack types—leaving your team exposed.

Radiant’s adaptive AI learns in real time, triages any alert, and cuts response time from days to minutes.

Details here → https://thehackernews.com/2025/07/the-hidden-weaknesses-in-ai-soc-tools.html
😁13👍4🤔1
🚨 Android adware is spiraling out of control:

🔸 352 hidden apps faked icons, flooded 1.2B ad bids/day
🔸 “Evil twin” apps clone legit ones to hijack ad revenue
🔸 NFC malware lets attackers withdraw cash remotely
🔸 SMS stealers hit 100K phones, draining bank accounts

What you need to know → https://thehackernews.com/2025/07/mobile-security-alert-352-iconads-fraud.html
🤯10😁7🔥4👍2
Google just got hit with a $314M verdict — for secretly using your mobile data while idle.

Phones sat still. It sent 900+ background transfers a day — and you paid for it.

Details here → https://thehackernews.com/2025/07/google-ordered-to-pay-314m-for-misusing.html
🤯41👍12🔥11👏4😁4😱1
🚨 Critical Sudo flaw lets any local user get root access on Linux.

No sudo rules required. Default configs are vulnerable.
It’s been hiding in plain sight—since 2013.

Fixes just dropped. Patch now.

Full details → https://thehackernews.com/2025/07/critical-sudo-vulnerabilities-let-local.html
😁26🤯109🤔6👏1
🚨 New APT group “NightEagle” is hacking Microsoft Exchange with stealthy tools and unpatched exploits.

Targets? China’s AI, military, and quantum tech sectors.

Activity aligns with North American time zones.

Here’s what’s known so far → https://thehackernews.com/2025/07/nighteagle-apt-exploits-microsoft.html
🔥13👏5🤯4😁1
🚨 AI agents are leaking sensitive data — quietly, constantly, and inside your trusted tools.

Don’t wait for a breach.

Join the free webinar to secure your GenAI workflows → https://thehackernews.com/2025/07/your-ai-agents-might-be-leaking-data.html
🤔16😁2
🚨 1,500+ malicious IPs are scanning for exposed Java debug ports right now.

Hackers are using misconfigured JDWP to hijack CI/CD tools like TeamCity, dropping stealth crypto miners.

Worse? They're hiding wallets, killing rival payloads, and mimicking system processes.

Here’s how it works → https://thehackernews.com/2025/07/alert-exposed-jdwp-interfaces-lead-to.html
😁12🔥5👏2
🚨 Taiwan warns: RedNote, TikTok, WeChat & others send your data—including face scans & contacts—back to China.

RedNote broke all 15 security rules. TikTok, 13.

Chinese law requires companies to hand over this data.

Full details → https://thehackernews.com/2025/07/taiwan-nsb-alerts-public-on-data-risks.html
👏30😁15👍126😱4🔥3
🚨 APT36 spoofed India’s Defence Ministry website to deliver DRAT V2 malware.

A fake press release tricks users into pasting a command—giving attackers full remote control.

Targets include defense, oil, railways, and foreign affairs.

Details here → https://thehackernews.com/2025/07/tag-140-deploys-drat-v2-rat-targeting.html
🤯23🔥9😁4👍3
🚨 Employees are feeding company secrets into ChatGPT—and you might never know it.

Blocking AI apps doesn’t stop the risk. It just hides it.

Shadow AI is exploding as workers find workarounds. The real danger? You’ve lost visibility.

Here’s how to take control → https://thehackernews.com/expert-insights/2025/07/shadow-ai-how-to-mitigate-hidden-risks.html
😁16👍12🔥3
🚨 Hackers took over a US water plant using the default password: 1111.

Yes, that still works—in 2025.

Default passwords are quietly powering ransomware, DDoS, and supply chain attacks worldwide.

Full story + what to do about it → https://thehackernews.com/2025/07/manufacturing-security-why-default.html
😁48🤯18👏6🤔3👍2🔥2
The EU has established two major cybersecurity regulations that impact software and infrastructure teams alike.

🔸 NIS2: Applies to operators of essential services (energy, transport, banking, healthcare).
🔸CRA: Applies to any digital product sold in the EU, requiring secure-by-design from dev to patch.

If you build, maintain, or ship software in/into the EU — you’ll likely need to comply. Learn more about timelines, overlap with other global regulations, and more: https://thn.news/nis2-eu-cyber-resilience
👍25👏2
🚨 8,500+ SMB users tricked into downloading malware disguised as ChatGPT, Zoom, and Outlook tools.

Hackers are hijacking Google search ads to push trojanized software, steal logins, and drain crypto wallets.

Even real brand help pages are being spoofed.

Full story → https://thehackernews.com/2025/07/seo-poisoning-campaign-targets-8500.html
😁15👍8🤔7🔥4👏3
🚨 CISA just flagged 4 old bugs as actively exploited — including a 2014 buffer overflow.

One flaw tied to Chinese hackers leaking Citrix session tokens & credentials right now.

The worst part? Some attacks need no credentials.

Full details → https://thehackernews.com/2025/07/cisa-adds-four-critical-vulnerabilities.html
👏7🤯4👍1
🚨 New Batavia spyware targets Russian orgs via fake contract emails—active since July 2024.

It steals internal documents, system logs, screenshots—even scans USBs. Now linked to over 100 phishing hits.

Details + NordDragonScan campaign → https://thehackernews.com/2025/07/researchers-uncover-batavia-windows.html
👍10😁5🤔5
🚨 Over 17,000 fake news sites are scamming investors in 50+ countries.

They mimic CNN, BBC & others—then funnel victims into fake crypto platforms like Trap10 & Solara.

The worst part? Even real websites are being hijacked to host these traps.

Full story → https://thehackernews.com/2025/07/baittrap-over-17000-fake-news-websites.html
👏8👍3
🚨 A stealthy new botnet called RondoDox is hijacking Linux DVRs & routers—then hiding in plain sight.

It kills security tools, rewrites system commands, and mimics traffic from Discord, Minecraft, and Fortnite to stay invisible.

Learn how it spreads → https://thehackernews.com/2025/07/rondodox-botnet-exploits-flaws-in-tbk.html
😱18👍6
🚨 Does your org run on Microsoft?

Discover the 2025 Microsoft Vulnerabilities Report by BeyondTrust: 5-yr vuln trends, deep CVE insights & expert commentary. Your roadmap to stronger security.

Grab your free copy ➡️ https://thn.news/microsoft-vulnerability-report
👏5🔥1
🚨 WARNING: A popular VS Code extension for Ethereum smart contracts was hijacked with 2 hidden lines of code—launching PowerShell to run mystery scripts.

Crypto theft? Contract poisoning? It fooled 6,000+ devs.

Here’s how the attack worked → https://thehackernews.com/2025/07/malicious-pull-request-infects-6000.html
👍10🤯3😁2
🚨 Adidas, Dior, Victoria’s Secret, M&S, and more were breached—no malware, no exploits.

Hackers just logged in using stolen credentials, stale SaaS tokens, and fake IT help calls.

The real threat? Invisible identities hiding in your SaaS stack.

Details here → https://thehackernews.com/2025/07/5-ways-identity-based-attacks-are.html
😁13👍7😱74👏1
🚨 90,000+ Android users infected by banking malware from a fake PDF app on Google Play.

It showed fake “maintenance” screens to steal logins and drain accounts—targeting US and Canada banks.

The app hit #4 in the Tools category before Google removed it.

Full story → https://thehackernews.com/2025/07/anatsa-android-banking-trojan-hits.html
😁20🤯11👏7🔥6😱3🤔2👍1