🚨 Attackers are impersonating you—with AI.
From deepfakes to fake LinkedIn accounts, social engineering is now real-time and relentless.
Join cybersecurity leader Michael Coates and Doppel CEO Kevin Tian to learn how AI can fight back → https://thehacker.news/defeating-digital-deception?source=social
From deepfakes to fake LinkedIn accounts, social engineering is now real-time and relentless.
Join cybersecurity leader Michael Coates and Doppel CEO Kevin Tian to learn how AI can fight back → https://thehacker.news/defeating-digital-deception?source=social
🤔5🤯5⚡2👍1
🚨 Cisco ISE flaws are being exploited in the wild — no login needed, root access gained.
Hackers can remotely hijack enterprise networks through unauthenticated API and file upload bugs (CVSS 10.0).
Details & fixes → https://thehackernews.com/2025/07/cisco-confirms-active-exploits.html
Hackers can remotely hijack enterprise networks through unauthenticated API and file upload bugs (CVSS 10.0).
Details & fixes → https://thehackernews.com/2025/07/cisco-confirms-active-exploits.html
👏15⚡2🔥1
🚨 Want to become a CISO? Your SOC skills aren’t enough.
Automation is replacing ops. If you’re not building business, risk, and leadership skills now—you’ll be left behind.
Here’s how to make the leap from SOC to the boardroom ↓ https://thehackernews.com/2025/07/how-to-advance-from-soc-manager-to-ciso.html
Automation is replacing ops. If you’re not building business, risk, and leadership skills now—you’ll be left behind.
Here’s how to make the leap from SOC to the boardroom ↓ https://thehackernews.com/2025/07/how-to-advance-from-soc-manager-to-ciso.html
👍9😁5⚡2🔥2
🚨 A hacked MSI installer is stealing banking logins across Mexico.
Greedy Sponge hackers are pushing a weaponized Chrome proxy zip that drops AllaKore RAT—now upgraded to exfiltrate credentials and act as a SOCKS5 proxy.
💰 Financial fraud is the goal. And it’s working.
Full report → https://thehackernews.com/2025/07/credential-theft-and-remote-access.html
Greedy Sponge hackers are pushing a weaponized Chrome proxy zip that drops AllaKore RAT—now upgraded to exfiltrate credentials and act as a SOCKS5 proxy.
💰 Financial fraud is the goal. And it’s working.
Full report → https://thehackernews.com/2025/07/credential-theft-and-remote-access.html
👏9🤔5⚡2🔥2😁1
⚡ {NEW} Chinese hackers are exploiting new SharePoint flaws—Microsoft links attacks to APT27, APT31 & Storm-2603.
They’re bypassing patches to steal MachineKeys via remote code execution.
The exploit chain is already in the wild.
Patch now ↓ https://thehackernews.com/2025/07/microsoft-links-ongoing-sharepoint.html
They’re bypassing patches to steal MachineKeys via remote code execution.
The exploit chain is already in the wild.
Patch now ↓ https://thehackernews.com/2025/07/microsoft-links-ongoing-sharepoint.html
⚡13🔥7😱6👏3👍1
🚨 Chinese hackers are actively exploiting new SharePoint flaws to bypass auth & run code remotely.
Even Microsoft’s AMSI fix isn’t stopping them.
The worst part? Many orgs aren’t patching.
Details you can’t afford to miss → https://thehackernews.com/2025/07/cisa-orders-urgent-patching-after.html
Even Microsoft’s AMSI fix isn’t stopping them.
The worst part? Many orgs aren’t patching.
Details you can’t afford to miss → https://thehackernews.com/2025/07/cisa-orders-urgent-patching-after.html
😱15👏9🔥3⚡1
🚨 SysAid flaw lets hackers hijack admin accounts — CISA confirms active attacks.
Attackers are exploiting two critical bugs (CVSS 9.3) to steal data & possibly execute code.
Patches are out. Deadline: Aug 12.
Full details → https://thehackernews.com/2025/07/cisa-warns-sysaid-flaws-under-active.html
Attackers are exploiting two critical bugs (CVSS 9.3) to steal data & possibly execute code.
Patches are out. Deadline: Aug 12.
Full details → https://thehackernews.com/2025/07/cisa-warns-sysaid-flaws-under-active.html
👏6👍2⚡1
🚨 Google just launched OSS Rebuild—a powerful weapon against open-source supply chain attacks.
It rebuilds & verifies packages independently, catching tampered code others miss.
No extra work for maintainers.
Full details ↓ https://thehackernews.com/2025/07/google-launches-oss-rebuild-to-expose.html
It rebuilds & verifies packages independently, catching tampered code others miss.
No extra work for maintainers.
Full details ↓ https://thehackernews.com/2025/07/google-launches-oss-rebuild-to-expose.html
👍21🔥6🤔5👏4
🚨 Most “critical” CVEs aren’t even exploitable in your app.
Security teams are drowning in false positives—because most scanners ignore whether the vulnerable function actually runs.
Function-level runtime reachability changes everything.
Here’s what it gets right ↓ https://thehackernews.com/expert-insights/2025/07/everything-to-know-about-runtime.html
Security teams are drowning in false positives—because most scanners ignore whether the vulnerable function actually runs.
Function-level runtime reachability changes everything.
Here’s what it gets right ↓ https://thehackernews.com/expert-insights/2025/07/everything-to-know-about-runtime.html
👍13🤔4
Overexposed to risk with public images?
Get ActiveState's free secure containers—rebuilt, scanned, and now on Docker Hub.
🛡️ Cut out CVEs and patching hassle. Just pull, trust, and deploy: https://thn.news/activestate-dockerhuby
Get ActiveState's free secure containers—rebuilt, scanned, and now on Docker Hub.
🛡️ Cut out CVEs and patching hassle. Just pull, trust, and deploy: https://thn.news/activestate-dockerhuby
👍9
Media is too big
VIEW IN TELEGRAM
Vegas, neon & next-level security insights. Don’t miss @BeyondTrust at #BHUSA.
Find their award-winning Outfitters booth at #5024, navigate the cybersecurity wilderness and take a free identity security risk assessment to mitigate dangers.
Register here ➡️ https://thn.news/bh-americas-2025
Find their award-winning Outfitters booth at #5024, navigate the cybersecurity wilderness and take a free identity security risk assessment to mitigate dangers.
Register here ➡️ https://thn.news/bh-americas-2025
👍7
🚨 This Windows trojan just became the first to weaponize Microsoft’s accessibility tools.
The Coyote malware is stealing banking and crypto logins from 75+ institutions—by reading what’s on your screen.
Here’s how it works → https://thehackernews.com/2025/07/new-coyote-malware-variant-exploits.html
The Coyote malware is stealing banking and crypto logins from 75+ institutions—by reading what’s on your screen.
Here’s how it works → https://thehackernews.com/2025/07/new-coyote-malware-variant-exploits.html
🤯20👏3😁3👍2
🚨 Most Kerberoasting attacks still bypass detection—despite being a 10+ year-old threat.
Why? Legacy tools miss subtle, low-and-slow attacks.
@BeyondTrust just built a statistical model that spots what rules-based tools can’t—with fewer false positives.
How it works ↓ https://thehackernews.com/2025/07/kerberoasting-detections-new-approach.html
Why? Legacy tools miss subtle, low-and-slow attacks.
@BeyondTrust just built a statistical model that spots what rules-based tools can’t—with fewer false positives.
How it works ↓ https://thehackernews.com/2025/07/kerberoasting-detections-new-approach.html
🔥8😁6👍3
A hacker group just pivoted from Craft CMS to Magento & Docker—using real pentest tools to hide malware in-memory.
Even if you stop their crypto miner, they still profit off your bandwidth.
Here’s how it works ↓ https://thehackernews.com/2025/07/threat-actor-mimo-targets-magento-and.html
Even if you stop their crypto miner, they still profit off your bandwidth.
Here’s how it works ↓ https://thehackernews.com/2025/07/threat-actor-mimo-targets-magento-and.html
🔥16👏4😁4🤔4⚡2
🚨 Hackers are hijacking WordPress sites with a backdoor hidden in plain sight—inside mu-plugins.
It gives them full admin access, evades detection, and locks out real users.
It looks like a legit plugin—and it auto-activates.
Here’s how it works + how to stop it ↓ https://thehackernews.com/2025/07/hackers-deploy-stealth-backdoor-in.html
It gives them full admin access, evades detection, and locks out real users.
It looks like a legit plugin—and it auto-activates.
Here’s how it works + how to stop it ↓ https://thehackernews.com/2025/07/hackers-deploy-stealth-backdoor-in.html
😁15👍9😱2🔥1
🚨 Europol just took down XSS — a top Russian-speaking cybercrime forum with 50,000+ users.
Its admin made €7M running it like a darknet eBay for stolen data and hacking tools.
He’s now in custody after a raid in Kyiv.
Full story → https://thehackernews.com/2025/07/europol-arrests-xss-forum-admin-in-kyiv.html
Its admin made €7M running it like a darknet eBay for stolen data and hacking tools.
He’s now in custody after a raid in Kyiv.
Full story → https://thehackernews.com/2025/07/europol-arrests-xss-forum-admin-in-kyiv.html
😁27🤯13👍12😱8👏2🔥1🤔1
🚨 ALERT: China-linked hackers are exploiting unpatched SharePoint servers to drop Warlock ransomware.
They’re using legit tools like PsExec, Mimikatz & IIS hijacking to stay hidden.
Even patching may not kick them out.
Full story → https://thehackernews.com/2025/07/storm-2603-exploits-sharepoint-flaws-to.html
They’re using legit tools like PsExec, Mimikatz & IIS hijacking to stay hidden.
Even patching may not kick them out.
Full story → https://thehackernews.com/2025/07/storm-2603-exploits-sharepoint-flaws-to.html
🤯12👍4😁2😱2
🚨 Chinese hackers hijacked a Dalai Lama birthday tribute site to spy on Tibetans.
Victims downloaded a fake encrypted chat app—actually a backdoored version of Element laced with Gh0st RAT.
It stole IPs, keystrokes, and even webcam feeds.
Details → https://thehackernews.com/2025/07/china-based-apts-deploy-fake-dalai-lama.html
Victims downloaded a fake encrypted chat app—actually a backdoored version of Element laced with Gh0st RAT.
It stole IPs, keystrokes, and even webcam feeds.
Details → https://thehackernews.com/2025/07/china-based-apts-deploy-fake-dalai-lama.html
🤔13😱7🤯1
🚨 81% faster gap mitigation. 50% fewer critical vulns.
Annual pentests can’t keep up—your defenses change daily, and so do attackers.
It’s time to stop playing defense once a year. Build an Offensive SOC that hunts 24/7.
Learn How →
https://thehackernews.com/2025/07/pentests-once-year-nope-its-time-to.html
Annual pentests can’t keep up—your defenses change daily, and so do attackers.
It’s time to stop playing defense once a year. Build an Offensive SOC that hunts 24/7.
Learn How →
https://thehackernews.com/2025/07/pentests-once-year-nope-its-time-to.html
👍12👏5
Manual IAM processes slow down IT and introduce risk.
In this upcoming webinar, join Black Rifle Coffee Company and Tines for practical advice on automating identity lifecycles, reducing tickets, and enforcing least privilege – fast.
Watch now: https://thn.news/black-rifle-coffee-iam-2
In this upcoming webinar, join Black Rifle Coffee Company and Tines for practical advice on automating identity lifecycles, reducing tickets, and enforcing least privilege – fast.
Watch now: https://thn.news/black-rifle-coffee-iam-2
🤔4
🔥 AI is rewriting the rules of customer identity — and users are pushing back.
From smoother logins to rising fraud threats, what used to work won’t cut it in 2025.
This free webinar breaks it all down → https://thehackernews.com/2025/07/watch-this-webinar-to-uncover-hidden.html
Don’t fall behind. Here’s what to expect ↓
From smoother logins to rising fraud threats, what used to work won’t cut it in 2025.
This free webinar breaks it all down → https://thehackernews.com/2025/07/watch-this-webinar-to-uncover-hidden.html
Don’t fall behind. Here’s what to expect ↓
😁6