The Hacker News
151K subscribers
1.85K photos
10 videos
3 files
7.76K links
Official THN Telegram Channel — A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

📨 Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
Scattered Spider hacker group just went quiet—but don’t exhale yet.

After UK arrests, Mandiant says the group’s intrusions have stopped.

But copycats are already using their same ruthless tactics.

Now’s the moment to harden your defenses.

Read - https://thehackernews.com/2025/07/scattered-spider-hacker-arrests-halt.html
👏11👍3
A critical SAP flaw just gave hackers remote access to a U.S. chemicals company.

They deployed Auto-Color—stealthy Linux malware that hides itself when it can’t reach its C2 server.

Details you need to know ↓ https://thehackernews.com/2025/07/hackers-exploit-sap-vulnerability-to.html
🔥17😁2
🚨 Most ransomware attacks don’t hack in—they log in.

EDR alone can’t stop attackers using legit credentials.

The fix? Pair it with Endpoint Privilege Management (EPM) to shut down stealthy privilege abuse before it starts.

Here’s why both are critical ↓ https://thehackernews.com/expert-insights/2025/07/edr-detects-epm-prevents-why-using-both.html
👏13🤔3
🚨 Google just fired a double shot at cyber threats:

➟ DBSC is now in open beta — it locks session cookies to your device, stopping attackers from hijacking logins.

➟ Project Zero goes public with unpatched bug reports to pressure faster fixes.

Big moves to end cookie theft & shrink patch gaps.

Details here ↓ https://thehackernews.com/2025/07/google-launches-dbsc-open-beta-in.html
🔥16👏5👍3🤔1
🚨 Apple just patched a zero-day used in the wild — tied to a Chrome exploit.

The bug let attackers break out of the browser sandbox using a malicious web page.

iPhones, Macs, iPads, and more were at risk. Update now.

Details here → https://thehackernews.com/2025/07/apple-patches-safari-vulnerability-also.html
🔥9👍5😁2
🚨 Critical flaws in Dahua smart cameras let attackers take full remote control—no login needed.

Used in homes, stores, and casinos, these bugs allow root access, persistent malware, and no easy fix.

Exposed devices are still at risk.

Full details → https://thehackernews.com/2025/07/critical-dahua-camera-flaws-enable.html
😁16👍5🤔1
🚨 Your AI agent might already be vulnerable.

Pillar Security just launched a full-lifecycle AI defense platform—built by ex-offensive and defensive cyber ops—to catch threats before code is even written.

From threat modeling to runtime guardrails, this flips AI security on its head.

Full story → https://thehackernews.com/2025/07/product-walkthrough-look-inside-pillars.html
😁8👍2🤔1
Custom containers, zero headaches.

ActiveState builds and scans your stack from OS to app—SBOM, low-to-no CVEs, ready for your CI/CD. Own your security. Stop inheriting risk.

Customize Your Container → https://thn.news/activestate-container-security

#DevSecOps #OpenSourceSecurity
👏6
🔥 A free decryptor just landed for FunkSec ransomware — 172 victims hit across tech, gov, and education can now get their files back.

Built with AI. Written in Rust. Broken by rookies.

Get the tool + full story ↓ https://thehackernews.com/2025/07/funksec-ransomware-decryptor-released.html
👏11🤯7😁1
🚨 Thousands tricked by fake crypto apps via Facebook ads.

They install a stealthy new malware—JSCEAL—that hijacks wallets, steals passwords in real-time, and evades most detection tools.

Worse? It's still active.

Here’s how it works (and how to avoid it) ↓ https://thehackernews.com/2025/07/hackers-use-facebook-ads-to-spread.html
😁15🔥3👏3
🚨 120,000+ attacks in the wild.

Hackers are exploiting a critical bug (CVSS 9.8) in a popular WordPress theme to hijack sites—no login needed.

They’re planting PHP backdoors and rogue admin accounts.

Details here → https://thehackernews.com/2025/07/hackers-exploit-critical-wordpress.html
👍12🤯6🔥3👏3
🔥 A hacker gang planted a 4G Raspberry Pi inside a bank’s ATM network—bypassing firewalls to install a rootkit called CAKETAP.

It spoofed PIN checks, hid processes, and aimed to trigger fraudulent withdrawals.

Details you should know ↓ https://thehackernews.com/2025/07/unc2891-breaches-atm-network-via-4g.html
👏16👍7🔥6
🚨 SIEMs are failing the modern SOC.

🔹 Log overload is flooding analysts with noise
🔹 SaaS SIEMs spike costs during attacks
🔹 30% of analyst time is lost to false positives

A new model is rising: metadata, behavior, and real-time detection.

Here's what’s replacing it ↓ https://thehackernews.com/2025/07/alert-fatigue-data-overload-and-fall-of.html
👍7🔥2😁1
🚨 Cyberattacks are evolving fast—and so is defense.

SentinelOne just landed Leader status in Gartner’s 2025 Magic Quadrant for Endpoint Protection for the 5th year straight.

Its AI spots threats 63% faster and slashes response time in half.

What’s changing in cybersecurity → https://thehackernews.com/2025/07/ai-driven-trends-in-endpoint-security.html
👍7🔥4😁3🤔1
North Korea’s UNC4899 hacked two firms via LinkedIn and Telegram job lures—tricking devs into running malicious Docker containers.

They breached Google Cloud & AWS, stole creds, bypassed MFA, injected wallet-hijacking JavaScript—and stole millions in crypto.

Details here → https://thehackernews.com/2025/07/n-korean-hackers-used-job-lures-cloud.html
😱21👍6🔥5😁2🤔2
🚨 Hackers are hijacking Proofpoint + Bitly to bypass email defenses and steal Microsoft 365 credentials.

Phishing links look legit—wrapped, shortened, and sent from trusted accounts.

Even “protected” emails are now weaponized.

Details you need → https://thehackernews.com/2025/07/experts-detect-multi-layer-redirect.html
😁12🔥5
🛑 Russia’s Secret Blizzard hackers are hijacking embassy internet traffic in Moscow—at the ISP level.

They’re using fake Kaspersky alerts + a new malware “ApolloShadow” to silently take over devices.

Microsoft confirms: the campaign is ongoing.

Details here → https://thehackernews.com/2025/07/secret-blizzard-deploys-malware-in-isp.html
🤯21👏8😁4👍2🔥2
🚨 China-linked hackers just deployed two ransomware strains—Warlock and LockBit Black—using a custom C2 framework called AK47 C2.

They’re hijacking legit tools, faking Microsoft domains, and disabling antivirus with a Chinese driver.

Details here → https://thehackernews.com/2025/08/storm-2603-exploits-sharepoint-flaws-to.html
😱13🔥3👏2
🔐 "How much AI is too much in customer experiences?"

Users are starting to push back.

Join our new 📺 WEBINAR featuring an expert from @Okta as she reveals new research on how to balance innovation with trust—straight from the 2025 CIAM Trends Report.

👉 Watch the webinar now → https://thehacker.news/ai-customer-identity
👍12🤔2
🚨 Hackers are poisoning your Python packages, hijacking logins & weaponizing AI.

The next wave of cyberattacks is already here—and most defenses won’t stop it.

3 New urgent cybersecurity webinars show how to lock down your code, identity & AI stack → https://www.linkedin.com/pulse/secure-your-ai-supply-chain-stack-3-new-cybersecurity-webinars-d9zwc/
14🔥5👏1🤔1
🚨 SOCs are losing the AI race — and it’s not because of their tools.

They’re feeding cutting-edge AI systems junk data: incomplete logs, siloed alerts, zero context.

Meanwhile, attackers are training like elite athletes.

Here’s why defenders are falling behind ↓ https://thehackernews.com/2025/08/you-are-what-you-eat-why-your-ai.html
🔥17