Youโre not just using SaaS. Itโs using you.
AI tools, browser plugins, and apps your team installs without asking are opening hidden doors to your data.
Most IT teams have no idea.
Hereโs how to take back control โ https://thehackernews.com/2025/08/the-wild-west-of-shadow-it.html
AI tools, browser plugins, and apps your team installs without asking are opening hidden doors to your data.
Most IT teams have no idea.
Hereโs how to take back control โ https://thehackernews.com/2025/08/the-wild-west-of-shadow-it.html
โก7๐7๐5๐ฑ4
โก Weekly Recap โถ VPN 0โDay, Mac Stealer Backdoor, AI Malware Disguised as Dev Tools, and an APT Hiding in ISPs.
The scariest part? Most of it looked legit.
Catch up now โ https://thehackernews.com/2025/08/weekly-recap-vpn-0-day-encryption.html
The scariest part? Most of it looked legit.
Catch up now โ https://thehackernews.com/2025/08/weekly-recap-vpn-0-day-encryption.html
๐7๐ฑ3
๐จ New wave of Python malware hits 4,000+ systems across 62 countries.
PXA Stealer is siphoning passwords, credit cards, and cookiesโthen selling them via Telegram-powered black markets.
Details here โ https://thehackernews.com/2025/08/vietnamese-hackers-use-pxa-stealer-hit.html
PXA Stealer is siphoning passwords, credit cards, and cookiesโthen selling them via Telegram-powered black markets.
Details here โ https://thehackernews.com/2025/08/vietnamese-hackers-use-pxa-stealer-hit.html
๐15๐ฅ3๐3๐2
๐ฅ Hackers can fully hijack NVIDIA's Triton AI servers โ no login needed.
A new exploit chain gives attackers remote code execution and access to sensitive AI models.
It all starts with a single malformed request.
Full details โ https://thehackernews.com/2025/08/nvidia-triton-bugs-let-unauthenticated.html
A new exploit chain gives attackers remote code execution and access to sensitive AI models.
It all starts with a single malformed request.
Full details โ https://thehackernews.com/2025/08/nvidia-triton-bugs-let-unauthenticated.html
๐27๐ฅ6๐5๐ฑ4โก1๐1
๐จ A suspected zero-day in SonicWall Gen 7 firewalls is under active attack.
Akira ransomware is exploiting SSL VPNs to breach networksโeven with MFA.
20+ confirmed attacks. Domain controllers hit within hours.
Urgent steps + full report โ https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
Akira ransomware is exploiting SSL VPNs to breach networksโeven with MFA.
20+ confirmed attacks. Domain controllers hit within hours.
Urgent steps + full report โ https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
๐14๐ฅ2
๐จ DDoS attacks surged 358% in Q1 2025. But itโs not just volumeโitโs AI-powered, precision-targeted, and actively evading defenses.
The old playbook is obsolete. Most orgs only test 1% of their attack surface.
The rest? Fully exposed.
Details here โ https://thehackernews.com/expert-insights/2025/08/the-new-face-of-ddos-is-impacted-by-ai.html
The old playbook is obsolete. Most orgs only test 1% of their attack surface.
The rest? Fully exposed.
Details here โ https://thehackernews.com/expert-insights/2025/08/the-new-face-of-ddos-is-impacted-by-ai.html
๐11๐ฑ1
๐จ 15,000+ fake TikTok Shop sites are stealing logins & crypto.
A massive scam uses AI-generated videos, Meta ads & trojan apps to hijack your device.
It mimics influencersโand it's global.
Hereโs what you need to know โ https://thehackernews.com/2025/08/15000-fake-tiktok-shop-domains-deliver.html
A massive scam uses AI-generated videos, Meta ads & trojan apps to hijack your device.
It mimics influencersโand it's global.
Hereโs what you need to know โ https://thehackernews.com/2025/08/15000-fake-tiktok-shop-domains-deliver.html
๐9๐7๐1
๐จ A phishing attack hidden behind a QR code + CAPTCHA was fully exposed in under 60 secondsโno analyst touch needed.
How? A live, automated sandbox detonated the payload, bypassed defenses, and surfaced IOCs instantly.
Your SOC is missing this.
Details here โ https://thehackernews.com/2025/08/how-top-cisos-save-their-socs-from.html
How? A live, automated sandbox detonated the payload, bypassed defenses, and surfaced IOCs instantly.
Your SOC is missing this.
Details here โ https://thehackernews.com/2025/08/how-top-cisos-save-their-socs-from.html
๐14๐1
๐จ A high-severity flaw in Cursor AI (CVE-2025-54136) let attackers hijack trusted MCP configsโtriggering remote code execution every time you opened the project.
No re-prompt. No warning. Just silent compromise by modifying a config file you already trusted.
Learn more โ https://thehackernews.com/2025/08/cursor-ai-code-editor-vulnerability.html
No re-prompt. No warning. Just silent compromise by modifying a config file you already trusted.
Learn more โ https://thehackernews.com/2025/08/cursor-ai-code-editor-vulnerability.html
๐16๐6๐2
๐ 53% of orgs trust their SaaS vendors. But 70% of SaaS incidents come from misconfigs & bad permissionsโyour responsibility.
Worse? They leave no logs. No alerts. Just exposure.
Hereโs why posture > detection: https://thehackernews.com/2025/08/misconfigurations-are-not.html
Worse? They leave no logs. No alerts. Just exposure.
Hereโs why posture > detection: https://thehackernews.com/2025/08/misconfigurations-are-not.html
๐ค7โก1
๐จ Google just fixed 3 Android bugs hackers were already using.
One lets them hijack your phone through the graphics chip โ no clicks needed.
Spyware vendors may be behind it.
PATCH your phones now โ https://thehackernews.com/2025/08/google-fixes-3-android-vulnerabilities.html
One lets them hijack your phone through the graphics chip โ no clicks needed.
Spyware vendors may be behind it.
PATCH your phones now โ https://thehackernews.com/2025/08/google-fixes-3-android-vulnerabilities.html
๐23๐คฏ9๐ฅ5๐ค1
๐จ CAPTCHAgeddon is here. A fake CAPTCHA scam called ClickFix hijacks devices with a single pasteโno download, no file, just clipboard commands.
It's smarter than ClearFakeโand spreading fast.
Hereโs how it works โ https://thehackernews.com/2025/08/clickfix-malware-campaign-exploits.html
It's smarter than ClearFakeโand spreading fast.
Hereโs how it works โ https://thehackernews.com/2025/08/clickfix-malware-campaign-exploits.html
๐ฑ8๐ฅ3๐2๐ค2๐1
๐ Still pip installing and praying?
Supply chain attacks are everywhere in Python:
โ YOLO package hacked
โ Critical vulns in base images
โ Malicious packages live on PyPI
๐ฅ Join the free webinar to secure your Python stack โ https://thehacker.news/safeguarding-python-supply-chain
Supply chain attacks are everywhere in Python:
โ YOLO package hacked
โ Critical vulns in base images
โ Malicious packages live on PyPI
๐ฅ Join the free webinar to secure your Python stack โ https://thehacker.news/safeguarding-python-supply-chain
๐10๐ฅ5๐ฑ2๐1
๐ UPDATE: Akira ransomware now uses legit Windows drivers (rwdrv.sys, hlpdrv.sys) in a BYOVD attack to disable Defender and gain kernel accessโeven in hardened environments.
Tied to SonicWall SSL VPN zero-dayโstill under active investigation.
Read โ https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
Tied to SonicWall SSL VPN zero-dayโstill under active investigation.
Read โ https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
๐ฅ21๐3๐ฑ2๐1
๐ฅ AI just changed the rules of pen testing.
Now you can say: "Check if leaked creds can access prod-finance."
And in seconds, it attacks, adapts, and reportsโno scripts, no guesswork.
Vibe Red Teaming is here. Testing becomes a conversation.
โ Full vision from Pentera's CTO: https://thehackernews.com/2025/08/ai-is-transforming-cybersecurity.html
Now you can say: "Check if leaked creds can access prod-finance."
And in seconds, it attacks, adapts, and reportsโno scripts, no guesswork.
Vibe Red Teaming is here. Testing becomes a conversation.
โ Full vision from Pentera's CTO: https://thehackernews.com/2025/08/ai-is-transforming-cybersecurity.html
๐ฅ11๐3๐2๐ค1
๐จ CISA just confirmed active exploits targeting 3 old D-Link camera and recorder flaws โ one remains unpatched.
These vulnerabilities expose admin passwords and enable command execution.
One affected model reached end-of-life. Still using it? You're exposed.
Mitigations required by Aug 26 โ https://thehackernews.com/2025/08/cisa-adds-3-d-link-router-flaws-to-kev.html
These vulnerabilities expose admin passwords and enable command execution.
One affected model reached end-of-life. Still using it? You're exposed.
Mitigations required by Aug 26 โ https://thehackernews.com/2025/08/cisa-adds-3-d-link-router-flaws-to-kev.html
๐7๐คฏ5๐ฅ2๐2๐ค1
๐จ Ukraine hit by wave of cyberattacks โ again.
Phishing emails posing as court summons are dropping malware that steals docs, grabs screenshots, and executes remote commands.
Hereโs whatโs happening โ https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html
Phishing emails posing as court summons are dropping malware that steals docs, grabs screenshots, and executes remote commands.
Hereโs whatโs happening โ https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html
๐12๐ค12๐ฅ5๐ฑ5๐คฏ4๐3
๐จ Trend Micro flaw (CVE-2025-54948 and CVE-2025-54987) lets attackers run code before login.
Two critical bugs (CVSS 9.4) are being exploited right now in Apex One on-prem.
Admins, patch fast โ remote code execution is on the table.
Hereโs what you need to know โ https://thehackernews.com/2025/08/trend-micro-confirms-active.html
Two critical bugs (CVSS 9.4) are being exploited right now in Apex One on-prem.
Admins, patch fast โ remote code execution is on the table.
Hereโs what you need to know โ https://thehackernews.com/2025/08/trend-micro-confirms-active.html
๐10๐ฅ6
Microsoft just built an AI that reverse-engineers malware by itself.
No hints. No human help โ and 90%+ accuracy.
It could change how threats are foundโbefore they even spread.
Hereโs what Project Ire can do โ https://thehackernews.com/2025/08/microsoft-launches-project-ire-to.html
No hints. No human help โ and 90%+ accuracy.
It could change how threats are foundโbefore they even spread.
Hereโs what Project Ire can do โ https://thehackernews.com/2025/08/microsoft-launches-project-ire-to.html
๐ค30๐11๐6๐4๐ฅ3๐ฑ2๐คฏ1
๐ vCISO adoption just exploded 319% in one year.
MSPs & MSSPs are scrambling to meet SMB demandโand AI is powering the shift.
Itโs not just about security. Itโs driving higher margins, better upsell, and recurring revenue.
Check full report โ https://thehackernews.com/2025/08/ai-slashes-workloads-for-vcisos-by-68.html
MSPs & MSSPs are scrambling to meet SMB demandโand AI is powering the shift.
Itโs not just about security. Itโs driving higher margins, better upsell, and recurring revenue.
Check full report โ https://thehackernews.com/2025/08/ai-slashes-workloads-for-vcisos-by-68.html
๐4๐2
๐จ UPDATE: Google confirms it was hit in the Salesforce vishing attacks.
Hackers accessed contact data for small biz clients in Juneโthen vanished.
Now? They're back, threatening victims with 72-hour bitcoin extortion demands, posing as ShinyHunters.
Read โ https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html
Hackers accessed contact data for small biz clients in Juneโthen vanished.
Now? They're back, threatening victims with 72-hour bitcoin extortion demands, posing as ShinyHunters.
Read โ https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html
๐12๐10๐1