🚨 A suspected zero-day in SonicWall Gen 7 firewalls is under active attack.
Akira ransomware is exploiting SSL VPNs to breach networks—even with MFA.
20+ confirmed attacks. Domain controllers hit within hours.
Urgent steps + full report → https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
Akira ransomware is exploiting SSL VPNs to breach networks—even with MFA.
20+ confirmed attacks. Domain controllers hit within hours.
Urgent steps + full report → https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
👏14🔥2
🚨 DDoS attacks surged 358% in Q1 2025. But it’s not just volume—it’s AI-powered, precision-targeted, and actively evading defenses.
The old playbook is obsolete. Most orgs only test 1% of their attack surface.
The rest? Fully exposed.
Details here → https://thehackernews.com/expert-insights/2025/08/the-new-face-of-ddos-is-impacted-by-ai.html
The old playbook is obsolete. Most orgs only test 1% of their attack surface.
The rest? Fully exposed.
Details here → https://thehackernews.com/expert-insights/2025/08/the-new-face-of-ddos-is-impacted-by-ai.html
👍11😱1
🚨 15,000+ fake TikTok Shop sites are stealing logins & crypto.
A massive scam uses AI-generated videos, Meta ads & trojan apps to hijack your device.
It mimics influencers—and it's global.
Here’s what you need to know ↓ https://thehackernews.com/2025/08/15000-fake-tiktok-shop-domains-deliver.html
A massive scam uses AI-generated videos, Meta ads & trojan apps to hijack your device.
It mimics influencers—and it's global.
Here’s what you need to know ↓ https://thehackernews.com/2025/08/15000-fake-tiktok-shop-domains-deliver.html
😁9👍7👏1
🚨 A phishing attack hidden behind a QR code + CAPTCHA was fully exposed in under 60 seconds—no analyst touch needed.
How? A live, automated sandbox detonated the payload, bypassed defenses, and surfaced IOCs instantly.
Your SOC is missing this.
Details here → https://thehackernews.com/2025/08/how-top-cisos-save-their-socs-from.html
How? A live, automated sandbox detonated the payload, bypassed defenses, and surfaced IOCs instantly.
Your SOC is missing this.
Details here → https://thehackernews.com/2025/08/how-top-cisos-save-their-socs-from.html
😁14👏1
🚨 A high-severity flaw in Cursor AI (CVE-2025-54136) let attackers hijack trusted MCP configs—triggering remote code execution every time you opened the project.
No re-prompt. No warning. Just silent compromise by modifying a config file you already trusted.
Learn more → https://thehackernews.com/2025/08/cursor-ai-code-editor-vulnerability.html
No re-prompt. No warning. Just silent compromise by modifying a config file you already trusted.
Learn more → https://thehackernews.com/2025/08/cursor-ai-code-editor-vulnerability.html
👏16😁6👍2
🔑 53% of orgs trust their SaaS vendors. But 70% of SaaS incidents come from misconfigs & bad permissions—your responsibility.
Worse? They leave no logs. No alerts. Just exposure.
Here’s why posture > detection: https://thehackernews.com/2025/08/misconfigurations-are-not.html
Worse? They leave no logs. No alerts. Just exposure.
Here’s why posture > detection: https://thehackernews.com/2025/08/misconfigurations-are-not.html
🤔7⚡1
🚨 Google just fixed 3 Android bugs hackers were already using.
One lets them hijack your phone through the graphics chip — no clicks needed.
Spyware vendors may be behind it.
PATCH your phones now → https://thehackernews.com/2025/08/google-fixes-3-android-vulnerabilities.html
One lets them hijack your phone through the graphics chip — no clicks needed.
Spyware vendors may be behind it.
PATCH your phones now → https://thehackernews.com/2025/08/google-fixes-3-android-vulnerabilities.html
😁23🤯9🔥5🤔1
🚨 CAPTCHAgeddon is here. A fake CAPTCHA scam called ClickFix hijacks devices with a single paste—no download, no file, just clipboard commands.
It's smarter than ClearFake—and spreading fast.
Here’s how it works ↓ https://thehackernews.com/2025/08/clickfix-malware-campaign-exploits.html
It's smarter than ClearFake—and spreading fast.
Here’s how it works ↓ https://thehackernews.com/2025/08/clickfix-malware-campaign-exploits.html
😱8🔥3👍2🤔2😁1
👀 Still pip installing and praying?
Supply chain attacks are everywhere in Python:
→ YOLO package hacked
→ Critical vulns in base images
→ Malicious packages live on PyPI
🔥 Join the free webinar to secure your Python stack → https://thehacker.news/safeguarding-python-supply-chain
Supply chain attacks are everywhere in Python:
→ YOLO package hacked
→ Critical vulns in base images
→ Malicious packages live on PyPI
🔥 Join the free webinar to secure your Python stack → https://thehacker.news/safeguarding-python-supply-chain
👍10🔥5😱2😁1
🔒 UPDATE: Akira ransomware now uses legit Windows drivers (rwdrv.sys, hlpdrv.sys) in a BYOVD attack to disable Defender and gain kernel access—even in hardened environments.
Tied to SonicWall SSL VPN zero-day—still under active investigation.
Read → https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
Tied to SonicWall SSL VPN zero-day—still under active investigation.
Read → https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
🔥21😁3😱2👏1
🔥 AI just changed the rules of pen testing.
Now you can say: "Check if leaked creds can access prod-finance."
And in seconds, it attacks, adapts, and reports—no scripts, no guesswork.
Vibe Red Teaming is here. Testing becomes a conversation.
→ Full vision from Pentera's CTO: https://thehackernews.com/2025/08/ai-is-transforming-cybersecurity.html
Now you can say: "Check if leaked creds can access prod-finance."
And in seconds, it attacks, adapts, and reports—no scripts, no guesswork.
Vibe Red Teaming is here. Testing becomes a conversation.
→ Full vision from Pentera's CTO: https://thehackernews.com/2025/08/ai-is-transforming-cybersecurity.html
🔥11😁3👍2🤔1
🚨 CISA just confirmed active exploits targeting 3 old D-Link camera and recorder flaws — one remains unpatched.
These vulnerabilities expose admin passwords and enable command execution.
One affected model reached end-of-life. Still using it? You're exposed.
Mitigations required by Aug 26 → https://thehackernews.com/2025/08/cisa-adds-3-d-link-router-flaws-to-kev.html
These vulnerabilities expose admin passwords and enable command execution.
One affected model reached end-of-life. Still using it? You're exposed.
Mitigations required by Aug 26 → https://thehackernews.com/2025/08/cisa-adds-3-d-link-router-flaws-to-kev.html
👏7🤯5🔥2😁2🤔1
🚨 Ukraine hit by wave of cyberattacks — again.
Phishing emails posing as court summons are dropping malware that steals docs, grabs screenshots, and executes remote commands.
Here’s what’s happening ↓ https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html
Phishing emails posing as court summons are dropping malware that steals docs, grabs screenshots, and executes remote commands.
Here’s what’s happening ↓ https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html
😁12🤔12🔥5😱5🤯4👏3
🚨 Trend Micro flaw (CVE-2025-54948 and CVE-2025-54987) lets attackers run code before login.
Two critical bugs (CVSS 9.4) are being exploited right now in Apex One on-prem.
Admins, patch fast — remote code execution is on the table.
Here’s what you need to know ↓ https://thehackernews.com/2025/08/trend-micro-confirms-active.html
Two critical bugs (CVSS 9.4) are being exploited right now in Apex One on-prem.
Admins, patch fast — remote code execution is on the table.
Here’s what you need to know ↓ https://thehackernews.com/2025/08/trend-micro-confirms-active.html
👍10🔥6
Microsoft just built an AI that reverse-engineers malware by itself.
No hints. No human help — and 90%+ accuracy.
It could change how threats are found—before they even spread.
Here’s what Project Ire can do ↓ https://thehackernews.com/2025/08/microsoft-launches-project-ire-to.html
No hints. No human help — and 90%+ accuracy.
It could change how threats are found—before they even spread.
Here’s what Project Ire can do ↓ https://thehackernews.com/2025/08/microsoft-launches-project-ire-to.html
🤔30👏11😁6👍4🔥3😱2🤯1
📈 vCISO adoption just exploded 319% in one year.
MSPs & MSSPs are scrambling to meet SMB demand—and AI is powering the shift.
It’s not just about security. It’s driving higher margins, better upsell, and recurring revenue.
Check full report → https://thehackernews.com/2025/08/ai-slashes-workloads-for-vcisos-by-68.html
MSPs & MSSPs are scrambling to meet SMB demand—and AI is powering the shift.
It’s not just about security. It’s driving higher margins, better upsell, and recurring revenue.
Check full report → https://thehackernews.com/2025/08/ai-slashes-workloads-for-vcisos-by-68.html
👏4👍2
🚨 UPDATE: Google confirms it was hit in the Salesforce vishing attacks.
Hackers accessed contact data for small biz clients in June—then vanished.
Now? They're back, threatening victims with 72-hour bitcoin extortion demands, posing as ShinyHunters.
Read ↓ https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html
Hackers accessed contact data for small biz clients in June—then vanished.
Now? They're back, threatening victims with 72-hour bitcoin extortion demands, posing as ShinyHunters.
Read ↓ https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html
👍12😁10👏1
🚨 Millions duped by fake apps on Apple & Google stores.
VexTrio, a global crime ring, used bogus VPNs & cleaners to steal data, push ads, and charge hidden fees.
It’s still active.
Details here → https://thehackernews.com/2025/08/fake-vpn-and-spam-blocker-apps-tied-to.html
VexTrio, a global crime ring, used bogus VPNs & cleaners to steal data, push ads, and charge hidden fees.
It’s still active.
Details here → https://thehackernews.com/2025/08/fake-vpn-and-spam-blocker-apps-tied-to.html
😁14🔥3😱3👏1
🚨 One container in Amazon ECS can now hijack all others’ AWS creds on the same EC2 host.
Researchers exposed a stealthy privilege escalation chain called ECScape — no exploit, just abusing AWS internals.
Amazon: "Working as designed."
Details → https://thehackernews.com/2025/08/researchers-uncover-ecscape-flaw-in.html
Researchers exposed a stealthy privilege escalation chain called ECScape — no exploit, just abusing AWS internals.
Amazon: "Working as designed."
Details → https://thehackernews.com/2025/08/researchers-uncover-ecscape-flaw-in.html
🤯17😱8👍5👏1
Your pip install isn’t as safe as you think.
From typo-squatting to CVE-packed base images, Python supply chain attacks are everywhere—and evolving fast.
🎥 Learn how to lock down your stack in 2025. Tools, tactics, and real-world examples:
Watch the webinar → https://thehackernews.com/2025/08/webinar-how-to-stop-python-supply-chain.html
From typo-squatting to CVE-packed base images, Python supply chain attacks are everywhere—and evolving fast.
🎥 Learn how to lock down your stack in 2025. Tools, tactics, and real-world examples:
Watch the webinar → https://thehackernews.com/2025/08/webinar-how-to-stop-python-supply-chain.html
🤯16🔥3😱1
🚨 Attackers are hitting SonicWall firewalls again—but it’s not a new zero-day.
Turns out, they’re exploiting a known bug (CVE-2024-40766) and weak password hygiene.
Migrating from Gen 6 to Gen 7 without resets? That’s leaving doors wide open.
Full details + what to fix → https://thehackernews.com/2025/08/sonicwall-confirms-patched.html
Turns out, they’re exploiting a known bug (CVE-2024-40766) and weak password hygiene.
Migrating from Gen 6 to Gen 7 without resets? That’s leaving doors wide open.
Full details + what to fix → https://thehackernews.com/2025/08/sonicwall-confirms-patched.html
🤔8👍3😁3