๐จ 15,000+ fake TikTok Shop sites are stealing logins & crypto.
A massive scam uses AI-generated videos, Meta ads & trojan apps to hijack your device.
It mimics influencersโand it's global.
Hereโs what you need to know โ https://thehackernews.com/2025/08/15000-fake-tiktok-shop-domains-deliver.html
A massive scam uses AI-generated videos, Meta ads & trojan apps to hijack your device.
It mimics influencersโand it's global.
Hereโs what you need to know โ https://thehackernews.com/2025/08/15000-fake-tiktok-shop-domains-deliver.html
๐9๐7๐1
๐จ A phishing attack hidden behind a QR code + CAPTCHA was fully exposed in under 60 secondsโno analyst touch needed.
How? A live, automated sandbox detonated the payload, bypassed defenses, and surfaced IOCs instantly.
Your SOC is missing this.
Details here โ https://thehackernews.com/2025/08/how-top-cisos-save-their-socs-from.html
How? A live, automated sandbox detonated the payload, bypassed defenses, and surfaced IOCs instantly.
Your SOC is missing this.
Details here โ https://thehackernews.com/2025/08/how-top-cisos-save-their-socs-from.html
๐14๐1
๐จ A high-severity flaw in Cursor AI (CVE-2025-54136) let attackers hijack trusted MCP configsโtriggering remote code execution every time you opened the project.
No re-prompt. No warning. Just silent compromise by modifying a config file you already trusted.
Learn more โ https://thehackernews.com/2025/08/cursor-ai-code-editor-vulnerability.html
No re-prompt. No warning. Just silent compromise by modifying a config file you already trusted.
Learn more โ https://thehackernews.com/2025/08/cursor-ai-code-editor-vulnerability.html
๐16๐6๐2
๐ 53% of orgs trust their SaaS vendors. But 70% of SaaS incidents come from misconfigs & bad permissionsโyour responsibility.
Worse? They leave no logs. No alerts. Just exposure.
Hereโs why posture > detection: https://thehackernews.com/2025/08/misconfigurations-are-not.html
Worse? They leave no logs. No alerts. Just exposure.
Hereโs why posture > detection: https://thehackernews.com/2025/08/misconfigurations-are-not.html
๐ค7โก1
๐จ Google just fixed 3 Android bugs hackers were already using.
One lets them hijack your phone through the graphics chip โ no clicks needed.
Spyware vendors may be behind it.
PATCH your phones now โ https://thehackernews.com/2025/08/google-fixes-3-android-vulnerabilities.html
One lets them hijack your phone through the graphics chip โ no clicks needed.
Spyware vendors may be behind it.
PATCH your phones now โ https://thehackernews.com/2025/08/google-fixes-3-android-vulnerabilities.html
๐23๐คฏ9๐ฅ5๐ค1
๐จ CAPTCHAgeddon is here. A fake CAPTCHA scam called ClickFix hijacks devices with a single pasteโno download, no file, just clipboard commands.
It's smarter than ClearFakeโand spreading fast.
Hereโs how it works โ https://thehackernews.com/2025/08/clickfix-malware-campaign-exploits.html
It's smarter than ClearFakeโand spreading fast.
Hereโs how it works โ https://thehackernews.com/2025/08/clickfix-malware-campaign-exploits.html
๐ฑ8๐ฅ3๐2๐ค2๐1
๐ Still pip installing and praying?
Supply chain attacks are everywhere in Python:
โ YOLO package hacked
โ Critical vulns in base images
โ Malicious packages live on PyPI
๐ฅ Join the free webinar to secure your Python stack โ https://thehacker.news/safeguarding-python-supply-chain
Supply chain attacks are everywhere in Python:
โ YOLO package hacked
โ Critical vulns in base images
โ Malicious packages live on PyPI
๐ฅ Join the free webinar to secure your Python stack โ https://thehacker.news/safeguarding-python-supply-chain
๐10๐ฅ5๐ฑ2๐1
๐ UPDATE: Akira ransomware now uses legit Windows drivers (rwdrv.sys, hlpdrv.sys) in a BYOVD attack to disable Defender and gain kernel accessโeven in hardened environments.
Tied to SonicWall SSL VPN zero-dayโstill under active investigation.
Read โ https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
Tied to SonicWall SSL VPN zero-dayโstill under active investigation.
Read โ https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
๐ฅ21๐3๐ฑ2๐1
๐ฅ AI just changed the rules of pen testing.
Now you can say: "Check if leaked creds can access prod-finance."
And in seconds, it attacks, adapts, and reportsโno scripts, no guesswork.
Vibe Red Teaming is here. Testing becomes a conversation.
โ Full vision from Pentera's CTO: https://thehackernews.com/2025/08/ai-is-transforming-cybersecurity.html
Now you can say: "Check if leaked creds can access prod-finance."
And in seconds, it attacks, adapts, and reportsโno scripts, no guesswork.
Vibe Red Teaming is here. Testing becomes a conversation.
โ Full vision from Pentera's CTO: https://thehackernews.com/2025/08/ai-is-transforming-cybersecurity.html
๐ฅ11๐3๐2๐ค1
๐จ CISA just confirmed active exploits targeting 3 old D-Link camera and recorder flaws โ one remains unpatched.
These vulnerabilities expose admin passwords and enable command execution.
One affected model reached end-of-life. Still using it? You're exposed.
Mitigations required by Aug 26 โ https://thehackernews.com/2025/08/cisa-adds-3-d-link-router-flaws-to-kev.html
These vulnerabilities expose admin passwords and enable command execution.
One affected model reached end-of-life. Still using it? You're exposed.
Mitigations required by Aug 26 โ https://thehackernews.com/2025/08/cisa-adds-3-d-link-router-flaws-to-kev.html
๐7๐คฏ5๐ฅ2๐2๐ค1
๐จ Ukraine hit by wave of cyberattacks โ again.
Phishing emails posing as court summons are dropping malware that steals docs, grabs screenshots, and executes remote commands.
Hereโs whatโs happening โ https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html
Phishing emails posing as court summons are dropping malware that steals docs, grabs screenshots, and executes remote commands.
Hereโs whatโs happening โ https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html
๐12๐ค12๐ฅ5๐ฑ5๐คฏ4๐3
๐จ Trend Micro flaw (CVE-2025-54948 and CVE-2025-54987) lets attackers run code before login.
Two critical bugs (CVSS 9.4) are being exploited right now in Apex One on-prem.
Admins, patch fast โ remote code execution is on the table.
Hereโs what you need to know โ https://thehackernews.com/2025/08/trend-micro-confirms-active.html
Two critical bugs (CVSS 9.4) are being exploited right now in Apex One on-prem.
Admins, patch fast โ remote code execution is on the table.
Hereโs what you need to know โ https://thehackernews.com/2025/08/trend-micro-confirms-active.html
๐10๐ฅ6
Microsoft just built an AI that reverse-engineers malware by itself.
No hints. No human help โ and 90%+ accuracy.
It could change how threats are foundโbefore they even spread.
Hereโs what Project Ire can do โ https://thehackernews.com/2025/08/microsoft-launches-project-ire-to.html
No hints. No human help โ and 90%+ accuracy.
It could change how threats are foundโbefore they even spread.
Hereโs what Project Ire can do โ https://thehackernews.com/2025/08/microsoft-launches-project-ire-to.html
๐ค30๐11๐6๐4๐ฅ3๐ฑ2๐คฏ1
๐ vCISO adoption just exploded 319% in one year.
MSPs & MSSPs are scrambling to meet SMB demandโand AI is powering the shift.
Itโs not just about security. Itโs driving higher margins, better upsell, and recurring revenue.
Check full report โ https://thehackernews.com/2025/08/ai-slashes-workloads-for-vcisos-by-68.html
MSPs & MSSPs are scrambling to meet SMB demandโand AI is powering the shift.
Itโs not just about security. Itโs driving higher margins, better upsell, and recurring revenue.
Check full report โ https://thehackernews.com/2025/08/ai-slashes-workloads-for-vcisos-by-68.html
๐4๐2
๐จ UPDATE: Google confirms it was hit in the Salesforce vishing attacks.
Hackers accessed contact data for small biz clients in Juneโthen vanished.
Now? They're back, threatening victims with 72-hour bitcoin extortion demands, posing as ShinyHunters.
Read โ https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html
Hackers accessed contact data for small biz clients in Juneโthen vanished.
Now? They're back, threatening victims with 72-hour bitcoin extortion demands, posing as ShinyHunters.
Read โ https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html
๐12๐10๐1
๐จ Millions duped by fake apps on Apple & Google stores.
VexTrio, a global crime ring, used bogus VPNs & cleaners to steal data, push ads, and charge hidden fees.
Itโs still active.
Details here โ https://thehackernews.com/2025/08/fake-vpn-and-spam-blocker-apps-tied-to.html
VexTrio, a global crime ring, used bogus VPNs & cleaners to steal data, push ads, and charge hidden fees.
Itโs still active.
Details here โ https://thehackernews.com/2025/08/fake-vpn-and-spam-blocker-apps-tied-to.html
๐14๐ฅ3๐ฑ3๐1
๐จ One container in Amazon ECS can now hijack all othersโ AWS creds on the same EC2 host.
Researchers exposed a stealthy privilege escalation chain called ECScape โ no exploit, just abusing AWS internals.
Amazon: "Working as designed."
Details โ https://thehackernews.com/2025/08/researchers-uncover-ecscape-flaw-in.html
Researchers exposed a stealthy privilege escalation chain called ECScape โ no exploit, just abusing AWS internals.
Amazon: "Working as designed."
Details โ https://thehackernews.com/2025/08/researchers-uncover-ecscape-flaw-in.html
๐คฏ17๐ฑ8๐5๐1
Your pip install isnโt as safe as you think.
From typo-squatting to CVE-packed base images, Python supply chain attacks are everywhereโand evolving fast.
๐ฅ Learn how to lock down your stack in 2025. Tools, tactics, and real-world examples:
Watch the webinar โ https://thehackernews.com/2025/08/webinar-how-to-stop-python-supply-chain.html
From typo-squatting to CVE-packed base images, Python supply chain attacks are everywhereโand evolving fast.
๐ฅ Learn how to lock down your stack in 2025. Tools, tactics, and real-world examples:
Watch the webinar โ https://thehackernews.com/2025/08/webinar-how-to-stop-python-supply-chain.html
๐คฏ16๐ฅ3๐ฑ1
๐จ Attackers are hitting SonicWall firewalls againโbut itโs not a new zero-day.
Turns out, theyโre exploiting a known bug (CVE-2024-40766) and weak password hygiene.
Migrating from Gen 6 to Gen 7 without resets? Thatโs leaving doors wide open.
Full details + what to fix โ https://thehackernews.com/2025/08/sonicwall-confirms-patched.html
Turns out, theyโre exploiting a known bug (CVE-2024-40766) and weak password hygiene.
Migrating from Gen 6 to Gen 7 without resets? Thatโs leaving doors wide open.
Full details + what to fix โ https://thehackernews.com/2025/08/sonicwall-confirms-patched.html
๐ค8๐3๐3
๐จ Microsoft just warned: CVE-2025-53786 lets hackers silently escalate privileges from on-prem Exchange to the cloud.
No logs. No easy traces.
Your hybrid setup could be a silent breach vector.
Full details + fixes โ https://thehackernews.com/2025/08/microsoft-discloses-exchange-server.html
No logs. No easy traces.
Your hybrid setup could be a silent breach vector.
Full details + fixes โ https://thehackernews.com/2025/08/microsoft-discloses-exchange-server.html
๐8๐7
๐จ Hackers can hijack Axis camera networks without logging in.
A CVSS 9.0 flaw in Axis Device Manager & Camera Station enables pre-auth remote code executionโimpacting 6,500+ servers, mostly in the U.S.
Live feeds could be watched or shut down.
Details โ https://thehackernews.com/2025/08/6500-axis-servers-expose-remoting.html
A CVSS 9.0 flaw in Axis Device Manager & Camera Station enables pre-auth remote code executionโimpacting 6,500+ servers, mostly in the U.S.
Live feeds could be watched or shut down.
Details โ https://thehackernews.com/2025/08/6500-axis-servers-expose-remoting.html
๐ฅ12๐4