π¨ CISA just confirmed active exploits targeting 3 old D-Link camera and recorder flaws β one remains unpatched.
These vulnerabilities expose admin passwords and enable command execution.
One affected model reached end-of-life. Still using it? You're exposed.
Mitigations required by Aug 26 β https://thehackernews.com/2025/08/cisa-adds-3-d-link-router-flaws-to-kev.html
These vulnerabilities expose admin passwords and enable command execution.
One affected model reached end-of-life. Still using it? You're exposed.
Mitigations required by Aug 26 β https://thehackernews.com/2025/08/cisa-adds-3-d-link-router-flaws-to-kev.html
π7π€―5π₯2π2π€1
π¨ Ukraine hit by wave of cyberattacks β again.
Phishing emails posing as court summons are dropping malware that steals docs, grabs screenshots, and executes remote commands.
Hereβs whatβs happening β https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html
Phishing emails posing as court summons are dropping malware that steals docs, grabs screenshots, and executes remote commands.
Hereβs whatβs happening β https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html
π12π€12π₯5π±5π€―4π3
π¨ Trend Micro flaw (CVE-2025-54948 and CVE-2025-54987) lets attackers run code before login.
Two critical bugs (CVSS 9.4) are being exploited right now in Apex One on-prem.
Admins, patch fast β remote code execution is on the table.
Hereβs what you need to know β https://thehackernews.com/2025/08/trend-micro-confirms-active.html
Two critical bugs (CVSS 9.4) are being exploited right now in Apex One on-prem.
Admins, patch fast β remote code execution is on the table.
Hereβs what you need to know β https://thehackernews.com/2025/08/trend-micro-confirms-active.html
π10π₯6
Microsoft just built an AI that reverse-engineers malware by itself.
No hints. No human help β and 90%+ accuracy.
It could change how threats are foundβbefore they even spread.
Hereβs what Project Ire can do β https://thehackernews.com/2025/08/microsoft-launches-project-ire-to.html
No hints. No human help β and 90%+ accuracy.
It could change how threats are foundβbefore they even spread.
Hereβs what Project Ire can do β https://thehackernews.com/2025/08/microsoft-launches-project-ire-to.html
π€30π11π6π4π₯3π±2π€―1
π vCISO adoption just exploded 319% in one year.
MSPs & MSSPs are scrambling to meet SMB demandβand AI is powering the shift.
Itβs not just about security. Itβs driving higher margins, better upsell, and recurring revenue.
Check full report β https://thehackernews.com/2025/08/ai-slashes-workloads-for-vcisos-by-68.html
MSPs & MSSPs are scrambling to meet SMB demandβand AI is powering the shift.
Itβs not just about security. Itβs driving higher margins, better upsell, and recurring revenue.
Check full report β https://thehackernews.com/2025/08/ai-slashes-workloads-for-vcisos-by-68.html
π4π2
π¨ UPDATE: Google confirms it was hit in the Salesforce vishing attacks.
Hackers accessed contact data for small biz clients in Juneβthen vanished.
Now? They're back, threatening victims with 72-hour bitcoin extortion demands, posing as ShinyHunters.
Read β https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html
Hackers accessed contact data for small biz clients in Juneβthen vanished.
Now? They're back, threatening victims with 72-hour bitcoin extortion demands, posing as ShinyHunters.
Read β https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html
π12π10π1
π¨ Millions duped by fake apps on Apple & Google stores.
VexTrio, a global crime ring, used bogus VPNs & cleaners to steal data, push ads, and charge hidden fees.
Itβs still active.
Details here β https://thehackernews.com/2025/08/fake-vpn-and-spam-blocker-apps-tied-to.html
VexTrio, a global crime ring, used bogus VPNs & cleaners to steal data, push ads, and charge hidden fees.
Itβs still active.
Details here β https://thehackernews.com/2025/08/fake-vpn-and-spam-blocker-apps-tied-to.html
π14π₯3π±3π1
π¨ One container in Amazon ECS can now hijack all othersβ AWS creds on the same EC2 host.
Researchers exposed a stealthy privilege escalation chain called ECScape β no exploit, just abusing AWS internals.
Amazon: "Working as designed."
Details β https://thehackernews.com/2025/08/researchers-uncover-ecscape-flaw-in.html
Researchers exposed a stealthy privilege escalation chain called ECScape β no exploit, just abusing AWS internals.
Amazon: "Working as designed."
Details β https://thehackernews.com/2025/08/researchers-uncover-ecscape-flaw-in.html
π€―17π±8π5π1
Your pip install isnβt as safe as you think.
From typo-squatting to CVE-packed base images, Python supply chain attacks are everywhereβand evolving fast.
π₯ Learn how to lock down your stack in 2025. Tools, tactics, and real-world examples:
Watch the webinar β https://thehackernews.com/2025/08/webinar-how-to-stop-python-supply-chain.html
From typo-squatting to CVE-packed base images, Python supply chain attacks are everywhereβand evolving fast.
π₯ Learn how to lock down your stack in 2025. Tools, tactics, and real-world examples:
Watch the webinar β https://thehackernews.com/2025/08/webinar-how-to-stop-python-supply-chain.html
π€―16π₯3π±1
π¨ Attackers are hitting SonicWall firewalls againβbut itβs not a new zero-day.
Turns out, theyβre exploiting a known bug (CVE-2024-40766) and weak password hygiene.
Migrating from Gen 6 to Gen 7 without resets? Thatβs leaving doors wide open.
Full details + what to fix β https://thehackernews.com/2025/08/sonicwall-confirms-patched.html
Turns out, theyβre exploiting a known bug (CVE-2024-40766) and weak password hygiene.
Migrating from Gen 6 to Gen 7 without resets? Thatβs leaving doors wide open.
Full details + what to fix β https://thehackernews.com/2025/08/sonicwall-confirms-patched.html
π€8π3π3
π¨ Microsoft just warned: CVE-2025-53786 lets hackers silently escalate privileges from on-prem Exchange to the cloud.
No logs. No easy traces.
Your hybrid setup could be a silent breach vector.
Full details + fixes β https://thehackernews.com/2025/08/microsoft-discloses-exchange-server.html
No logs. No easy traces.
Your hybrid setup could be a silent breach vector.
Full details + fixes β https://thehackernews.com/2025/08/microsoft-discloses-exchange-server.html
π8π7
π¨ Hackers can hijack Axis camera networks without logging in.
A CVSS 9.0 flaw in Axis Device Manager & Camera Station enables pre-auth remote code executionβimpacting 6,500+ servers, mostly in the U.S.
Live feeds could be watched or shut down.
Details β https://thehackernews.com/2025/08/6500-axis-servers-expose-remoting.html
A CVSS 9.0 flaw in Axis Device Manager & Camera Station enables pre-auth remote code executionβimpacting 6,500+ servers, mostly in the U.S.
Live feeds could be watched or shut down.
Details β https://thehackernews.com/2025/08/6500-axis-servers-expose-remoting.html
π₯12π4
π¨ 11 malicious Go packages just found β infecting both Windows and Linux.
They silently download payloads, hijack shells, and can steal browser data.
Worse: they look legit, preying on confused devs importing from GitHub.
Details devs need to see β https://thehackernews.com/2025/08/malicious-go-npm-packages-deliver-cross.html
They silently download payloads, hijack shells, and can steal browser data.
Worse: they look legit, preying on confused devs importing from GitHub.
Details devs need to see β https://thehackernews.com/2025/08/malicious-go-npm-packages-deliver-cross.html
π10π₯4π€1
π¨ Cloud attacks now execute in under 10 minutes.
AI is fueling both sides:
π 500% surge in AI workloads
β οΈ CI/CD pipelines under fire
π‘οΈ Real-time defense is no longer optional
Real-time defense isnβt optionalβitβs survival.
Full 2025 report β https://thehackernews.com/2025/08/the-ai-powered-security-shift-what-2025.html
AI is fueling both sides:
π 500% surge in AI workloads
β οΈ CI/CD pipelines under fire
π‘οΈ Real-time defense is no longer optional
Real-time defense isnβt optionalβitβs survival.
Full 2025 report β https://thehackernews.com/2025/08/the-ai-powered-security-shift-what-2025.html
π5β‘1
π¨ Hackers are hijacking legit ad tools to push fake browser updatesβspreading SocGholish malware linked to LockBit, Evil Corp & others.
Itβs a Malware-as-a-Service network selling your device as a doorway in.
How it works β https://thehackernews.com/2025/08/socgholish-malware-spread-via-ad-tools.html
Itβs a Malware-as-a-Service network selling your device as a doorway in.
How it works β https://thehackernews.com/2025/08/socgholish-malware-spread-via-ad-tools.html
π12π5π3π€1
$1M in crypto goneβstolen by 150+ fake Firefox wallet extensions.
The scam: lookalike MetaMask, TronLink, Exodus add-ons that start cleanβ¦ then turn malicious when no oneβs watching.
Now spreading to Chrome. AI is helping them scale.
Full story β https://thehackernews.com/2025/08/greedybear-steals-1m-in-crypto-using.html
The scam: lookalike MetaMask, TronLink, Exodus add-ons that start cleanβ¦ then turn malicious when no oneβs watching.
Now spreading to Chrome. AI is helping them scale.
Full story β https://thehackernews.com/2025/08/greedybear-steals-1m-in-crypto-using.html
π€―22π12π±3
π¨ RubyGems & PyPI under attack:
πΈ 60 fake RubyGems stole social media logins (275K+ downloads)
πΈ PyPI fakes hijacked crypto staking wallets
Both hide credential-stealing code in legit-looking packages.
Details β https://thehackernews.com/2025/08/rubygems-pypi-hit-by-malicious-packages.html
πΈ 60 fake RubyGems stole social media logins (275K+ downloads)
πΈ PyPI fakes hijacked crypto staking wallets
Both hide credential-stealing code in legit-looking packages.
Details β https://thehackernews.com/2025/08/rubygems-pypi-hit-by-malicious-packages.html
π₯10π€1
π¨ Stolen logins are now the #1 way hackers break in β beating phishing & software flaws.
Many still work. Attackers donβt need exploits when they can just log in.
Think your passwords are safe? You might want to check.
Full report β https://thehackernews.com/2025/08/leaked-credentials-up-160-what.html
Many still work. Attackers donβt need exploits when they can just log in.
Think your passwords are safe? You might want to check.
Full report β https://thehackernews.com/2025/08/leaked-credentials-up-160-what.html
π11π₯1π€1
π¨ Brazil hit by two cyber threats:
1οΈβ£ Hackers using AI-built fake gov sites to steal IDs + cash via PIX.
2οΈβ£ Efimer Trojan spreading via fake legal emails, torrents & WordPress hacks β swapping crypto wallets + stealing funds.
How both attacks work β https://thehackernews.com/2025/08/ai-tools-fuel-brazilian-phishing-scam.html
1οΈβ£ Hackers using AI-built fake gov sites to steal IDs + cash via PIX.
2οΈβ£ Efimer Trojan spreading via fake legal emails, torrents & WordPress hacks β swapping crypto wallets + stealing funds.
How both attacks work β https://thehackernews.com/2025/08/ai-tools-fuel-brazilian-phishing-scam.html
π13π₯7π€2π±1
π¨ 14 new flaws in CyberArk & HashiCorp vaults can let hackers steal corporate secrets without a password β some bugs sat undetected for 9 years.
Researchers warn attackers could chain them for full remote takeover.
Full story β https://thehackernews.com/2025/08/cyberark-and-hashicorp-flaws-enable.html
Researchers warn attackers could chain them for full remote takeover.
Full story β https://thehackernews.com/2025/08/cyberark-and-hashicorp-flaws-enable.html
π13π₯5π3π3π±2
π₯ GPT-5 jailbroken: βEcho Chamberβ + storytelling tricked it into giving banned instructions.
Related zero-click prompt injections can exfiltrate data from Google Drive, Jira, Microsoft Copilot Studio, and even hijack smart homes.
Details β https://thehackernews.com/2025/08/researchers-uncover-gpt-5-jailbreak-and.html
Related zero-click prompt injections can exfiltrate data from Google Drive, Jira, Microsoft Copilot Studio, and even hijack smart homes.
Details β https://thehackernews.com/2025/08/researchers-uncover-gpt-5-jailbreak-and.html
π48π₯17β‘3π3π€1