🔥 GPT-5 jailbroken: “Echo Chamber” + storytelling tricked it into giving banned instructions.
Related zero-click prompt injections can exfiltrate data from Google Drive, Jira, Microsoft Copilot Studio, and even hijack smart homes.
Details → https://thehackernews.com/2025/08/researchers-uncover-gpt-5-jailbreak-and.html
Related zero-click prompt injections can exfiltrate data from Google Drive, Jira, Microsoft Copilot Studio, and even hijack smart homes.
Details → https://thehackernews.com/2025/08/researchers-uncover-gpt-5-jailbreak-and.html
😁48🔥17⚡3👏3🤔1
⚡ Lenovo webcams can be hacked into remote BadUSB weapons.
Flawed firmware checks let attackers send or infect a camera to inject keystrokes, survive wipes, and spread to other hosts.
Here’s how the “BadCam” exploit works → https://thehackernews.com/2025/08/linux-based-lenovo-webcams-flaw-can-be.html
Flawed firmware checks let attackers send or infect a camera to inject keystrokes, survive wipes, and spread to other hosts.
Here’s how the “BadCam” exploit works → https://thehackernews.com/2025/08/linux-based-lenovo-webcams-flaw-can-be.html
🤯23🔥10👏10😱7👍4
Hackers can bypass Windows login, steal cryptographic keys, and hide inside some Dell laptops even after a full OS reinstall — “ReVault” flaws hit 100+ models.
Sometimes, they don’t even need your password.
Details → https://thehackernews.com/2025/08/researchers-reveal-revault-attack.html
Sometimes, they don’t even need your password.
Details → https://thehackernews.com/2025/08/researchers-reveal-revault-attack.html
🤔21🔥15👍6🤯4😱4
🔥 Windows had a hole [CVE-2025-49760] in its core RPC system that let attackers pretend to be trusted services—like hijacking DNS, but inside your OS.
The wild part? Even Windows Defender’s ID could be spoofed.
Here’s how the EPM poisoning attack worked ↓ https://thehackernews.com/2025/08/researchers-detail-windows-epm.html
The wild part? Even Windows Defender’s ID could be spoofed.
Here’s how the EPM poisoning attack worked ↓ https://thehackernews.com/2025/08/researchers-detail-windows-epm.html
🤯27👍9🔥5😱3😁2🤔1
Hackers can now hijack Microsoft Domain Controllers into a global DDoS botnet—no malware, no creds, no trace.
At DEF CON, researchers revealed “Win-DDoS”: a flaw that can weaponize tens of thousands of public DCs to flood targets, crash systems, or trigger BSODs—remotely.
Here’s how it works → https://thehackernews.com/2025/08/new-win-ddos-flaws-let-attackers-turn.html
At DEF CON, researchers revealed “Win-DDoS”: a flaw that can weaponize tens of thousands of public DCs to flood targets, crash systems, or trigger BSODs—remotely.
Here’s how it works → https://thehackernews.com/2025/08/new-win-ddos-flaws-let-attackers-turn.html
🤔20😁7😱7👏6🔥3👍2
🛑 ALERT - Stop what you’re doing & update WinRAR.
A zero-day (CVE-2025-8088) is under active attack—booby-trapped archives can drop malware into Windows startup & hijack your PC.
Linked to Russian group “Paper Werewolf”
Update to v7.13 now. Details → https://thehackernews.com/2025/08/winrar-zero-day-under-active.html
A zero-day (CVE-2025-8088) is under active attack—booby-trapped archives can drop malware into Windows startup & hijack your PC.
Linked to Russian group “Paper Werewolf”
Update to v7.13 now. Details → https://thehackernews.com/2025/08/winrar-zero-day-under-active.html
🔥39👍15😱10😁6👏2🤯2
🔒 96% less remediation work. 📈 Stronger security.
One method is letting CISOs, CFOs & security teams speak the same language—business risk.
Here’s how orgs are protecting what truly drives revenue ↓ https://thehackernews.com/2025/08/6-lessons-learned-focusing-security.html
One method is letting CISOs, CFOs & security teams speak the same language—business risk.
Here’s how orgs are protecting what truly drives revenue ↓ https://thehackernews.com/2025/08/6-lessons-learned-focusing-security.html
🔥11👍5
🚨 Weekly Cybersecurity Recap is live!
WinRAR flaws, NVIDIA Triton risks, EDR bypass attacks, ransomware surge… and dozens more threats you need to know about.
🔗 Full roundup → https://thehackernews.com/2025/08/weekly-recap-badcam-attack-winrar-0-day.html
WinRAR flaws, NVIDIA Triton risks, EDR bypass attacks, ransomware surge… and dozens more threats you need to know about.
🔗 Full roundup → https://thehackernews.com/2025/08/weekly-recap-badcam-attack-winrar-0-day.html
👍10🤔4
🚨 Critical flaw in Erlang/OTP’s SSH (CVE-2025-32433) is being actively exploited — no credentials needed, full remote code execution possible.
Targets? Mostly OT networks — healthcare, agriculture, media, and high-tech sectors hit hardest.
Here’s why it’s a global threat ↓ https://thehackernews.com/2025/08/researchers-spot-surge-in-erlangotp-ssh.html
Targets? Mostly OT networks — healthcare, agriculture, media, and high-tech sectors hit hardest.
Here’s why it’s a global threat ↓ https://thehackernews.com/2025/08/researchers-spot-surge-in-erlangotp-ssh.html
🔥11👍4🤔4🤯2👏1
🚨 Police, military, and critical infrastructure radios worldwide are vulnerable — again.
Researchers just found new TETRA flaws letting attackers replay calls, brute-force “secure” comms, and inject fake voice/data — even on encrypted networks. No full fixes yet.
Here’s what’s at stake ↓ https://thehackernews.com/2025/08/new-tetra-radio-encryption-flaws-expose.html
Researchers just found new TETRA flaws letting attackers replay calls, brute-force “secure” comms, and inject fake voice/data — even on encrypted networks. No full fixes yet.
Here’s what’s at stake ↓ https://thehackernews.com/2025/08/new-tetra-radio-encryption-flaws-expose.html
🔥11🤔9👏4⚡3👍2😱2
🚨 WARNING: Dutch cyber watchdog confirms: a Citrix zero-day (CVE-2025-6543) was exploited for months before disclosure—hitting critical orgs, leaving hidden web shells, and erasing traces.
Patches are out. If you run NetScaler, act now.
Full story → https://thehackernews.com/2025/08/dutch-ncsc-confirms-active-exploitation.html
Patches are out. If you run NetScaler, act now.
Full story → https://thehackernews.com/2025/08/dutch-ncsc-confirms-active-exploitation.html
🤔7👍4😱2👏1😁1
New research by Pentera builds on Wiz’s IngressNightmare and reveals critical injection vulnerabilities in the widely used ingress-nginx Kubernetes controller.
Pentera’s team uncovered additional attack vectors that exploit common configuration oversights - going beyond the four originally disclosed CVEs. These newly discovered injection points can allow attackers to bypass security controls, execute arbitrary code, and pivot deeper into Kubernetes clusters.
👉 Join experts live on August 20 at 11:00 AM ET for a technical deep dive into the full scope of these vulnerabilities and their real-world impact: https://thn.news/IngressNightmare-webinar
Read the full research report 👉 https://thn.news/cyberattacks-explained
Pentera’s team uncovered additional attack vectors that exploit common configuration oversights - going beyond the four originally disclosed CVEs. These newly discovered injection points can allow attackers to bypass security controls, execute arbitrary code, and pivot deeper into Kubernetes clusters.
👉 Join experts live on August 20 at 11:00 AM ET for a technical deep dive into the full scope of these vulnerabilities and their real-world impact: https://thn.news/IngressNightmare-webinar
Read the full research report 👉 https://thn.news/cyberattacks-explained
👍7👏2🤔1
🇷🇺 New Threat: Curly COMrades hacked govt & energy networks in Georgia & Moldova — stealing credentials & hiding for months.
Their secret weapon? Hijacking Windows’ own components to run commands as SYSTEM… and no one notices.
Find details here → https://thehackernews.com/2025/08/new-curly-comrades-apt-using-ngen-com.html
Their secret weapon? Hijacking Windows’ own components to run commands as SYSTEM… and no one notices.
Find details here → https://thehackernews.com/2025/08/new-curly-comrades-apt-using-ngen-com.html
🤯11😁2🔥1👏1
Identity attacks are evolving, but are your IR playbooks keeping up? Join Push Security's Josh Gideon on August 13th & 14th as he dives into the new challenges facing incident responders in the cloud. Don't miss out on a step-by-step walkthrough of how security teams are using browser telemetry to supercharge their security investigations.
Register here: https://thn.news/identity-attacks-webinar-tg
Register here: https://thn.news/identity-attacks-webinar-tg
👍7
🚨 Your browser is now your biggest insider threat.
🤖 GenAI prompts
⚠️ Risky extensions
💻 Unmanaged devices
All leaking data in-session.
🥊 Enterprise Browser vs. Secure Extension — 9 brutal rounds.
Who wins? → https://thehackernews.com/2025/08/the-ultimate-battle-enterprise-browsers.html
🤖 GenAI prompts
⚠️ Risky extensions
💻 Unmanaged devices
All leaking data in-session.
🥊 Enterprise Browser vs. Secure Extension — 9 brutal rounds.
Who wins? → https://thehackernews.com/2025/08/the-ultimate-battle-enterprise-browsers.html
🤔14👍4👏2
⚠️ Two of the most dangerous hacker groups — ShinyHunters & Scattered Spider — are joining forces.
They’ve hit Salesforce users worldwide, and signs show their next big target: banks & financial firms.
Here’s why this alliance is bad news ↓ https://thehackernews.com/2025/08/cybercrime-groups-shinyhunters.html
They’ve hit Salesforce users worldwide, and signs show their next big target: banks & financial firms.
Here’s why this alliance is bad news ↓ https://thehackernews.com/2025/08/cybercrime-groups-shinyhunters.html
😁12🤯7🤔4👍2👏1
🚨 780+ malicious IPs just launched a coordinated brute-force attack on Fortinet SSL VPNs — shifting mid-campaign to hit FortiManager.
Researchers warn this pattern often precedes a new CVE disclosure within weeks.
Read → https://thehackernews.com/2025/08/fortinet-ssl-vpns-hit-by-global-brute.html
Researchers warn this pattern often precedes a new CVE disclosure within weeks.
Read → https://thehackernews.com/2025/08/fortinet-ssl-vpns-hit-by-global-brute.html
😁15🤔6⚡4🔥1
🚨 Over a year after the XZ Utils backdoor was exposed, 35 infected Docker images are still live on Docker Hub — some built on top of each other, quietly spreading the malware.
They can let attackers bypass SSH auth & run root commands.
Full story → https://thehackernews.com/2025/08/researchers-spot-xz-utils-backdoor-in.html
They can let attackers bypass SSH auth & run root commands.
Full story → https://thehackernews.com/2025/08/researchers-spot-xz-utils-backdoor-in.html
😱11😁9🤯5🔥2⚡1🤔1
🚨 New RANSOMWARE ALERT: “Charon” is hitting Middle East gov & aviation targets—using nation-state-level tactics to dodge defenses & lock files fast.
It mimics a China-linked APT, sideloads malicious DLLs, and even packs a driver to kill EDR (likely still in testing).
Read → https://thehackernews.com/2025/08/charon-ransomware-hits-middle-east.html
It mimics a China-linked APT, sideloads malicious DLLs, and even packs a driver to kill EDR (likely still in testing).
Read → https://thehackernews.com/2025/08/charon-ransomware-hits-middle-east.html
⚡10👍2🔥1🤔1
⚡ Microsoft patched 111 flaws — including a zero-day in Windows Kerberos that could let attackers seize entire Active Directory domains.
Some bugs score 10/10 severity. Others hit Azure OpenAI, Microsoft 365 Copilot, & Edge.
Read: https://thehackernews.com/2025/08/microsoft-august-2025-patch-tuesday.html
Some bugs score 10/10 severity. Others hit Azure OpenAI, Microsoft 365 Copilot, & Edge.
Read: https://thehackernews.com/2025/08/microsoft-august-2025-patch-tuesday.html
👍17⚡5👏3🔥1😁1
Your Salesforce scans aren’t telling you everything.
Automated tools show what’s already there.
Only human-led penetration testing shows what could happen — uncovering hidden attack paths your scanners miss.
Here’s why most teams remain exposed → https://thehackernews.com/expert-insights/2025/08/the-second-layer-of-salesforce-security.html
Automated tools show what’s already there.
Only human-led penetration testing shows what could happen — uncovering hidden attack paths your scanners miss.
Here’s why most teams remain exposed → https://thehackernews.com/expert-insights/2025/08/the-second-layer-of-salesforce-security.html
🔥6🤔2