The Hacker News
151K subscribers
1.85K photos
10 videos
3 files
7.77K links
Official THN Telegram Channel — A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

📨 Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
🚨 Active Exploit Alert → A critical FortiSIEM flaw (CVSS 9.8) lets attackers run code without logging in — and hackers are already using it.

No clear signs if you’ve been hit. Update now or risk silent compromise.

Full details → https://thehackernews.com/2025/08/fortinet-warns-about-fortisiem.html
👏134😁2
Advance your skills in strategic security design with Georgetown’s Online Certificate in Cybersecurity Strategy.

Learn more → https://thn.news/cybersecurity-strategy-gt-ig
5
🚨 Critical flaws just hit Zoom & Xerox.

One lets attackers hijack Windows Zoom clients (CVSS 9.6).

Another in Xerox FreeFlow Core (CVSS 9.8) could give full remote control—easy to exploit.

PATCH NOW / Details → https://thehackernews.com/2025/08/zoom-and-xerox-release-critical.html
🤯10😁42
🤖 AI is taking over the SOC grind.

Gartner just named AI SOC agents the next big thing—slashing false positives, spotting gaps, and investigating threats in minutes.

But when it comes to the toughest calls? Humans still decide.

Read how it’s changing security → https://thehackernews.com/2025/08/ai-soc-101-key-capabilities-security.html
👍8🔥3
New Malware Alert: A stealthy threat called PS1Bot is hiding in online ads—stealing passwords, crypto wallets, and screenshots—while leaving almost no trace.

It’s already active worldwide.

Here’s how it works (and how to spot it) → https://thehackernews.com/2025/08/new-ps1bot-malware-campaign-uses.html
🔥13👏41
🚨 CISA warns: Hackers are actively exploiting 2 new flaws in N-able’s N-central — the RMM tool used by countless MSPs to control client systems.

Both bugs allow command execution if exploited. Patch by Aug 20 or risk takeover.

Full story → https://thehackernews.com/2025/08/cisa-adds-two-n-able-n-central-flaws-to.html
🔥9🤔1
Google now requires crypto app developers in the US, UK, EU & 12 more regions to get official licenses before hitting Play Store.

Non-compliance? Apps pulled.

Learn more about this crackdown → https://thehackernews.com/2025/08/google-requires-crypto-app-licenses-in.html
🔥20🤔43👏2😱2👍1
🛑 Your bank card. Your calls. Your phone — all in a cybercriminals' hands.

💳 PhantomCard – NFC trojan that clones your bank card & spends like it’s theirs.
📞 SpyBanker – Steals banking data & hijacks calls in India.
⚙️ KernelSU exploits – Full control of rooted Android devices.

How they work & how to stop them → https://thehackernews.com/2025/08/new-android-malware-wave-hits-banking.html
🔥22
🔒🚫 Stop hackers before they even knock.

Turn on MFA everywhere. Block every unknown app. Lock risky tools in a digital cage.

This “security by default” playbook slams the door on ransomware & phishing.

See how it works → https://thehackernews.com/2025/08/simple-steps-for-attack-surface.html
👍124
Media is too big
VIEW IN TELEGRAM
The City of Hamilton’s multi-million dollar cybersecurity insurance claim was recently denied following a ransomware attack in 2024. Why? Because MFA wasn’t fully implemented at the time of the attack.

Find and fix MFA gaps with Push Security to avoid claim denial 👉 https://thn.news/stop-identity-attacks-others
😁10👏3👍2🤯1
Japan’s cyber watchdog caught hackers using CrossC2—a Cobalt Strike spin-off that hijacks Linux, macOS, and Windows—to breach networks across multiple countries.

They loaded custom malware entirely in memory—and may be tied to Black Basta ransomware crews.

Details → https://thehackernews.com/2025/08/researchers-warn-crossc2-expands-cobalt.html
🔥153👍3
🔥🏚 That “test server” you forgot about?

It’s still online. And waving at attackers 👋

EASM finds those ghost assets. DRP catches your name on the dark web.

Together, they’re the digital “Did I leave the oven on?” check—before the house burns down.

🛡 Read before something starts smoking → https://thehackernews.com/2025/08/have-you-turned-off-your-virtual-oven.html
😁11
🚨 New HTTP/2 flaw can crash major servers.

“MadeYouReset” bypasses Rapid Reset protections—letting attackers flood Apache Tomcat, F5 BIG-IP & more with thousands of requests, taking sites offline.

Here’s how it works → https://thehackernews.com/2025/08/new-http2-madeyoureset-vulnerability.html
🔥12👏6👍1
🚨 CVSS 10.0 flaw in Cisco Secure Firewall could let attackers run commands with high privilege — no login needed.

The catch? Just RADIUS auth enabled is enough. No workarounds. Patch now.

Full details → https://thehackernews.com/2025/08/cisco-warns-of-cvss-100-fmc-radius-flaw.html
🤯22😁7🤔2👍1
🚨 The US just hit Russian crypto exchange Garantex—and its rebrand Grinex—with new sanctions.

They’ve allegedly laundered $100M+ for ransomware gangs since 2019, moving billions via a ruble-backed stablecoin.

$5M bounty now on a co-founder’s head.

Details → https://thehackernews.com/2025/08/us-sanctions-garantex-and-grinex-over.html
🔥18👍6🤔5👏1
AI isn’t just keeping your data. It’s deciding what to tell you, what to hide, and who else gets to know.

When your AI agent starts shaping your reality, “privacy” stops meaning what you think it does.

Here’s why Zero Trust now applies to minds—human and machine ↓ https://thehackernews.com/2025/08/zero-trust-ai-privacy-in-age-of-agentic.html
👍19🔥1
Chinese hackers are burrowing into Taiwan’s web infrastructure — using custom open-source tools to stay hidden for years.

They’re exploiting unpatched servers, planting stealth VPNs, and launching Cobalt Strike for full control.

Here’s how the campaign works → https://thehackernews.com/2025/08/taiwan-web-servers-breached-by-uat-7237.html
👍15😱5🔥4🤯3👏2😁1
👨‍💻 Hackers are abusing a Windows flaw (CVE-2025-26633) to drop malware—masquerading as IT staff on Microsoft Teams and tricking users with rogue MSC files.

The group? EncryptHub, a Russian crew blending social engineering with zero-days.

Details → https://thehackernews.com/2025/08/russian-group-encrypthub-exploits-msc.html
12😱9👍5🔥3😁2
🚨 The ERMAC V3.0 Android banking trojan just had its entire source code leaked—backend, panels, builder, exfil servers.

It still targets 700+ apps, from banking to crypto, and even ships with default creds.

Read ↓ https://thehackernews.com/2025/08/ermac-v30-banking-trojan-source-code.html
🤯24😁5👍32🔥2
20% of breaches in 2025 started with unpatched software.

And patch management? It’s broken.

With SaaS sprawl + BYOD, IT teams can’t keep up. Shadow apps and personal devices are a hacker’s dream.

Here’s what needs to change ↓ https://thehackernews.com/expert-insights/2025/08/why-traditional-approaches-to-patch.html
👏8🔥3👍2
🚨 New supply-chain attacks hit open-source repos.

• PyPI: termncolor & colorinal delivered multi-stage malware with Windows & Linux backdoors.

• npm: fake packages posed as dev tools & job tests, stealing iCloud Keychain, browser data, wallets.

Details → https://thehackernews.com/2025/08/malicious-pypi-and-npm-packages.html
🤯9😁4👍2