๐จ Russia-linked hackers are now blurring the line between cybercrime and espionage.
TA829 & UNK_GreenSec are using identical tacticsโfake job lures, IPFS malware, REM Proxiesโto drop ransomware and spy tools.
Read details โ https://thehackernews.com/2025/07/ta829-and-unkgreensec-share-tactics-and.html
TA829 & UNK_GreenSec are using identical tacticsโfake job lures, IPFS malware, REM Proxiesโto drop ransomware and spy tools.
Read details โ https://thehackernews.com/2025/07/ta829-and-unkgreensec-share-tactics-and.html
๐17๐3๐ค3
๐จ Critical RCE flaw hits Anthropicโs AI dev tool.
Just visiting a malicious site could let hackers run code on your machine.
It targets localhostโusing a 19-year-old browser bug.
MCP Inspector < v0.14.1 is at risk.
Patch now โ https://thehackernews.com/2025/07/critical-vulnerability-in-anthropics.html
Just visiting a malicious site could let hackers run code on your machine.
It targets localhostโusing a 19-year-old browser bug.
MCP Inspector < v0.14.1 is at risk.
Patch now โ https://thehackernews.com/2025/07/critical-vulnerability-in-anthropics.html
๐9๐3๐ฅ2
๐จ Hackers are now using AI tools like Vercel's v0 to spin up fake login pagesโjust from text prompts.
Theyโre cloning trusted brands, hosting on legit platforms, and bypassing old phishing methods.
The AI phishing era is here.
Read details here โ https://thehackernews.com/2025/07/vercels-v0-ai-tool-weaponized-by.html
Theyโre cloning trusted brands, hosting on legit platforms, and bypassing old phishing methods.
The AI phishing era is here.
Read details here โ https://thehackernews.com/2025/07/vercels-v0-ai-tool-weaponized-by.html
๐14๐8๐ฅ5๐ฑ1
๐จ AI agents are leaking sensitive enterprise data โ and most orgs donโt even know it.
GenAI tools often connect to S3, SharePoint, Google Driveโฆ without proper controls.
The risk? Silent breaches.
Join the webinar on July 7 to learn how to secure your AI workflows โ https://thehacker.news/securing-ai-agents-workflows?source=social
GenAI tools often connect to S3, SharePoint, Google Driveโฆ without proper controls.
The risk? Silent breaches.
Join the webinar on July 7 to learn how to secure your AI workflows โ https://thehacker.news/securing-ai-agents-workflows?source=social
๐9๐1๐1
๐จ U.S. sanctions Russian hosting firm Aeza Group for fueling ransomware, data theft & drug trade.
Its CEO ran dark web drug markets. Its servers powered RomCom, RedLine, and Doppelganger ops.
This wasn't just hostingโit was cybercrime infrastructure.
READ โ https://thehackernews.com/2025/07/us-sanctions-russian-bulletproof.html
Its CEO ran dark web drug markets. Its servers powered RomCom, RedLine, and Doppelganger ops.
This wasn't just hostingโit was cybercrime infrastructure.
READ โ https://thehackernews.com/2025/07/us-sanctions-russian-bulletproof.html
๐ค9๐5๐คฏ5
๐จ Hackers now talk you into getting hacked.
PDF phishing emails impersonate Microsoft, PayPal, DocuSignโurging you to call fake support lines.
On the call, they steal your info or install malware.
FBI, Cisco, and Varonis warn: itโs rising fast.
Read how it works โ https://thehackernews.com/2025/07/hackers-using-pdfs-to-impersonate.html
PDF phishing emails impersonate Microsoft, PayPal, DocuSignโurging you to call fake support lines.
On the call, they steal your info or install malware.
FBI, Cisco, and Varonis warn: itโs rising fast.
Read how it works โ https://thehackernews.com/2025/07/hackers-using-pdfs-to-impersonate.html
๐13๐ค4๐คฏ4โก2
๐จ Nearly 80% of cyberattacks now look like normal user behavior.
EDR alone canโt see through itโand attackers know it.
The fix? Elite SOCs are layering in Network Detection & Response (NDR) to catch what endpoints miss.
Hereโs how it works โ https://thehackernews.com/2025/07/that-network-traffic-looks-legit-but-it.html
EDR alone canโt see through itโand attackers know it.
The fix? Elite SOCs are layering in Network Detection & Response (NDR) to catch what endpoints miss.
Hereโs how it works โ https://thehackernews.com/2025/07/that-network-traffic-looks-legit-but-it.html
๐7๐ค4๐ฅ2๐1
๐ Just dropped: the SAIL (Secure AI Lifecycle) Framework - open-source & free
Pillar Security teamed up with AI security leaders from companies like Google, Salesforce, and ServiceNow to create the first process-driven playbook for building and shipping secure AI applications.
๐ธ 7 development phases with actionable controls
๐ธ 70 + AI-specific risks and their mitigations
๐ธ Mapped to NIST AI RMF, ISO 42001, OWASP & DASF
๐ The framework is free and open to the community: https://thn.news/ai-security-sail-guide
Pillar Security teamed up with AI security leaders from companies like Google, Salesforce, and ServiceNow to create the first process-driven playbook for building and shipping secure AI applications.
๐ธ 7 development phases with actionable controls
๐ธ 70 + AI-specific risks and their mitigations
๐ธ Mapped to NIST AI RMF, ISO 42001, OWASP & DASF
๐ The framework is free and open to the community: https://thn.news/ai-security-sail-guide
๐9๐ฅ3๐1
๐จ North Korean hackers are targeting crypto firms, Mac users, and national security expertsโusing fake Zoom links, job sites, and research requests.
Theyโre spreading malware through Nim, AppleScript, PowerShell, even GitHub & Dropbox.
See how it works โ https://thehackernews.com/2025/07/north-korean-hackers-target-web3-with.html
Theyโre spreading malware through Nim, AppleScript, PowerShell, even GitHub & Dropbox.
See how it works โ https://thehackernews.com/2025/07/north-korean-hackers-target-web3-with.html
๐ค18๐คฏ7๐5๐ฅ2๐1
๐จ Cisco just patched a 10.0 CVSS flaw that let attackers log in as rootโno config needed.
The backdoor? A static dev credential left in production.
It affected all Unified CM v15.0.1 builds.
Full details โ https://thehackernews.com/2025/07/critical-cisco-vulnerability-in-unified.html
The backdoor? A static dev credential left in production.
It affected all Unified CM v15.0.1 builds.
Full details โ https://thehackernews.com/2025/07/critical-cisco-vulnerability-in-unified.html
๐17๐6๐คฏ3๐2๐ฅ2
๐จ Chinese hackers hit Franceโs critical sectors using 3 Ivanti zero-days โ and then patched them to keep others out.
Rootkits, web shells, and resale of access hint at a black-market cyber operation selling to state-linked buyers.
Find details here โ https://thehackernews.com/2025/07/chinese-hackers-exploit-ivanti-csa-zero.html
Rootkits, web shells, and resale of access hint at a black-market cyber operation selling to state-linked buyers.
Find details here โ https://thehackernews.com/2025/07/chinese-hackers-exploit-ivanti-csa-zero.html
๐17๐4๐ฑ4๐3๐ฅ2
๐จ 40+ fake crypto wallet extensions on Firefox were stealing usersโ keys and IPs โ in plain sight.
They cloned real wallets like MetaMask & Coinbase, faked 5-star reviews, and exfiltrated secrets to a remote server.
Full story โ https://thehackernews.com/2025/07/over-40-malicious-firefox-extensions.html
They cloned real wallets like MetaMask & Coinbase, faked 5-star reviews, and exfiltrated secrets to a remote server.
Full story โ https://thehackernews.com/2025/07/over-40-malicious-firefox-extensions.html
๐16๐คฏ9๐3โก2
๐จ DEVMAN is a new threat actor already claiming 40 victims across Asia, EU, LATAM, and Africa.
It's affiliated with Qilin, RansomHub, and DragonForce RaaS groups, targeting business and government.
Read technical analysis of the ransomware it uses on #ANYRUN's blog: https://thn.news/devman-ransomware-analysis-tg
It's affiliated with Qilin, RansomHub, and DragonForce RaaS groups, targeting business and government.
Read technical analysis of the ransomware it uses on #ANYRUN's blog: https://thn.news/devman-ransomware-analysis-tg
๐13๐6
๐จ Most AI SOC tools canโt triage new threats.
They rely on pre-trained models that only handle known attack typesโleaving your team exposed.
Radiantโs adaptive AI learns in real time, triages any alert, and cuts response time from days to minutes.
Details here โ https://thehackernews.com/2025/07/the-hidden-weaknesses-in-ai-soc-tools.html
They rely on pre-trained models that only handle known attack typesโleaving your team exposed.
Radiantโs adaptive AI learns in real time, triages any alert, and cuts response time from days to minutes.
Details here โ https://thehackernews.com/2025/07/the-hidden-weaknesses-in-ai-soc-tools.html
๐13๐4๐ค1
๐จ Android adware is spiraling out of control:
๐ธ 352 hidden apps faked icons, flooded 1.2B ad bids/day
๐ธ โEvil twinโ apps clone legit ones to hijack ad revenue
๐ธ NFC malware lets attackers withdraw cash remotely
๐ธ SMS stealers hit 100K phones, draining bank accounts
What you need to know โ https://thehackernews.com/2025/07/mobile-security-alert-352-iconads-fraud.html
๐ธ 352 hidden apps faked icons, flooded 1.2B ad bids/day
๐ธ โEvil twinโ apps clone legit ones to hijack ad revenue
๐ธ NFC malware lets attackers withdraw cash remotely
๐ธ SMS stealers hit 100K phones, draining bank accounts
What you need to know โ https://thehackernews.com/2025/07/mobile-security-alert-352-iconads-fraud.html
๐คฏ10๐7๐ฅ4๐2
โก Google just got hit with a $314M verdict โ for secretly using your mobile data while idle.
Phones sat still. It sent 900+ background transfers a day โ and you paid for it.
Details here โ https://thehackernews.com/2025/07/google-ordered-to-pay-314m-for-misusing.html
Phones sat still. It sent 900+ background transfers a day โ and you paid for it.
Details here โ https://thehackernews.com/2025/07/google-ordered-to-pay-314m-for-misusing.html
๐คฏ41๐12๐ฅ11๐4๐4๐ฑ1
๐จ Critical Sudo flaw lets any local user get root access on Linux.
No sudo rules required. Default configs are vulnerable.
Itโs been hiding in plain sightโsince 2013.
Fixes just dropped. Patch now.
Full details โ https://thehackernews.com/2025/07/critical-sudo-vulnerabilities-let-local.html
No sudo rules required. Default configs are vulnerable.
Itโs been hiding in plain sightโsince 2013.
Fixes just dropped. Patch now.
Full details โ https://thehackernews.com/2025/07/critical-sudo-vulnerabilities-let-local.html
๐26๐คฏ10โก9๐ค6๐1
๐จ New APT group โNightEagleโ is hacking Microsoft Exchange with stealthy tools and unpatched exploits.
Targets? Chinaโs AI, military, and quantum tech sectors.
Activity aligns with North American time zones.
Hereโs whatโs known so far โ https://thehackernews.com/2025/07/nighteagle-apt-exploits-microsoft.html
Targets? Chinaโs AI, military, and quantum tech sectors.
Activity aligns with North American time zones.
Hereโs whatโs known so far โ https://thehackernews.com/2025/07/nighteagle-apt-exploits-microsoft.html
๐ฅ13๐5๐คฏ4๐1
๐จ AI agents are leaking sensitive data โ quietly, constantly, and inside your trusted tools.
Donโt wait for a breach.
Join the free webinar to secure your GenAI workflows โ https://thehackernews.com/2025/07/your-ai-agents-might-be-leaking-data.html
Donโt wait for a breach.
Join the free webinar to secure your GenAI workflows โ https://thehackernews.com/2025/07/your-ai-agents-might-be-leaking-data.html
๐ค16๐2
๐จ 1,500+ malicious IPs are scanning for exposed Java debug ports right now.
Hackers are using misconfigured JDWP to hijack CI/CD tools like TeamCity, dropping stealth crypto miners.
Worse? They're hiding wallets, killing rival payloads, and mimicking system processes.
Hereโs how it works โ https://thehackernews.com/2025/07/alert-exposed-jdwp-interfaces-lead-to.html
Hackers are using misconfigured JDWP to hijack CI/CD tools like TeamCity, dropping stealth crypto miners.
Worse? They're hiding wallets, killing rival payloads, and mimicking system processes.
Hereโs how it works โ https://thehackernews.com/2025/07/alert-exposed-jdwp-interfaces-lead-to.html
๐12๐ฅ5๐2