🚨 Crypto users targeted in ultra-slick social engineering scam.
Hackers built dozens of fake AI/Web3 startups—complete with logos, blogs, and verified X accounts—to push malware disguised as investment tools.
The malware drains wallets on both Windows & macOS.
Details here → https://thehackernews.com/2025/07/fake-gaming-and-ai-firms-push-malware.html
Hackers built dozens of fake AI/Web3 startups—complete with logos, blogs, and verified X accounts—to push malware disguised as investment tools.
The malware drains wallets on both Windows & macOS.
Details here → https://thehackernews.com/2025/07/fake-gaming-and-ai-firms-push-malware.html
😱17🔥8👏3👍1
🚨 Critical flaw in AI tool mcp-remote lets hackers run OS commands just by connecting to a fake server.
Full system takeover possible on Windows. Over 437K downloads already.
Update now or risk remote hijack.
Details here → https://thehackernews.com/2025/07/critical-mcp-remote-vulnerability.html
Full system takeover possible on Windows. Over 437K downloads already.
Update now or risk remote hijack.
Details here → https://thehackernews.com/2025/07/critical-mcp-remote-vulnerability.html
😁16🔥7👍1
🚨 CISA confirms Citrix Bleed 2 is being exploited in the wild.
Attackers are stealing VPN sessions and leaking sensitive memory—some linked to ransomware crews.
The worst part? Citrix still hasn’t updated its advisory.
Read → https://thehackernews.com/2025/07/cisa-adds-citrix-netscaler-cve-2025.html
Attackers are stealing VPN sessions and leaking sensitive memory—some linked to ransomware crews.
The worst part? Citrix still hasn’t updated its advisory.
Read → https://thehackernews.com/2025/07/cisa-adds-citrix-netscaler-cve-2025.html
😁9👏7🤔4
🚨 Iran-backed ransomware is offering 80% profits to hackers targeting the U.S. and Israel.
Pay2Key.I2P is tied to Fox Kitten, built on I2P, and has pulled in $4M+.
A new front in cyberwarfare → https://thehackernews.com/2025/07/iranian-backed-pay2key-ransomware.html
Pay2Key.I2P is tied to Fox Kitten, built on I2P, and has pulled in $4M+.
A new front in cyberwarfare → https://thehackernews.com/2025/07/iranian-backed-pay2key-ransomware.html
🔥21🤔6😱4👏3
🚨 A critical bug in Wing FTP Server (CVE-2025-47812) is under active attack—RCE via null byte injection.
Hackers are exploiting it using anonymous FTP access to drop malware & run commands as root.
Over 5,000 servers still exposed. Patch now.
Details here → https://thehackernews.com/2025/07/critical-wing-ftp-server-vulnerability.html
Hackers are exploiting it using anonymous FTP access to drop malware & run commands as root.
Over 5,000 servers still exposed. Patch now.
Details here → https://thehackernews.com/2025/07/critical-wing-ftp-server-vulnerability.html
👍9🤯6
Master the Full Scope of Endpoint Investigations
Today’s threats span beyond the logs, it’s time your training did too.
TryHackMe’s new Advanced Endpoint Investigations path gives you hands-on experience across Windows, Linux, macOS, mobile, memory, disk, and file systems — all in one place.
🔍 Built for SOC & Incident Response teams to:
✔️ Investigate volatile and persistent evidence
✔️ Detect cross-platform attacker activity
✔️ Conduct deep investigations, not just triage
If you’re ready to go beyond alerts and lead every stage of the investigation — this is for you.
👉 Start your first investigation now! https://thn.news/advanced-endpoint-path
Today’s threats span beyond the logs, it’s time your training did too.
TryHackMe’s new Advanced Endpoint Investigations path gives you hands-on experience across Windows, Linux, macOS, mobile, memory, disk, and file systems — all in one place.
🔍 Built for SOC & Incident Response teams to:
✔️ Investigate volatile and persistent evidence
✔️ Detect cross-platform attacker activity
✔️ Conduct deep investigations, not just triage
If you’re ready to go beyond alerts and lead every stage of the investigation — this is for you.
👉 Start your first investigation now! https://thn.news/advanced-endpoint-path
🔥13🤔6
🚨 Hackers can hijack your car over Bluetooth.
New “PerfektBlue” flaws let attackers run remote code on Mercedes, VW & Skoda—just by pairing.
They can track location, record audio, and even reach engine controls.
Full story → https://thehackernews.com/2025/07/perfektblue-bluetooth-vulnerabilities.html
New “PerfektBlue” flaws let attackers run remote code on Mercedes, VW & Skoda—just by pairing.
They can track location, record audio, and even reach engine controls.
Full story → https://thehackernews.com/2025/07/perfektblue-bluetooth-vulnerabilities.html
🤔19😁15👍8🔥8🤯7👏4
🚨 A critical flaw in Fortinet’s FortiWeb lets unauthenticated attackers run SQL commands remotely (CVSS 9.6).
The bug? It blindly trusts tokens—letting attackers write to the file system.
Fix it now or risk real damage.
Read → https://thehackernews.com/2025/07/fortinet-releases-patch-for-critical.html
The bug? It blindly trusts tokens—letting attackers write to the file system.
Fix it now or risk real damage.
Read → https://thehackernews.com/2025/07/fortinet-releases-patch-for-critical.html
😁20🤔7
🚨 Over 1.2B risky transactions blocked.
AI tools like Copilot leaked SSNs. SaaS, email & file sharing aren’t far behind. The 2025 Data Risk Report shows just how exposed your enterprise data really is.
Read more → https://thehackernews.com/2025/07/securing-data-in-ai-era.html
AI tools like Copilot leaked SSNs. SaaS, email & file sharing aren’t far behind. The 2025 Data Risk Report shows just how exposed your enterprise data really is.
Read more → https://thehackernews.com/2025/07/securing-data-in-ai-era.html
🔥22👍4👏4
🚨 260K Laravel APP_KEYs exposed on GitHub — over 600 apps vulnerable, and ~120 at immediate risk of remote code execution.
With keys + URLs leaked, attackers can hijack servers via deserialization.
Most devs likely unaware.
Full story + what to do → https://thehackernews.com/2025/07/over-600-laravel-apps-exposed-to-remote.html
With keys + URLs leaked, attackers can hijack servers via deserialization.
Most devs likely unaware.
Full story + what to do → https://thehackernews.com/2025/07/over-600-laravel-apps-exposed-to-remote.html
🔥19👍3👏1
🚨 First-ever GPU RowHammer attack just hit NVIDIA.
Meet GPUHammer — A single bit flip drops AI accuracy from 80% to 0.1%. Even mitigations like TRR didn’t stop it.
Full details → https://thehackernews.com/2025/07/gpuhammer-new-rowhammer-attack-variant.html
Meet GPUHammer — A single bit flip drops AI accuracy from 80% to 0.1%. Even mitigations like TRR didn’t stop it.
Full details → https://thehackernews.com/2025/07/gpuhammer-new-rowhammer-attack-variant.html
😁23🤯14👏8👍7😱6🔥2🤔2
🚨 New eSIM hack lets attackers hijack mobile profiles & bypass carrier controls.
A flaw in Kigen’s eUICC tech allows malicious applets, stolen certificates, and full profile takeover—risking surveillance and stealth backdoors in billions of devices.
Details → https://thehackernews.com/2025/07/esim-vulnerability-in-kigens-euicc.html
A flaw in Kigen’s eUICC tech allows malicious applets, stolen certificates, and full profile takeover—risking surveillance and stealth backdoors in billions of devices.
Details → https://thehackernews.com/2025/07/esim-vulnerability-in-kigens-euicc.html
🔥18🤯8⚡5😁3👏1
🚨 Indian authorities just busted a Noida call center behind UK tech support scams worth £390,000.
The twist? Live scam calls were in progress during the raid—posing as Microsoft to exploit 100+ victims.
Full story → https://thehackernews.com/2025/07/cbi-shuts-down-390k-uk-tech-support.html
The twist? Live scam calls were in progress during the raid—posing as Microsoft to exploit 100+ victims.
Full story → https://thehackernews.com/2025/07/cbi-shuts-down-390k-uk-tech-support.html
👏23😱9🔥7👍2🤯1
⚡ Bluetooth car exploits. macOS backdoors. Ransomware returns. Arrests hit top cyber gangs.
This week, trusted tools turned toxic—and no one’s perimeter is safe.
Get the full intel in our latest recap →
https://thehackernews.com/2025/07/weekly-recap-scattered-spider-arrests.html
This week, trusted tools turned toxic—and no one’s perimeter is safe.
Get the full intel in our latest recap →
https://thehackernews.com/2025/07/weekly-recap-scattered-spider-arrests.html
🔥17🤔7👍3😁1
🚨 A fake CAPTCHA is all it takes.
Interlock ransomware is back—now pushing a stealthy PHP RAT via “FileFix,” a spin on ClickFix that hijacks File Explorer.
Targets? Everyone.
Tactics? Evolving fast.
Here’s what they’re hiding behind Cloudflare Tunnels ↓ https://thehackernews.com/2025/07/new-php-based-interlock-rat-variant.html
Interlock ransomware is back—now pushing a stealthy PHP RAT via “FileFix,” a spin on ClickFix that hijacks File Explorer.
Targets? Everyone.
Tactics? Evolving fast.
Here’s what they’re hiding behind Cloudflare Tunnels ↓ https://thehackernews.com/2025/07/new-php-based-interlock-rat-variant.html
😁11😱8
🚨 39 million secrets leaked on GitHub in 2024 alone.
Not just mistakes—these are entry points for attackers to breach your cloud, CI/CD, and data stores without triggering alerts.
Even a forgotten repo can cost everything.
Here’s how to stop it → https://thehackernews.com/2025/07/the-unusual-suspect-git-repos.html
Not just mistakes—these are entry points for attackers to breach your cloud, CI/CD, and data stores without triggering alerts.
Even a forgotten repo can cost everything.
Here’s how to stop it → https://thehackernews.com/2025/07/the-unusual-suspect-git-repos.html
🤯19⚡5🔥5👏4😁2🤔1
🚨 The bait? Fake coding assignments.
North Korean hackers pushed 67 new malware-laced npm packages—over 17K downloads already.
They’re now using a stealthier loader called XORIndex to hijack dev machines, steal crypto, and drop Python backdoors.
Read → https://thehackernews.com/2025/07/north-korean-hackers-flood-npm-registry.html
North Korean hackers pushed 67 new malware-laced npm packages—over 17K downloads already.
They’re now using a stealthier loader called XORIndex to hijack dev machines, steal crypto, and drop Python backdoors.
Read → https://thehackernews.com/2025/07/north-korean-hackers-flood-npm-registry.html
👍13🤯12🔥3👏1
🚨 AsyncRAT didn’t just survive—it multiplied.
Since its 2019 GitHub release, this open-source trojan has spawned a swarm of powerful variants like DCRat and Venom RAT—stealing webcams, logging keystrokes, evading antivirus, and more.
Details here → https://thehackernews.com/2025/07/asyncrats-open-source-code-sparks-surge.html
Since its 2019 GitHub release, this open-source trojan has spawned a swarm of powerful variants like DCRat and Venom RAT—stealing webcams, logging keystrokes, evading antivirus, and more.
Details here → https://thehackernews.com/2025/07/asyncrats-open-source-code-sparks-surge.html
🤔12
🚨 Sick of chasing meaningless vuln alerts?
Function-level runtime reachability shows only the code that's actually executing—no fluff, no false positives.
It’s like turning off the noise and seeing just the real threats.
Here’s why it changes everything ↓ https://thehackernews.com/expert-insights/2025/07/everything-to-know-about-runtime.html
Function-level runtime reachability shows only the code that's actually executing—no fluff, no false positives.
It’s like turning off the noise and seeing just the real threats.
Here’s why it changes everything ↓ https://thehackernews.com/expert-insights/2025/07/everything-to-know-about-runtime.html
🔥12
🚨 A new backdoor dubbed HazyBeacon is hitting Southeast Asian governments—hiding in plain sight using AWS Lambda.
It exfiltrates trade secrets via Google Drive and Dropbox.
State-backed. Stealthy. Still active.
Here’s what you need to know ↓ https://thehackernews.com/2025/07/state-backed-hazybeacon-malware-uses.html
It exfiltrates trade secrets via Google Drive and Dropbox.
State-backed. Stealthy. Still active.
Here’s what you need to know ↓ https://thehackernews.com/2025/07/state-backed-hazybeacon-malware-uses.html
😁10👏2🤔2🤯2👍1