🔥 China’s border police are using a secret tool called Massistant to extract everything—from GPS to Signal chats—off phones.
It installs silently, pulls your data, then vanishes. iPhones may be next.
Details here → https://thehackernews.com/2025/07/chinas-massistant-tool-secretly.html
It installs silently, pulls your data, then vanishes. iPhones may be next.
Details here → https://thehackernews.com/2025/07/chinas-massistant-tool-secretly.html
😱34🔥14👏7🤔7
🚨 Hackers are actively exploiting a critical flaw in CrushFTP (CVE-2025-54309, CVSS 9.0) to gain admin access via HTTPS—no DMZ needed.
They reverse engineered a patch and struck fast.
The worst part? Many systems are still exposed.
Details here → https://thehackernews.com/2025/07/hackers-exploit-critical-crushftp-flaw.html
They reverse engineered a patch and struck fast.
The worst part? Many systems are still exposed.
Details here → https://thehackernews.com/2025/07/hackers-exploit-critical-crushftp-flaw.html
👏14😁2
🚨 Hackers hijacked popular npm packages using phishing emails that mimicked npm support.
They published malware directly—no GitHub commits, no PRs.
One version tries to run a DLL for remote code execution.
Check if you’re affected ↓ https://thehackernews.com/2025/07/malware-injected-into-6-npm-packages.html
They published malware directly—no GitHub commits, no PRs.
One version tries to run a DLL for remote code execution.
Check if you’re affected ↓ https://thehackernews.com/2025/07/malware-injected-into-6-npm-packages.html
👍9👏3😁3🤔2
⚠️ A critical UNPATCHED zero-day in Microsoft SharePoint (CVE-2025-53770) is being massively exploited right now.
At least 75 orgs breached—including major companies and governments.
Here’s what you need to know ↓ https://thehackernews.com/2025/07/critical-microsoft-sharepoint-flaw.html
At least 75 orgs breached—including major companies and governments.
Here’s what you need to know ↓ https://thehackernews.com/2025/07/critical-microsoft-sharepoint-flaw.html
😁19😱9👍7🔥5
🚨 Web3 devs targeted with fake AI job interviews — to steal your crypto.
Hackers lure victims with sites like “Norlax AI,” then drop malware disguised as a Realtek audio driver.
One click = stolen wallets, credentials, and project data.
Read → https://thehackernews.com/2025/07/encrypthub-targets-web3-developers.html
Hackers lure victims with sites like “Norlax AI,” then drop malware disguised as a Realtek audio driver.
One click = stolen wallets, credentials, and project data.
Read → https://thehackernews.com/2025/07/encrypthub-targets-web3-developers.html
😁24🤯7🔥4🤔3👏1
🔥 ALERT ➟ Microsoft issues urgent security patches for critical SharePoint RCE flaw (CVE-2025-53770), now under active exploitation worldwide.
Hackers are bypassing MFA, stealing keys, and targeting banks, government agencies, hospitals & more.
Details → https://thehackernews.com/2025/07/microsoft-releases-urgent-patch-for.html
If your SharePoint is on-prem and internet-facing—assume compromise. Patching alone won’t evict the threat.
🛡️ Urgent steps: Patch, rotate machine keys, restart IIS.
Hackers are bypassing MFA, stealing keys, and targeting banks, government agencies, hospitals & more.
Details → https://thehackernews.com/2025/07/microsoft-releases-urgent-patch-for.html
If your SharePoint is on-prem and internet-facing—assume compromise. Patching alone won’t evict the threat.
🛡️ Urgent steps: Patch, rotate machine keys, restart IIS.
🔥17😁5
🚨 HPE Wi-Fi gear shipped with hardcoded admin logins.
CVE-2025-37103 scores 9.8/10—no password needed to hijack your network.
It can be chained with a second bug for full system takeover.
Full details → https://thehackernews.com/2025/07/hard-coded-credentials-found-in-hpe.html
CVE-2025-37103 scores 9.8/10—no password needed to hijack your network.
It can be chained with a second bug for full system takeover.
Full details → https://thehackernews.com/2025/07/hard-coded-credentials-found-in-hpe.html
🔥11😁8👍3🤯1
🚨 Over 3,500 websites hijacked to secretly mine crypto — just by visiting them.
The stealthy JavaScript miner hides in plain sight, adjusts intensity based on your device, and runs silently in the background.
It's linked to credit card theft too.
Read ↓ https://thehackernews.com/2025/07/3500-websites-hijacked-to-secretly-mine.html
The stealthy JavaScript miner hides in plain sight, adjusts intensity based on your device, and runs silently in the background.
It's linked to credit card theft too.
Read ↓ https://thehackernews.com/2025/07/3500-websites-hijacked-to-secretly-mine.html
👏9🔥4
🚨 Hackers are bypassing FIDO keys—without breaking them.
A new phishing trick fools users into scanning legit QR codes, handing attackers full access.
The worst part? It abuses a real cross-device sign-in feature.
How PoisonSeed pulls it off ↓ https://thehackernews.com/2025/07/poisonseed-hackers-bypass-fido-keys.html
A new phishing trick fools users into scanning legit QR codes, handing attackers full access.
The worst part? It abuses a real cross-device sign-in feature.
How PoisonSeed pulls it off ↓ https://thehackernews.com/2025/07/poisonseed-hackers-bypass-fido-keys.html
😁8🔥5🤯4
🚨 Over 80% of orgs are adopting Zero Trust by 2026—but AI is rewriting the playbook.
Predictive models block threats. Generative AI speeds triage. Agentic AI enforces policies autonomously.
The catch? Human oversight still makes or breaks security.
Learn more ↓ https://thehackernews.com/2025/07/assessing-role-of-ai-in-zero-trust.html
Predictive models block threats. Generative AI speeds triage. Agentic AI enforces policies autonomously.
The catch? Human oversight still makes or breaks security.
Learn more ↓ https://thehackernews.com/2025/07/assessing-role-of-ai-in-zero-trust.html
👍14
⚠️ Zero-days are hitting faster than teams can patch.
→ SharePoint & Chrome under active attack
→ Hackers exploit NVIDIA, SQLite, CrushFTP
→ $2.17B stolen in crypto so far this year
→ AI just stopped a real-world exploit before humans did
This week proves: No system is safe.
Full recap → https://thehackernews.com/2025/07/weekly-recap-sharepoint-0-day-chrome.html
→ SharePoint & Chrome under active attack
→ Hackers exploit NVIDIA, SQLite, CrushFTP
→ $2.17B stolen in crypto so far this year
→ AI just stopped a real-world exploit before humans did
This week proves: No system is safe.
Full recap → https://thehackernews.com/2025/07/weekly-recap-sharepoint-0-day-chrome.html
👏9👍6🔥3🤔2
60% of breaches in 2025 involved one common risk: humans handling passwords.
We may dream of a passwordless future, but today’s real fix is removing users from the login flow.
Here’s how teams are doing it—without waiting for full passkey adoption ↓ https://thehackernews.com/expert-insights/2025/07/how-to-go-passwordless-without-getting.html
We may dream of a passwordless future, but today’s real fix is removing users from the login flow.
Here’s how teams are doing it—without waiting for full passkey adoption ↓ https://thehackernews.com/expert-insights/2025/07/how-to-go-passwordless-without-getting.html
🔥10
🚨 China-linked APT41 breached African gov IT networks using internal SharePoint servers as C2.
The attack used stolen admin creds, DLL sideloading, and fake GitHub domains—marking rare APT41 activity in Africa.
Full details → https://thehackernews.com/2025/07/china-linked-hackers-launch-targeted.html
The attack used stolen admin creds, DLL sideloading, and fake GitHub domains—marking rare APT41 activity in Africa.
Full details → https://thehackernews.com/2025/07/china-linked-hackers-launch-targeted.html
👍17😁9
🚨 New Android spyware linked to Iran’s MOIS is posing as Starlink and VPN apps.
DCHSpy hijacks WhatsApp, mic, camera, files, and location—likely targeting dissidents post-Israel-Iran conflict.
Still spreading via Telegram.
Full report → https://thehackernews.com/2025/07/iran-linked-dchspy-android-malware.html
DCHSpy hijacks WhatsApp, mic, camera, files, and location—likely targeting dissidents post-Israel-Iran conflict.
Still spreading via Telegram.
Full report → https://thehackernews.com/2025/07/iran-linked-dchspy-android-malware.html
🤔16👍5👏1
🚨 SharePoint zero-day (CVE-2025-53770) exploited since July 7 — now hitting gov, telecom & tech sectors.
Hackers are stealing cryptographic keys to forge access even after patches are applied.
One group is linked to China.
The threat is real. Act fast → https://thehackernews.com/2025/07/hackers-exploit-sharepoint-zero-day.html
Hackers are stealing cryptographic keys to forge access even after patches are applied.
One group is linked to China.
The threat is real. Act fast → https://thehackernews.com/2025/07/hackers-exploit-sharepoint-zero-day.html
👏13🔥8👍4
🚨 Shadow AI is exploding inside your org—whether you see it or not.
Zscaler tracked 36x more AI traffic in 2024, with 800+ apps in use. Blocking isn’t working—employees are going around it.
The real risk? Your IP is training public models.
Here’s what to do instead ↓ https://thehackernews.com/expert-insights/2025/07/empower-users-and-protect-against-genai.html
Zscaler tracked 36x more AI traffic in 2024, with 800+ apps in use. Blocking isn’t working—employees are going around it.
The real risk? Your IP is training public models.
Here’s what to do instead ↓ https://thehackernews.com/expert-insights/2025/07/empower-users-and-protect-against-genai.html
😁14
Media is too big
VIEW IN TELEGRAM
If you're in cybersecurity, you've probably heard of CISSP All-in-One, The IDA Pro Book, or Gray Hat Hacking.
Now imagine learning directly from someone who co-authored the 4th and 5th edition of Gray Hat Hacking and has worked in global threat teams like Symantec, Mandiant, and Palo Alto Networks.
Hack Defender Academy is built for defenders who want to go deep — reverse real malware, follow shellcode injected in another process, dissect infostealers, intercept ransomware encryption key in memory, analyze .NET threats with WinDBG SOS plug-in, automate the deobfuscation with our unique tool NeZa and sharpen your skills by solving live Capture the Flag challenges.
💻1200+ min streaming
🏁CTF-based labs
🛠️Your own IDA Classroom License
Led by DanuX (Dan Regalado), a veteran reverse engineer and speaker at REcon, DEFCON, and RSA.
This is not a passive course. This is real-world training — for real defenders.
Start learning what truly matters at https://thn.news/hackdef-academy
Now imagine learning directly from someone who co-authored the 4th and 5th edition of Gray Hat Hacking and has worked in global threat teams like Symantec, Mandiant, and Palo Alto Networks.
Hack Defender Academy is built for defenders who want to go deep — reverse real malware, follow shellcode injected in another process, dissect infostealers, intercept ransomware encryption key in memory, analyze .NET threats with WinDBG SOS plug-in, automate the deobfuscation with our unique tool NeZa and sharpen your skills by solving live Capture the Flag challenges.
💻1200+ min streaming
🏁CTF-based labs
🛠️Your own IDA Classroom License
Led by DanuX (Dan Regalado), a veteran reverse engineer and speaker at REcon, DEFCON, and RSA.
This is not a passive course. This is real-world training — for real defenders.
Start learning what truly matters at https://thn.news/hackdef-academy
🔥12🤔7👏3😁1
🚨 Attackers are impersonating you—with AI.
From deepfakes to fake LinkedIn accounts, social engineering is now real-time and relentless.
Join cybersecurity leader Michael Coates and Doppel CEO Kevin Tian to learn how AI can fight back → https://thehacker.news/defeating-digital-deception?source=social
From deepfakes to fake LinkedIn accounts, social engineering is now real-time and relentless.
Join cybersecurity leader Michael Coates and Doppel CEO Kevin Tian to learn how AI can fight back → https://thehacker.news/defeating-digital-deception?source=social
🤔5🤯5⚡2👍1
🚨 Cisco ISE flaws are being exploited in the wild — no login needed, root access gained.
Hackers can remotely hijack enterprise networks through unauthenticated API and file upload bugs (CVSS 10.0).
Details & fixes → https://thehackernews.com/2025/07/cisco-confirms-active-exploits.html
Hackers can remotely hijack enterprise networks through unauthenticated API and file upload bugs (CVSS 10.0).
Details & fixes → https://thehackernews.com/2025/07/cisco-confirms-active-exploits.html
👏15⚡2🔥1
🚨 Want to become a CISO? Your SOC skills aren’t enough.
Automation is replacing ops. If you’re not building business, risk, and leadership skills now—you’ll be left behind.
Here’s how to make the leap from SOC to the boardroom ↓ https://thehackernews.com/2025/07/how-to-advance-from-soc-manager-to-ciso.html
Automation is replacing ops. If you’re not building business, risk, and leadership skills now—you’ll be left behind.
Here’s how to make the leap from SOC to the boardroom ↓ https://thehackernews.com/2025/07/how-to-advance-from-soc-manager-to-ciso.html
👍9😁5⚡2🔥2