🚨 SysAid flaw lets hackers hijack admin accounts — CISA confirms active attacks.
Attackers are exploiting two critical bugs (CVSS 9.3) to steal data & possibly execute code.
Patches are out. Deadline: Aug 12.
Full details → https://thehackernews.com/2025/07/cisa-warns-sysaid-flaws-under-active.html
Attackers are exploiting two critical bugs (CVSS 9.3) to steal data & possibly execute code.
Patches are out. Deadline: Aug 12.
Full details → https://thehackernews.com/2025/07/cisa-warns-sysaid-flaws-under-active.html
👏6👍2⚡1
🚨 Google just launched OSS Rebuild—a powerful weapon against open-source supply chain attacks.
It rebuilds & verifies packages independently, catching tampered code others miss.
No extra work for maintainers.
Full details ↓ https://thehackernews.com/2025/07/google-launches-oss-rebuild-to-expose.html
It rebuilds & verifies packages independently, catching tampered code others miss.
No extra work for maintainers.
Full details ↓ https://thehackernews.com/2025/07/google-launches-oss-rebuild-to-expose.html
👍21🔥6🤔5👏4
🚨 Most “critical” CVEs aren’t even exploitable in your app.
Security teams are drowning in false positives—because most scanners ignore whether the vulnerable function actually runs.
Function-level runtime reachability changes everything.
Here’s what it gets right ↓ https://thehackernews.com/expert-insights/2025/07/everything-to-know-about-runtime.html
Security teams are drowning in false positives—because most scanners ignore whether the vulnerable function actually runs.
Function-level runtime reachability changes everything.
Here’s what it gets right ↓ https://thehackernews.com/expert-insights/2025/07/everything-to-know-about-runtime.html
👍13🤔4
Overexposed to risk with public images?
Get ActiveState's free secure containers—rebuilt, scanned, and now on Docker Hub.
🛡️ Cut out CVEs and patching hassle. Just pull, trust, and deploy: https://thn.news/activestate-dockerhuby
Get ActiveState's free secure containers—rebuilt, scanned, and now on Docker Hub.
🛡️ Cut out CVEs and patching hassle. Just pull, trust, and deploy: https://thn.news/activestate-dockerhuby
👍9
Media is too big
VIEW IN TELEGRAM
Vegas, neon & next-level security insights. Don’t miss @BeyondTrust at #BHUSA.
Find their award-winning Outfitters booth at #5024, navigate the cybersecurity wilderness and take a free identity security risk assessment to mitigate dangers.
Register here ➡️ https://thn.news/bh-americas-2025
Find their award-winning Outfitters booth at #5024, navigate the cybersecurity wilderness and take a free identity security risk assessment to mitigate dangers.
Register here ➡️ https://thn.news/bh-americas-2025
👍7
🚨 This Windows trojan just became the first to weaponize Microsoft’s accessibility tools.
The Coyote malware is stealing banking and crypto logins from 75+ institutions—by reading what’s on your screen.
Here’s how it works → https://thehackernews.com/2025/07/new-coyote-malware-variant-exploits.html
The Coyote malware is stealing banking and crypto logins from 75+ institutions—by reading what’s on your screen.
Here’s how it works → https://thehackernews.com/2025/07/new-coyote-malware-variant-exploits.html
🤯20👏3😁3👍2
🚨 Most Kerberoasting attacks still bypass detection—despite being a 10+ year-old threat.
Why? Legacy tools miss subtle, low-and-slow attacks.
@BeyondTrust just built a statistical model that spots what rules-based tools can’t—with fewer false positives.
How it works ↓ https://thehackernews.com/2025/07/kerberoasting-detections-new-approach.html
Why? Legacy tools miss subtle, low-and-slow attacks.
@BeyondTrust just built a statistical model that spots what rules-based tools can’t—with fewer false positives.
How it works ↓ https://thehackernews.com/2025/07/kerberoasting-detections-new-approach.html
🔥8😁6👍3
A hacker group just pivoted from Craft CMS to Magento & Docker—using real pentest tools to hide malware in-memory.
Even if you stop their crypto miner, they still profit off your bandwidth.
Here’s how it works ↓ https://thehackernews.com/2025/07/threat-actor-mimo-targets-magento-and.html
Even if you stop their crypto miner, they still profit off your bandwidth.
Here’s how it works ↓ https://thehackernews.com/2025/07/threat-actor-mimo-targets-magento-and.html
🔥16👏4😁4🤔4⚡2
🚨 Hackers are hijacking WordPress sites with a backdoor hidden in plain sight—inside mu-plugins.
It gives them full admin access, evades detection, and locks out real users.
It looks like a legit plugin—and it auto-activates.
Here’s how it works + how to stop it ↓ https://thehackernews.com/2025/07/hackers-deploy-stealth-backdoor-in.html
It gives them full admin access, evades detection, and locks out real users.
It looks like a legit plugin—and it auto-activates.
Here’s how it works + how to stop it ↓ https://thehackernews.com/2025/07/hackers-deploy-stealth-backdoor-in.html
😁15👍9😱2🔥1
🚨 Europol just took down XSS — a top Russian-speaking cybercrime forum with 50,000+ users.
Its admin made €7M running it like a darknet eBay for stolen data and hacking tools.
He’s now in custody after a raid in Kyiv.
Full story → https://thehackernews.com/2025/07/europol-arrests-xss-forum-admin-in-kyiv.html
Its admin made €7M running it like a darknet eBay for stolen data and hacking tools.
He’s now in custody after a raid in Kyiv.
Full story → https://thehackernews.com/2025/07/europol-arrests-xss-forum-admin-in-kyiv.html
😁27🤯13👍12😱8👏2🔥1🤔1
🚨 ALERT: China-linked hackers are exploiting unpatched SharePoint servers to drop Warlock ransomware.
They’re using legit tools like PsExec, Mimikatz & IIS hijacking to stay hidden.
Even patching may not kick them out.
Full story → https://thehackernews.com/2025/07/storm-2603-exploits-sharepoint-flaws-to.html
They’re using legit tools like PsExec, Mimikatz & IIS hijacking to stay hidden.
Even patching may not kick them out.
Full story → https://thehackernews.com/2025/07/storm-2603-exploits-sharepoint-flaws-to.html
🤯12👍4😁2😱2
🚨 Chinese hackers hijacked a Dalai Lama birthday tribute site to spy on Tibetans.
Victims downloaded a fake encrypted chat app—actually a backdoored version of Element laced with Gh0st RAT.
It stole IPs, keystrokes, and even webcam feeds.
Details → https://thehackernews.com/2025/07/china-based-apts-deploy-fake-dalai-lama.html
Victims downloaded a fake encrypted chat app—actually a backdoored version of Element laced with Gh0st RAT.
It stole IPs, keystrokes, and even webcam feeds.
Details → https://thehackernews.com/2025/07/china-based-apts-deploy-fake-dalai-lama.html
🤔13😱7🤯1
🚨 81% faster gap mitigation. 50% fewer critical vulns.
Annual pentests can’t keep up—your defenses change daily, and so do attackers.
It’s time to stop playing defense once a year. Build an Offensive SOC that hunts 24/7.
Learn How →
https://thehackernews.com/2025/07/pentests-once-year-nope-its-time-to.html
Annual pentests can’t keep up—your defenses change daily, and so do attackers.
It’s time to stop playing defense once a year. Build an Offensive SOC that hunts 24/7.
Learn How →
https://thehackernews.com/2025/07/pentests-once-year-nope-its-time-to.html
👍12👏5
Manual IAM processes slow down IT and introduce risk.
In this upcoming webinar, join Black Rifle Coffee Company and Tines for practical advice on automating identity lifecycles, reducing tickets, and enforcing least privilege – fast.
Watch now: https://thn.news/black-rifle-coffee-iam-2
In this upcoming webinar, join Black Rifle Coffee Company and Tines for practical advice on automating identity lifecycles, reducing tickets, and enforcing least privilege – fast.
Watch now: https://thn.news/black-rifle-coffee-iam-2
🤔4
🔥 AI is rewriting the rules of customer identity — and users are pushing back.
From smoother logins to rising fraud threats, what used to work won’t cut it in 2025.
This free webinar breaks it all down → https://thehackernews.com/2025/07/watch-this-webinar-to-uncover-hidden.html
Don’t fall behind. Here’s what to expect ↓
From smoother logins to rising fraud threats, what used to work won’t cut it in 2025.
This free webinar breaks it all down → https://thehackernews.com/2025/07/watch-this-webinar-to-uncover-hidden.html
Don’t fall behind. Here’s what to expect ↓
😁6
🚨 Sophos & SonicWall just patched critical RCE flaws—some pre-auth, CVSS 9.8.
One bug affects devices even after patching (via upgrade path). Another was used to plant a backdoor.
Here’s what defenders need to know ↓ https://thehackernews.com/2025/07/sophos-and-sonicwall-patch-critical-rce.html
One bug affects devices even after patching (via upgrade path). Another was used to plant a backdoor.
Here’s what defenders need to know ↓ https://thehackernews.com/2025/07/sophos-and-sonicwall-patch-critical-rce.html
🤔9
🚨 New malware CastleLoader is hijacking systems through fake GitHub repos and phishing sites—469 confirmed infections.
It spreads stealers and RATs, uses PowerShell, and mimics trusted dev tools.
It’s stealthy. It’s spreading.
Here’s how it works ↓ https://thehackernews.com/2025/07/castleloader-malware-infects-469.html
It spreads stealers and RATs, uses PowerShell, and mimics trusted dev tools.
It’s stealthy. It’s spreading.
Here’s how it works ↓ https://thehackernews.com/2025/07/castleloader-malware-infects-469.html
🔥8⚡3
⚠️ A China-linked group breached VMware ESXi & vCenter in a stealthy, years-long cyberespionage campaign.
They killed logs, mimicked forensic tools—and stayed hidden for years.
Most orgs still can’t detect it.
Full report → https://thehackernews.com/2025/07/fire-ant-exploits-vmware-flaw-to.html
They killed logs, mimicked forensic tools—and stayed hidden for years.
Most orgs still can’t detect it.
Full report → https://thehackernews.com/2025/07/fire-ant-exploits-vmware-flaw-to.html
🔥13😱2⚡1
☠️ WARNING: A critical auth bypass flaw in Mitel MiVoice MX-ONE (CVSS 9.4) lets attackers hijack user and admin accounts—no login needed.
It affects versions still widely in use.
Details + fixes → https://thehackernews.com/2025/07/critical-mitel-flaw-lets-hackers-bypass.html
Patch now or risk full compromise.
It affects versions still widely in use.
Details + fixes → https://thehackernews.com/2025/07/critical-mitel-flaw-lets-hackers-bypass.html
Patch now or risk full compromise.
😁17
🔐 AI logins are breaking trust—73% of users say one bad experience, and they’re gone.
Want to keep them?
Learn how top brands are using smart, secure CIAM to win loyalty in the AI era.
Webinar spots are limited → https://thehacker.news/ai-customer-identity
Want to keep them?
Learn how top brands are using smart, secure CIAM to win loyalty in the AI era.
Webinar spots are limited → https://thehacker.news/ai-customer-identity
👏9👍1😁1