🚨 AI-powered vibe coding platform Base44 had a critical flaw: anyone with a public app_id could bypass SSO and access private apps—no auth required.
Wix patched it fast, but it exposes serious risks in AI dev platforms.
Full story → https://thehackernews.com/2025/07/wiz-uncovers-critical-access-bypass.html
Wix patched it fast, but it exposes serious risks in AI dev platforms.
Full story → https://thehackernews.com/2025/07/wiz-uncovers-critical-access-bypass.html
😁13🤯7⚡3
🚨 The browser is now the front line of cyber attacks.
Phishing, infostealers & token hijacking are bypassing MFA, targeting SaaS logins, and owning orgs — all in the browser.
Identity is the prize. And most teams aren’t watching.
Here’s why it matters ↓ https://thehackernews.com/2025/07/how-browser-became-main-cyber.html
Phishing, infostealers & token hijacking are bypassing MFA, targeting SaaS logins, and owning orgs — all in the browser.
Identity is the prize. And most teams aren’t watching.
Here’s why it matters ↓ https://thehackernews.com/2025/07/how-browser-became-main-cyber.html
🤯14🔥4😁1
⚡ Scattered Spider hacker group just went quiet—but don’t exhale yet.
After UK arrests, Mandiant says the group’s intrusions have stopped.
But copycats are already using their same ruthless tactics.
Now’s the moment to harden your defenses.
Read - https://thehackernews.com/2025/07/scattered-spider-hacker-arrests-halt.html
After UK arrests, Mandiant says the group’s intrusions have stopped.
But copycats are already using their same ruthless tactics.
Now’s the moment to harden your defenses.
Read - https://thehackernews.com/2025/07/scattered-spider-hacker-arrests-halt.html
👏11👍3
A critical SAP flaw just gave hackers remote access to a U.S. chemicals company.
They deployed Auto-Color—stealthy Linux malware that hides itself when it can’t reach its C2 server.
Details you need to know ↓ https://thehackernews.com/2025/07/hackers-exploit-sap-vulnerability-to.html
They deployed Auto-Color—stealthy Linux malware that hides itself when it can’t reach its C2 server.
Details you need to know ↓ https://thehackernews.com/2025/07/hackers-exploit-sap-vulnerability-to.html
🔥17😁2
🚨 Most ransomware attacks don’t hack in—they log in.
EDR alone can’t stop attackers using legit credentials.
The fix? Pair it with Endpoint Privilege Management (EPM) to shut down stealthy privilege abuse before it starts.
Here’s why both are critical ↓ https://thehackernews.com/expert-insights/2025/07/edr-detects-epm-prevents-why-using-both.html
EDR alone can’t stop attackers using legit credentials.
The fix? Pair it with Endpoint Privilege Management (EPM) to shut down stealthy privilege abuse before it starts.
Here’s why both are critical ↓ https://thehackernews.com/expert-insights/2025/07/edr-detects-epm-prevents-why-using-both.html
👏13🤔3
🚨 Google just fired a double shot at cyber threats:
➟ DBSC is now in open beta — it locks session cookies to your device, stopping attackers from hijacking logins.
➟ Project Zero goes public with unpatched bug reports to pressure faster fixes.
Big moves to end cookie theft & shrink patch gaps.
Details here ↓ https://thehackernews.com/2025/07/google-launches-dbsc-open-beta-in.html
➟ DBSC is now in open beta — it locks session cookies to your device, stopping attackers from hijacking logins.
➟ Project Zero goes public with unpatched bug reports to pressure faster fixes.
Big moves to end cookie theft & shrink patch gaps.
Details here ↓ https://thehackernews.com/2025/07/google-launches-dbsc-open-beta-in.html
🔥16👏5👍3🤔1
🚨 Apple just patched a zero-day used in the wild — tied to a Chrome exploit.
The bug let attackers break out of the browser sandbox using a malicious web page.
iPhones, Macs, iPads, and more were at risk. Update now.
Details here → https://thehackernews.com/2025/07/apple-patches-safari-vulnerability-also.html
The bug let attackers break out of the browser sandbox using a malicious web page.
iPhones, Macs, iPads, and more were at risk. Update now.
Details here → https://thehackernews.com/2025/07/apple-patches-safari-vulnerability-also.html
🔥9👍5😁2
🚨 Critical flaws in Dahua smart cameras let attackers take full remote control—no login needed.
Used in homes, stores, and casinos, these bugs allow root access, persistent malware, and no easy fix.
Exposed devices are still at risk.
Full details → https://thehackernews.com/2025/07/critical-dahua-camera-flaws-enable.html
Used in homes, stores, and casinos, these bugs allow root access, persistent malware, and no easy fix.
Exposed devices are still at risk.
Full details → https://thehackernews.com/2025/07/critical-dahua-camera-flaws-enable.html
😁16👍5🤔1
🚨 Your AI agent might already be vulnerable.
Pillar Security just launched a full-lifecycle AI defense platform—built by ex-offensive and defensive cyber ops—to catch threats before code is even written.
From threat modeling to runtime guardrails, this flips AI security on its head.
Full story → https://thehackernews.com/2025/07/product-walkthrough-look-inside-pillars.html
Pillar Security just launched a full-lifecycle AI defense platform—built by ex-offensive and defensive cyber ops—to catch threats before code is even written.
From threat modeling to runtime guardrails, this flips AI security on its head.
Full story → https://thehackernews.com/2025/07/product-walkthrough-look-inside-pillars.html
😁8👍2🤔1
Custom containers, zero headaches.
ActiveState builds and scans your stack from OS to app—SBOM, low-to-no CVEs, ready for your CI/CD. Own your security. Stop inheriting risk.
Customize Your Container → https://thn.news/activestate-container-security
#DevSecOps #OpenSourceSecurity
ActiveState builds and scans your stack from OS to app—SBOM, low-to-no CVEs, ready for your CI/CD. Own your security. Stop inheriting risk.
Customize Your Container → https://thn.news/activestate-container-security
#DevSecOps #OpenSourceSecurity
👏6
🔥 A free decryptor just landed for FunkSec ransomware — 172 victims hit across tech, gov, and education can now get their files back.
Built with AI. Written in Rust. Broken by rookies.
Get the tool + full story ↓ https://thehackernews.com/2025/07/funksec-ransomware-decryptor-released.html
Built with AI. Written in Rust. Broken by rookies.
Get the tool + full story ↓ https://thehackernews.com/2025/07/funksec-ransomware-decryptor-released.html
👏11🤯7😁1
🚨 Thousands tricked by fake crypto apps via Facebook ads.
They install a stealthy new malware—JSCEAL—that hijacks wallets, steals passwords in real-time, and evades most detection tools.
Worse? It's still active.
Here’s how it works (and how to avoid it) ↓ https://thehackernews.com/2025/07/hackers-use-facebook-ads-to-spread.html
They install a stealthy new malware—JSCEAL—that hijacks wallets, steals passwords in real-time, and evades most detection tools.
Worse? It's still active.
Here’s how it works (and how to avoid it) ↓ https://thehackernews.com/2025/07/hackers-use-facebook-ads-to-spread.html
😁15🔥3👏3
🚨 120,000+ attacks in the wild.
Hackers are exploiting a critical bug (CVSS 9.8) in a popular WordPress theme to hijack sites—no login needed.
They’re planting PHP backdoors and rogue admin accounts.
Details here → https://thehackernews.com/2025/07/hackers-exploit-critical-wordpress.html
Hackers are exploiting a critical bug (CVSS 9.8) in a popular WordPress theme to hijack sites—no login needed.
They’re planting PHP backdoors and rogue admin accounts.
Details here → https://thehackernews.com/2025/07/hackers-exploit-critical-wordpress.html
👍12🤯6🔥3👏3
🔥 A hacker gang planted a 4G Raspberry Pi inside a bank’s ATM network—bypassing firewalls to install a rootkit called CAKETAP.
It spoofed PIN checks, hid processes, and aimed to trigger fraudulent withdrawals.
Details you should know ↓ https://thehackernews.com/2025/07/unc2891-breaches-atm-network-via-4g.html
It spoofed PIN checks, hid processes, and aimed to trigger fraudulent withdrawals.
Details you should know ↓ https://thehackernews.com/2025/07/unc2891-breaches-atm-network-via-4g.html
👏16👍7🔥6
🚨 SIEMs are failing the modern SOC.
🔹 Log overload is flooding analysts with noise
🔹 SaaS SIEMs spike costs during attacks
🔹 30% of analyst time is lost to false positives
A new model is rising: metadata, behavior, and real-time detection.
Here's what’s replacing it ↓ https://thehackernews.com/2025/07/alert-fatigue-data-overload-and-fall-of.html
🔹 Log overload is flooding analysts with noise
🔹 SaaS SIEMs spike costs during attacks
🔹 30% of analyst time is lost to false positives
A new model is rising: metadata, behavior, and real-time detection.
Here's what’s replacing it ↓ https://thehackernews.com/2025/07/alert-fatigue-data-overload-and-fall-of.html
👍7🔥2😁1
🚨 Cyberattacks are evolving fast—and so is defense.
SentinelOne just landed Leader status in Gartner’s 2025 Magic Quadrant for Endpoint Protection for the 5th year straight.
Its AI spots threats 63% faster and slashes response time in half.
What’s changing in cybersecurity → https://thehackernews.com/2025/07/ai-driven-trends-in-endpoint-security.html
SentinelOne just landed Leader status in Gartner’s 2025 Magic Quadrant for Endpoint Protection for the 5th year straight.
Its AI spots threats 63% faster and slashes response time in half.
What’s changing in cybersecurity → https://thehackernews.com/2025/07/ai-driven-trends-in-endpoint-security.html
👍7🔥4😁3🤔1
North Korea’s UNC4899 hacked two firms via LinkedIn and Telegram job lures—tricking devs into running malicious Docker containers.
They breached Google Cloud & AWS, stole creds, bypassed MFA, injected wallet-hijacking JavaScript—and stole millions in crypto.
Details here → https://thehackernews.com/2025/07/n-korean-hackers-used-job-lures-cloud.html
They breached Google Cloud & AWS, stole creds, bypassed MFA, injected wallet-hijacking JavaScript—and stole millions in crypto.
Details here → https://thehackernews.com/2025/07/n-korean-hackers-used-job-lures-cloud.html
😱21👍6🔥5😁2🤔2
🚨 Hackers are hijacking Proofpoint + Bitly to bypass email defenses and steal Microsoft 365 credentials.
Phishing links look legit—wrapped, shortened, and sent from trusted accounts.
Even “protected” emails are now weaponized.
Details you need → https://thehackernews.com/2025/07/experts-detect-multi-layer-redirect.html
Phishing links look legit—wrapped, shortened, and sent from trusted accounts.
Even “protected” emails are now weaponized.
Details you need → https://thehackernews.com/2025/07/experts-detect-multi-layer-redirect.html
😁12🔥5
🛑 Russia’s Secret Blizzard hackers are hijacking embassy internet traffic in Moscow—at the ISP level.
They’re using fake Kaspersky alerts + a new malware “ApolloShadow” to silently take over devices.
Microsoft confirms: the campaign is ongoing.
Details here → https://thehackernews.com/2025/07/secret-blizzard-deploys-malware-in-isp.html
They’re using fake Kaspersky alerts + a new malware “ApolloShadow” to silently take over devices.
Microsoft confirms: the campaign is ongoing.
Details here → https://thehackernews.com/2025/07/secret-blizzard-deploys-malware-in-isp.html
🤯21👏8😁4👍2🔥2
🚨 China-linked hackers just deployed two ransomware strains—Warlock and LockBit Black—using a custom C2 framework called AK47 C2.
They’re hijacking legit tools, faking Microsoft domains, and disabling antivirus with a Chinese driver.
Details here → https://thehackernews.com/2025/08/storm-2603-exploits-sharepoint-flaws-to.html
They’re hijacking legit tools, faking Microsoft domains, and disabling antivirus with a Chinese driver.
Details here → https://thehackernews.com/2025/08/storm-2603-exploits-sharepoint-flaws-to.html
😱13🔥3👏2