๐ "How much AI is too much in customer experiences?"
Users are starting to push back.
Join our new ๐บ WEBINAR featuring an expert from @Okta as she reveals new research on how to balance innovation with trustโstraight from the 2025 CIAM Trends Report.
๐ Watch the webinar now โ https://thehacker.news/ai-customer-identity
Users are starting to push back.
Join our new ๐บ WEBINAR featuring an expert from @Okta as she reveals new research on how to balance innovation with trustโstraight from the 2025 CIAM Trends Report.
๐ Watch the webinar now โ https://thehacker.news/ai-customer-identity
๐12๐ค2
๐จ Hackers are poisoning your Python packages, hijacking logins & weaponizing AI.
The next wave of cyberattacks is already hereโand most defenses wonโt stop it.
3 New urgent cybersecurity webinars show how to lock down your code, identity & AI stack โ https://www.linkedin.com/pulse/secure-your-ai-supply-chain-stack-3-new-cybersecurity-webinars-d9zwc/
The next wave of cyberattacks is already hereโand most defenses wonโt stop it.
3 New urgent cybersecurity webinars show how to lock down your code, identity & AI stack โ https://www.linkedin.com/pulse/secure-your-ai-supply-chain-stack-3-new-cybersecurity-webinars-d9zwc/
โก14๐ฅ5๐1๐ค1
๐จ SOCs are losing the AI race โ and itโs not because of their tools.
Theyโre feeding cutting-edge AI systems junk data: incomplete logs, siloed alerts, zero context.
Meanwhile, attackers are training like elite athletes.
Hereโs why defenders are falling behind โ https://thehackernews.com/2025/08/you-are-what-you-eat-why-your-ai.html
Theyโre feeding cutting-edge AI systems junk data: incomplete logs, siloed alerts, zero context.
Meanwhile, attackers are training like elite athletes.
Hereโs why defenders are falling behind โ https://thehackernews.com/2025/08/you-are-what-you-eat-why-your-ai.html
๐ฅ17
๐จ An AI-generated npm package just stole crypto from devs.
"kodane/patch-manager" posed as a legit Node.js tool โ but hid a stealth wallet drainer that hit 1,500+ downloads before takedown.
Hereโs what to know โ https://thehackernews.com/2025/08/ai-generated-malicious-npm-package.html
"kodane/patch-manager" posed as a legit Node.js tool โ but hid a stealth wallet drainer that hit 1,500+ downloads before takedown.
Hereโs what to know โ https://thehackernews.com/2025/08/ai-generated-malicious-npm-package.html
๐ฑ12โก6๐4๐3
๐จ Hackers are using fake Microsoft OAuth apps + the Tycoon phishing kit to hijack 365 accounts
Theyโve spoofed 50+ brands (Adobe, DocuSign, SharePoint), bypassing MFA with adversary-in-the-middle attacks.
3,000+ users hit across 900 orgs.
Details โ https://thehackernews.com/2025/08/attackers-use-fake-oauth-apps-with.html
Theyโve spoofed 50+ brands (Adobe, DocuSign, SharePoint), bypassing MFA with adversary-in-the-middle attacks.
3,000+ users hit across 900 orgs.
Details โ https://thehackernews.com/2025/08/attackers-use-fake-oauth-apps-with.html
๐13๐4๐3
๐จ A single Slack message could hijack CursorโAI code editorโwith zero clicks.
CVE-2025-54135 let attackers run remote code just by posting in a public channel.
Cursor auto-executed it. No prompts. No approval.
Details here โ https://thehackernews.com/2025/08/cursor-ai-code-editor-fixed-flaw.html
CVE-2025-54135 let attackers run remote code just by posting in a public channel.
Cursor auto-executed it. No prompts. No approval.
Details here โ https://thehackernews.com/2025/08/cursor-ai-code-editor-fixed-flaw.html
๐18๐5๐ฅ4๐ค1๐ฑ1
๐จ Akira ransomware is hitting SonicWall SSL VPNsโsome fully patched.
Researchers suspect a zero-day or credential abuse. Attacks surged in late July.
Org? Disable SSL VPN until further notice.
Full details โ https://thehackernews.com/2025/08/akira-ransomware-exploits-sonicwall.html
Researchers suspect a zero-day or credential abuse. Attacks surged in late July.
Org? Disable SSL VPN until further notice.
Full details โ https://thehackernews.com/2025/08/akira-ransomware-exploits-sonicwall.html
๐ฅ18๐3๐2๐1๐ค1
๐จ China-linked threat group hacked Southeast Asia telecoms โ no data stolen, just full remote access to critical networks for 9 months.
They used stealth malware, tunneled through mobile operators, and wiped their tracks.
Hereโs what we know โ https://thehackernews.com/2025/08/cl-sta-0969-installs-covert-malware-in.html
They used stealth malware, tunneled through mobile operators, and wiped their tracks.
Hereโs what we know โ https://thehackernews.com/2025/08/cl-sta-0969-installs-covert-malware-in.html
๐ฑ22๐ฅ11๐4๐4๐1
๐จ Over 11,000 Android phones hijacked by new PlayPraetor malware.
It fakes Google Play pages, abuses accessibility settings, and livestreams your screenโall to steal banking and crypto credentials.
And it's spreading fast.
Hereโs what you need to know โ https://thehackernews.com/2025/08/playpraetor-android-trojan-infects.html
It fakes Google Play pages, abuses accessibility settings, and livestreams your screenโall to steal banking and crypto credentials.
And it's spreading fast.
Hereโs what you need to know โ https://thehackernews.com/2025/08/playpraetor-android-trojan-infects.html
๐คฏ16๐ฑ10๐5๐2
Youโre not just using SaaS. Itโs using you.
AI tools, browser plugins, and apps your team installs without asking are opening hidden doors to your data.
Most IT teams have no idea.
Hereโs how to take back control โ https://thehackernews.com/2025/08/the-wild-west-of-shadow-it.html
AI tools, browser plugins, and apps your team installs without asking are opening hidden doors to your data.
Most IT teams have no idea.
Hereโs how to take back control โ https://thehackernews.com/2025/08/the-wild-west-of-shadow-it.html
โก7๐7๐5๐ฑ4
โก Weekly Recap โถ VPN 0โDay, Mac Stealer Backdoor, AI Malware Disguised as Dev Tools, and an APT Hiding in ISPs.
The scariest part? Most of it looked legit.
Catch up now โ https://thehackernews.com/2025/08/weekly-recap-vpn-0-day-encryption.html
The scariest part? Most of it looked legit.
Catch up now โ https://thehackernews.com/2025/08/weekly-recap-vpn-0-day-encryption.html
๐7๐ฑ3
๐จ New wave of Python malware hits 4,000+ systems across 62 countries.
PXA Stealer is siphoning passwords, credit cards, and cookiesโthen selling them via Telegram-powered black markets.
Details here โ https://thehackernews.com/2025/08/vietnamese-hackers-use-pxa-stealer-hit.html
PXA Stealer is siphoning passwords, credit cards, and cookiesโthen selling them via Telegram-powered black markets.
Details here โ https://thehackernews.com/2025/08/vietnamese-hackers-use-pxa-stealer-hit.html
๐15๐ฅ3๐3๐2
๐ฅ Hackers can fully hijack NVIDIA's Triton AI servers โ no login needed.
A new exploit chain gives attackers remote code execution and access to sensitive AI models.
It all starts with a single malformed request.
Full details โ https://thehackernews.com/2025/08/nvidia-triton-bugs-let-unauthenticated.html
A new exploit chain gives attackers remote code execution and access to sensitive AI models.
It all starts with a single malformed request.
Full details โ https://thehackernews.com/2025/08/nvidia-triton-bugs-let-unauthenticated.html
๐27๐ฅ6๐5๐ฑ4โก1๐1
๐จ A suspected zero-day in SonicWall Gen 7 firewalls is under active attack.
Akira ransomware is exploiting SSL VPNs to breach networksโeven with MFA.
20+ confirmed attacks. Domain controllers hit within hours.
Urgent steps + full report โ https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
Akira ransomware is exploiting SSL VPNs to breach networksโeven with MFA.
20+ confirmed attacks. Domain controllers hit within hours.
Urgent steps + full report โ https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
๐14๐ฅ2
๐จ DDoS attacks surged 358% in Q1 2025. But itโs not just volumeโitโs AI-powered, precision-targeted, and actively evading defenses.
The old playbook is obsolete. Most orgs only test 1% of their attack surface.
The rest? Fully exposed.
Details here โ https://thehackernews.com/expert-insights/2025/08/the-new-face-of-ddos-is-impacted-by-ai.html
The old playbook is obsolete. Most orgs only test 1% of their attack surface.
The rest? Fully exposed.
Details here โ https://thehackernews.com/expert-insights/2025/08/the-new-face-of-ddos-is-impacted-by-ai.html
๐11๐ฑ1
๐จ 15,000+ fake TikTok Shop sites are stealing logins & crypto.
A massive scam uses AI-generated videos, Meta ads & trojan apps to hijack your device.
It mimics influencersโand it's global.
Hereโs what you need to know โ https://thehackernews.com/2025/08/15000-fake-tiktok-shop-domains-deliver.html
A massive scam uses AI-generated videos, Meta ads & trojan apps to hijack your device.
It mimics influencersโand it's global.
Hereโs what you need to know โ https://thehackernews.com/2025/08/15000-fake-tiktok-shop-domains-deliver.html
๐9๐7๐1
๐จ A phishing attack hidden behind a QR code + CAPTCHA was fully exposed in under 60 secondsโno analyst touch needed.
How? A live, automated sandbox detonated the payload, bypassed defenses, and surfaced IOCs instantly.
Your SOC is missing this.
Details here โ https://thehackernews.com/2025/08/how-top-cisos-save-their-socs-from.html
How? A live, automated sandbox detonated the payload, bypassed defenses, and surfaced IOCs instantly.
Your SOC is missing this.
Details here โ https://thehackernews.com/2025/08/how-top-cisos-save-their-socs-from.html
๐14๐1
๐จ A high-severity flaw in Cursor AI (CVE-2025-54136) let attackers hijack trusted MCP configsโtriggering remote code execution every time you opened the project.
No re-prompt. No warning. Just silent compromise by modifying a config file you already trusted.
Learn more โ https://thehackernews.com/2025/08/cursor-ai-code-editor-vulnerability.html
No re-prompt. No warning. Just silent compromise by modifying a config file you already trusted.
Learn more โ https://thehackernews.com/2025/08/cursor-ai-code-editor-vulnerability.html
๐16๐6๐2
๐ 53% of orgs trust their SaaS vendors. But 70% of SaaS incidents come from misconfigs & bad permissionsโyour responsibility.
Worse? They leave no logs. No alerts. Just exposure.
Hereโs why posture > detection: https://thehackernews.com/2025/08/misconfigurations-are-not.html
Worse? They leave no logs. No alerts. Just exposure.
Hereโs why posture > detection: https://thehackernews.com/2025/08/misconfigurations-are-not.html
๐ค7โก1
๐จ Google just fixed 3 Android bugs hackers were already using.
One lets them hijack your phone through the graphics chip โ no clicks needed.
Spyware vendors may be behind it.
PATCH your phones now โ https://thehackernews.com/2025/08/google-fixes-3-android-vulnerabilities.html
One lets them hijack your phone through the graphics chip โ no clicks needed.
Spyware vendors may be behind it.
PATCH your phones now โ https://thehackernews.com/2025/08/google-fixes-3-android-vulnerabilities.html
๐23๐คฏ9๐ฅ5๐ค1