๐จ Hackers are using fake Microsoft OAuth apps + the Tycoon phishing kit to hijack 365 accounts
Theyโve spoofed 50+ brands (Adobe, DocuSign, SharePoint), bypassing MFA with adversary-in-the-middle attacks.
3,000+ users hit across 900 orgs.
Details โ https://thehackernews.com/2025/08/attackers-use-fake-oauth-apps-with.html
Theyโve spoofed 50+ brands (Adobe, DocuSign, SharePoint), bypassing MFA with adversary-in-the-middle attacks.
3,000+ users hit across 900 orgs.
Details โ https://thehackernews.com/2025/08/attackers-use-fake-oauth-apps-with.html
๐13๐4๐3
๐จ A single Slack message could hijack CursorโAI code editorโwith zero clicks.
CVE-2025-54135 let attackers run remote code just by posting in a public channel.
Cursor auto-executed it. No prompts. No approval.
Details here โ https://thehackernews.com/2025/08/cursor-ai-code-editor-fixed-flaw.html
CVE-2025-54135 let attackers run remote code just by posting in a public channel.
Cursor auto-executed it. No prompts. No approval.
Details here โ https://thehackernews.com/2025/08/cursor-ai-code-editor-fixed-flaw.html
๐18๐5๐ฅ4๐ค1๐ฑ1
๐จ Akira ransomware is hitting SonicWall SSL VPNsโsome fully patched.
Researchers suspect a zero-day or credential abuse. Attacks surged in late July.
Org? Disable SSL VPN until further notice.
Full details โ https://thehackernews.com/2025/08/akira-ransomware-exploits-sonicwall.html
Researchers suspect a zero-day or credential abuse. Attacks surged in late July.
Org? Disable SSL VPN until further notice.
Full details โ https://thehackernews.com/2025/08/akira-ransomware-exploits-sonicwall.html
๐ฅ18๐3๐2๐1๐ค1
๐จ China-linked threat group hacked Southeast Asia telecoms โ no data stolen, just full remote access to critical networks for 9 months.
They used stealth malware, tunneled through mobile operators, and wiped their tracks.
Hereโs what we know โ https://thehackernews.com/2025/08/cl-sta-0969-installs-covert-malware-in.html
They used stealth malware, tunneled through mobile operators, and wiped their tracks.
Hereโs what we know โ https://thehackernews.com/2025/08/cl-sta-0969-installs-covert-malware-in.html
๐ฑ22๐ฅ11๐4๐4๐1
๐จ Over 11,000 Android phones hijacked by new PlayPraetor malware.
It fakes Google Play pages, abuses accessibility settings, and livestreams your screenโall to steal banking and crypto credentials.
And it's spreading fast.
Hereโs what you need to know โ https://thehackernews.com/2025/08/playpraetor-android-trojan-infects.html
It fakes Google Play pages, abuses accessibility settings, and livestreams your screenโall to steal banking and crypto credentials.
And it's spreading fast.
Hereโs what you need to know โ https://thehackernews.com/2025/08/playpraetor-android-trojan-infects.html
๐คฏ16๐ฑ10๐5๐2
Youโre not just using SaaS. Itโs using you.
AI tools, browser plugins, and apps your team installs without asking are opening hidden doors to your data.
Most IT teams have no idea.
Hereโs how to take back control โ https://thehackernews.com/2025/08/the-wild-west-of-shadow-it.html
AI tools, browser plugins, and apps your team installs without asking are opening hidden doors to your data.
Most IT teams have no idea.
Hereโs how to take back control โ https://thehackernews.com/2025/08/the-wild-west-of-shadow-it.html
โก7๐7๐5๐ฑ4
โก Weekly Recap โถ VPN 0โDay, Mac Stealer Backdoor, AI Malware Disguised as Dev Tools, and an APT Hiding in ISPs.
The scariest part? Most of it looked legit.
Catch up now โ https://thehackernews.com/2025/08/weekly-recap-vpn-0-day-encryption.html
The scariest part? Most of it looked legit.
Catch up now โ https://thehackernews.com/2025/08/weekly-recap-vpn-0-day-encryption.html
๐7๐ฑ3
๐จ New wave of Python malware hits 4,000+ systems across 62 countries.
PXA Stealer is siphoning passwords, credit cards, and cookiesโthen selling them via Telegram-powered black markets.
Details here โ https://thehackernews.com/2025/08/vietnamese-hackers-use-pxa-stealer-hit.html
PXA Stealer is siphoning passwords, credit cards, and cookiesโthen selling them via Telegram-powered black markets.
Details here โ https://thehackernews.com/2025/08/vietnamese-hackers-use-pxa-stealer-hit.html
๐15๐ฅ3๐3๐2
๐ฅ Hackers can fully hijack NVIDIA's Triton AI servers โ no login needed.
A new exploit chain gives attackers remote code execution and access to sensitive AI models.
It all starts with a single malformed request.
Full details โ https://thehackernews.com/2025/08/nvidia-triton-bugs-let-unauthenticated.html
A new exploit chain gives attackers remote code execution and access to sensitive AI models.
It all starts with a single malformed request.
Full details โ https://thehackernews.com/2025/08/nvidia-triton-bugs-let-unauthenticated.html
๐27๐ฅ6๐5๐ฑ4โก1๐1
๐จ A suspected zero-day in SonicWall Gen 7 firewalls is under active attack.
Akira ransomware is exploiting SSL VPNs to breach networksโeven with MFA.
20+ confirmed attacks. Domain controllers hit within hours.
Urgent steps + full report โ https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
Akira ransomware is exploiting SSL VPNs to breach networksโeven with MFA.
20+ confirmed attacks. Domain controllers hit within hours.
Urgent steps + full report โ https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
๐14๐ฅ2
๐จ DDoS attacks surged 358% in Q1 2025. But itโs not just volumeโitโs AI-powered, precision-targeted, and actively evading defenses.
The old playbook is obsolete. Most orgs only test 1% of their attack surface.
The rest? Fully exposed.
Details here โ https://thehackernews.com/expert-insights/2025/08/the-new-face-of-ddos-is-impacted-by-ai.html
The old playbook is obsolete. Most orgs only test 1% of their attack surface.
The rest? Fully exposed.
Details here โ https://thehackernews.com/expert-insights/2025/08/the-new-face-of-ddos-is-impacted-by-ai.html
๐11๐ฑ1
๐จ 15,000+ fake TikTok Shop sites are stealing logins & crypto.
A massive scam uses AI-generated videos, Meta ads & trojan apps to hijack your device.
It mimics influencersโand it's global.
Hereโs what you need to know โ https://thehackernews.com/2025/08/15000-fake-tiktok-shop-domains-deliver.html
A massive scam uses AI-generated videos, Meta ads & trojan apps to hijack your device.
It mimics influencersโand it's global.
Hereโs what you need to know โ https://thehackernews.com/2025/08/15000-fake-tiktok-shop-domains-deliver.html
๐9๐7๐1
๐จ A phishing attack hidden behind a QR code + CAPTCHA was fully exposed in under 60 secondsโno analyst touch needed.
How? A live, automated sandbox detonated the payload, bypassed defenses, and surfaced IOCs instantly.
Your SOC is missing this.
Details here โ https://thehackernews.com/2025/08/how-top-cisos-save-their-socs-from.html
How? A live, automated sandbox detonated the payload, bypassed defenses, and surfaced IOCs instantly.
Your SOC is missing this.
Details here โ https://thehackernews.com/2025/08/how-top-cisos-save-their-socs-from.html
๐14๐1
๐จ A high-severity flaw in Cursor AI (CVE-2025-54136) let attackers hijack trusted MCP configsโtriggering remote code execution every time you opened the project.
No re-prompt. No warning. Just silent compromise by modifying a config file you already trusted.
Learn more โ https://thehackernews.com/2025/08/cursor-ai-code-editor-vulnerability.html
No re-prompt. No warning. Just silent compromise by modifying a config file you already trusted.
Learn more โ https://thehackernews.com/2025/08/cursor-ai-code-editor-vulnerability.html
๐16๐6๐2
๐ 53% of orgs trust their SaaS vendors. But 70% of SaaS incidents come from misconfigs & bad permissionsโyour responsibility.
Worse? They leave no logs. No alerts. Just exposure.
Hereโs why posture > detection: https://thehackernews.com/2025/08/misconfigurations-are-not.html
Worse? They leave no logs. No alerts. Just exposure.
Hereโs why posture > detection: https://thehackernews.com/2025/08/misconfigurations-are-not.html
๐ค7โก1
๐จ Google just fixed 3 Android bugs hackers were already using.
One lets them hijack your phone through the graphics chip โ no clicks needed.
Spyware vendors may be behind it.
PATCH your phones now โ https://thehackernews.com/2025/08/google-fixes-3-android-vulnerabilities.html
One lets them hijack your phone through the graphics chip โ no clicks needed.
Spyware vendors may be behind it.
PATCH your phones now โ https://thehackernews.com/2025/08/google-fixes-3-android-vulnerabilities.html
๐23๐คฏ9๐ฅ5๐ค1
๐จ CAPTCHAgeddon is here. A fake CAPTCHA scam called ClickFix hijacks devices with a single pasteโno download, no file, just clipboard commands.
It's smarter than ClearFakeโand spreading fast.
Hereโs how it works โ https://thehackernews.com/2025/08/clickfix-malware-campaign-exploits.html
It's smarter than ClearFakeโand spreading fast.
Hereโs how it works โ https://thehackernews.com/2025/08/clickfix-malware-campaign-exploits.html
๐ฑ8๐ฅ3๐2๐ค2๐1
๐ Still pip installing and praying?
Supply chain attacks are everywhere in Python:
โ YOLO package hacked
โ Critical vulns in base images
โ Malicious packages live on PyPI
๐ฅ Join the free webinar to secure your Python stack โ https://thehacker.news/safeguarding-python-supply-chain
Supply chain attacks are everywhere in Python:
โ YOLO package hacked
โ Critical vulns in base images
โ Malicious packages live on PyPI
๐ฅ Join the free webinar to secure your Python stack โ https://thehacker.news/safeguarding-python-supply-chain
๐10๐ฅ5๐ฑ2๐1
๐ UPDATE: Akira ransomware now uses legit Windows drivers (rwdrv.sys, hlpdrv.sys) in a BYOVD attack to disable Defender and gain kernel accessโeven in hardened environments.
Tied to SonicWall SSL VPN zero-dayโstill under active investigation.
Read โ https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
Tied to SonicWall SSL VPN zero-dayโstill under active investigation.
Read โ https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
๐ฅ21๐3๐ฑ2๐1
๐ฅ AI just changed the rules of pen testing.
Now you can say: "Check if leaked creds can access prod-finance."
And in seconds, it attacks, adapts, and reportsโno scripts, no guesswork.
Vibe Red Teaming is here. Testing becomes a conversation.
โ Full vision from Pentera's CTO: https://thehackernews.com/2025/08/ai-is-transforming-cybersecurity.html
Now you can say: "Check if leaked creds can access prod-finance."
And in seconds, it attacks, adapts, and reportsโno scripts, no guesswork.
Vibe Red Teaming is here. Testing becomes a conversation.
โ Full vision from Pentera's CTO: https://thehackernews.com/2025/08/ai-is-transforming-cybersecurity.html
๐ฅ11๐3๐2๐ค1