๐ฅ Hackers can fully hijack NVIDIA's Triton AI servers โ no login needed.
A new exploit chain gives attackers remote code execution and access to sensitive AI models.
It all starts with a single malformed request.
Full details โ https://thehackernews.com/2025/08/nvidia-triton-bugs-let-unauthenticated.html
A new exploit chain gives attackers remote code execution and access to sensitive AI models.
It all starts with a single malformed request.
Full details โ https://thehackernews.com/2025/08/nvidia-triton-bugs-let-unauthenticated.html
๐27๐ฅ6๐5๐ฑ4โก1๐1
๐จ A suspected zero-day in SonicWall Gen 7 firewalls is under active attack.
Akira ransomware is exploiting SSL VPNs to breach networksโeven with MFA.
20+ confirmed attacks. Domain controllers hit within hours.
Urgent steps + full report โ https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
Akira ransomware is exploiting SSL VPNs to breach networksโeven with MFA.
20+ confirmed attacks. Domain controllers hit within hours.
Urgent steps + full report โ https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
๐14๐ฅ2
๐จ DDoS attacks surged 358% in Q1 2025. But itโs not just volumeโitโs AI-powered, precision-targeted, and actively evading defenses.
The old playbook is obsolete. Most orgs only test 1% of their attack surface.
The rest? Fully exposed.
Details here โ https://thehackernews.com/expert-insights/2025/08/the-new-face-of-ddos-is-impacted-by-ai.html
The old playbook is obsolete. Most orgs only test 1% of their attack surface.
The rest? Fully exposed.
Details here โ https://thehackernews.com/expert-insights/2025/08/the-new-face-of-ddos-is-impacted-by-ai.html
๐11๐ฑ1
๐จ 15,000+ fake TikTok Shop sites are stealing logins & crypto.
A massive scam uses AI-generated videos, Meta ads & trojan apps to hijack your device.
It mimics influencersโand it's global.
Hereโs what you need to know โ https://thehackernews.com/2025/08/15000-fake-tiktok-shop-domains-deliver.html
A massive scam uses AI-generated videos, Meta ads & trojan apps to hijack your device.
It mimics influencersโand it's global.
Hereโs what you need to know โ https://thehackernews.com/2025/08/15000-fake-tiktok-shop-domains-deliver.html
๐9๐7๐1
๐จ A phishing attack hidden behind a QR code + CAPTCHA was fully exposed in under 60 secondsโno analyst touch needed.
How? A live, automated sandbox detonated the payload, bypassed defenses, and surfaced IOCs instantly.
Your SOC is missing this.
Details here โ https://thehackernews.com/2025/08/how-top-cisos-save-their-socs-from.html
How? A live, automated sandbox detonated the payload, bypassed defenses, and surfaced IOCs instantly.
Your SOC is missing this.
Details here โ https://thehackernews.com/2025/08/how-top-cisos-save-their-socs-from.html
๐14๐1
๐จ A high-severity flaw in Cursor AI (CVE-2025-54136) let attackers hijack trusted MCP configsโtriggering remote code execution every time you opened the project.
No re-prompt. No warning. Just silent compromise by modifying a config file you already trusted.
Learn more โ https://thehackernews.com/2025/08/cursor-ai-code-editor-vulnerability.html
No re-prompt. No warning. Just silent compromise by modifying a config file you already trusted.
Learn more โ https://thehackernews.com/2025/08/cursor-ai-code-editor-vulnerability.html
๐16๐6๐2
๐ 53% of orgs trust their SaaS vendors. But 70% of SaaS incidents come from misconfigs & bad permissionsโyour responsibility.
Worse? They leave no logs. No alerts. Just exposure.
Hereโs why posture > detection: https://thehackernews.com/2025/08/misconfigurations-are-not.html
Worse? They leave no logs. No alerts. Just exposure.
Hereโs why posture > detection: https://thehackernews.com/2025/08/misconfigurations-are-not.html
๐ค7โก1
๐จ Google just fixed 3 Android bugs hackers were already using.
One lets them hijack your phone through the graphics chip โ no clicks needed.
Spyware vendors may be behind it.
PATCH your phones now โ https://thehackernews.com/2025/08/google-fixes-3-android-vulnerabilities.html
One lets them hijack your phone through the graphics chip โ no clicks needed.
Spyware vendors may be behind it.
PATCH your phones now โ https://thehackernews.com/2025/08/google-fixes-3-android-vulnerabilities.html
๐23๐คฏ9๐ฅ5๐ค1
๐จ CAPTCHAgeddon is here. A fake CAPTCHA scam called ClickFix hijacks devices with a single pasteโno download, no file, just clipboard commands.
It's smarter than ClearFakeโand spreading fast.
Hereโs how it works โ https://thehackernews.com/2025/08/clickfix-malware-campaign-exploits.html
It's smarter than ClearFakeโand spreading fast.
Hereโs how it works โ https://thehackernews.com/2025/08/clickfix-malware-campaign-exploits.html
๐ฑ8๐ฅ3๐2๐ค2๐1
๐ Still pip installing and praying?
Supply chain attacks are everywhere in Python:
โ YOLO package hacked
โ Critical vulns in base images
โ Malicious packages live on PyPI
๐ฅ Join the free webinar to secure your Python stack โ https://thehacker.news/safeguarding-python-supply-chain
Supply chain attacks are everywhere in Python:
โ YOLO package hacked
โ Critical vulns in base images
โ Malicious packages live on PyPI
๐ฅ Join the free webinar to secure your Python stack โ https://thehacker.news/safeguarding-python-supply-chain
๐10๐ฅ5๐ฑ2๐1
๐ UPDATE: Akira ransomware now uses legit Windows drivers (rwdrv.sys, hlpdrv.sys) in a BYOVD attack to disable Defender and gain kernel accessโeven in hardened environments.
Tied to SonicWall SSL VPN zero-dayโstill under active investigation.
Read โ https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
Tied to SonicWall SSL VPN zero-dayโstill under active investigation.
Read โ https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
๐ฅ21๐3๐ฑ2๐1
๐ฅ AI just changed the rules of pen testing.
Now you can say: "Check if leaked creds can access prod-finance."
And in seconds, it attacks, adapts, and reportsโno scripts, no guesswork.
Vibe Red Teaming is here. Testing becomes a conversation.
โ Full vision from Pentera's CTO: https://thehackernews.com/2025/08/ai-is-transforming-cybersecurity.html
Now you can say: "Check if leaked creds can access prod-finance."
And in seconds, it attacks, adapts, and reportsโno scripts, no guesswork.
Vibe Red Teaming is here. Testing becomes a conversation.
โ Full vision from Pentera's CTO: https://thehackernews.com/2025/08/ai-is-transforming-cybersecurity.html
๐ฅ11๐3๐2๐ค1
๐จ CISA just confirmed active exploits targeting 3 old D-Link camera and recorder flaws โ one remains unpatched.
These vulnerabilities expose admin passwords and enable command execution.
One affected model reached end-of-life. Still using it? You're exposed.
Mitigations required by Aug 26 โ https://thehackernews.com/2025/08/cisa-adds-3-d-link-router-flaws-to-kev.html
These vulnerabilities expose admin passwords and enable command execution.
One affected model reached end-of-life. Still using it? You're exposed.
Mitigations required by Aug 26 โ https://thehackernews.com/2025/08/cisa-adds-3-d-link-router-flaws-to-kev.html
๐7๐คฏ5๐ฅ2๐2๐ค1
๐จ Ukraine hit by wave of cyberattacks โ again.
Phishing emails posing as court summons are dropping malware that steals docs, grabs screenshots, and executes remote commands.
Hereโs whatโs happening โ https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html
Phishing emails posing as court summons are dropping malware that steals docs, grabs screenshots, and executes remote commands.
Hereโs whatโs happening โ https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html
๐12๐ค12๐ฅ5๐ฑ5๐คฏ4๐3
๐จ Trend Micro flaw (CVE-2025-54948 and CVE-2025-54987) lets attackers run code before login.
Two critical bugs (CVSS 9.4) are being exploited right now in Apex One on-prem.
Admins, patch fast โ remote code execution is on the table.
Hereโs what you need to know โ https://thehackernews.com/2025/08/trend-micro-confirms-active.html
Two critical bugs (CVSS 9.4) are being exploited right now in Apex One on-prem.
Admins, patch fast โ remote code execution is on the table.
Hereโs what you need to know โ https://thehackernews.com/2025/08/trend-micro-confirms-active.html
๐10๐ฅ6
Microsoft just built an AI that reverse-engineers malware by itself.
No hints. No human help โ and 90%+ accuracy.
It could change how threats are foundโbefore they even spread.
Hereโs what Project Ire can do โ https://thehackernews.com/2025/08/microsoft-launches-project-ire-to.html
No hints. No human help โ and 90%+ accuracy.
It could change how threats are foundโbefore they even spread.
Hereโs what Project Ire can do โ https://thehackernews.com/2025/08/microsoft-launches-project-ire-to.html
๐ค30๐11๐6๐4๐ฅ3๐ฑ2๐คฏ1
๐ vCISO adoption just exploded 319% in one year.
MSPs & MSSPs are scrambling to meet SMB demandโand AI is powering the shift.
Itโs not just about security. Itโs driving higher margins, better upsell, and recurring revenue.
Check full report โ https://thehackernews.com/2025/08/ai-slashes-workloads-for-vcisos-by-68.html
MSPs & MSSPs are scrambling to meet SMB demandโand AI is powering the shift.
Itโs not just about security. Itโs driving higher margins, better upsell, and recurring revenue.
Check full report โ https://thehackernews.com/2025/08/ai-slashes-workloads-for-vcisos-by-68.html
๐4๐2
๐จ UPDATE: Google confirms it was hit in the Salesforce vishing attacks.
Hackers accessed contact data for small biz clients in Juneโthen vanished.
Now? They're back, threatening victims with 72-hour bitcoin extortion demands, posing as ShinyHunters.
Read โ https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html
Hackers accessed contact data for small biz clients in Juneโthen vanished.
Now? They're back, threatening victims with 72-hour bitcoin extortion demands, posing as ShinyHunters.
Read โ https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html
๐12๐10๐1
๐จ Millions duped by fake apps on Apple & Google stores.
VexTrio, a global crime ring, used bogus VPNs & cleaners to steal data, push ads, and charge hidden fees.
Itโs still active.
Details here โ https://thehackernews.com/2025/08/fake-vpn-and-spam-blocker-apps-tied-to.html
VexTrio, a global crime ring, used bogus VPNs & cleaners to steal data, push ads, and charge hidden fees.
Itโs still active.
Details here โ https://thehackernews.com/2025/08/fake-vpn-and-spam-blocker-apps-tied-to.html
๐14๐ฅ3๐ฑ3๐1
๐จ One container in Amazon ECS can now hijack all othersโ AWS creds on the same EC2 host.
Researchers exposed a stealthy privilege escalation chain called ECScape โ no exploit, just abusing AWS internals.
Amazon: "Working as designed."
Details โ https://thehackernews.com/2025/08/researchers-uncover-ecscape-flaw-in.html
Researchers exposed a stealthy privilege escalation chain called ECScape โ no exploit, just abusing AWS internals.
Amazon: "Working as designed."
Details โ https://thehackernews.com/2025/08/researchers-uncover-ecscape-flaw-in.html
๐คฏ17๐ฑ8๐5๐1