๐ Still pip installing and praying?
Supply chain attacks are everywhere in Python:
โ YOLO package hacked
โ Critical vulns in base images
โ Malicious packages live on PyPI
๐ฅ Join the free webinar to secure your Python stack โ https://thehacker.news/safeguarding-python-supply-chain
Supply chain attacks are everywhere in Python:
โ YOLO package hacked
โ Critical vulns in base images
โ Malicious packages live on PyPI
๐ฅ Join the free webinar to secure your Python stack โ https://thehacker.news/safeguarding-python-supply-chain
๐10๐ฅ5๐ฑ2๐1
๐ UPDATE: Akira ransomware now uses legit Windows drivers (rwdrv.sys, hlpdrv.sys) in a BYOVD attack to disable Defender and gain kernel accessโeven in hardened environments.
Tied to SonicWall SSL VPN zero-dayโstill under active investigation.
Read โ https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
Tied to SonicWall SSL VPN zero-dayโstill under active investigation.
Read โ https://thehackernews.com/2025/08/sonicwall-investigating-potential-ssl.html
๐ฅ21๐3๐ฑ2๐1
๐ฅ AI just changed the rules of pen testing.
Now you can say: "Check if leaked creds can access prod-finance."
And in seconds, it attacks, adapts, and reportsโno scripts, no guesswork.
Vibe Red Teaming is here. Testing becomes a conversation.
โ Full vision from Pentera's CTO: https://thehackernews.com/2025/08/ai-is-transforming-cybersecurity.html
Now you can say: "Check if leaked creds can access prod-finance."
And in seconds, it attacks, adapts, and reportsโno scripts, no guesswork.
Vibe Red Teaming is here. Testing becomes a conversation.
โ Full vision from Pentera's CTO: https://thehackernews.com/2025/08/ai-is-transforming-cybersecurity.html
๐ฅ11๐3๐2๐ค1
๐จ CISA just confirmed active exploits targeting 3 old D-Link camera and recorder flaws โ one remains unpatched.
These vulnerabilities expose admin passwords and enable command execution.
One affected model reached end-of-life. Still using it? You're exposed.
Mitigations required by Aug 26 โ https://thehackernews.com/2025/08/cisa-adds-3-d-link-router-flaws-to-kev.html
These vulnerabilities expose admin passwords and enable command execution.
One affected model reached end-of-life. Still using it? You're exposed.
Mitigations required by Aug 26 โ https://thehackernews.com/2025/08/cisa-adds-3-d-link-router-flaws-to-kev.html
๐7๐คฏ5๐ฅ2๐2๐ค1
๐จ Ukraine hit by wave of cyberattacks โ again.
Phishing emails posing as court summons are dropping malware that steals docs, grabs screenshots, and executes remote commands.
Hereโs whatโs happening โ https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html
Phishing emails posing as court summons are dropping malware that steals docs, grabs screenshots, and executes remote commands.
Hereโs whatโs happening โ https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html
๐12๐ค12๐ฅ5๐ฑ5๐คฏ4๐3
๐จ Trend Micro flaw (CVE-2025-54948 and CVE-2025-54987) lets attackers run code before login.
Two critical bugs (CVSS 9.4) are being exploited right now in Apex One on-prem.
Admins, patch fast โ remote code execution is on the table.
Hereโs what you need to know โ https://thehackernews.com/2025/08/trend-micro-confirms-active.html
Two critical bugs (CVSS 9.4) are being exploited right now in Apex One on-prem.
Admins, patch fast โ remote code execution is on the table.
Hereโs what you need to know โ https://thehackernews.com/2025/08/trend-micro-confirms-active.html
๐10๐ฅ6
Microsoft just built an AI that reverse-engineers malware by itself.
No hints. No human help โ and 90%+ accuracy.
It could change how threats are foundโbefore they even spread.
Hereโs what Project Ire can do โ https://thehackernews.com/2025/08/microsoft-launches-project-ire-to.html
No hints. No human help โ and 90%+ accuracy.
It could change how threats are foundโbefore they even spread.
Hereโs what Project Ire can do โ https://thehackernews.com/2025/08/microsoft-launches-project-ire-to.html
๐ค30๐11๐6๐4๐ฅ3๐ฑ2๐คฏ1
๐ vCISO adoption just exploded 319% in one year.
MSPs & MSSPs are scrambling to meet SMB demandโand AI is powering the shift.
Itโs not just about security. Itโs driving higher margins, better upsell, and recurring revenue.
Check full report โ https://thehackernews.com/2025/08/ai-slashes-workloads-for-vcisos-by-68.html
MSPs & MSSPs are scrambling to meet SMB demandโand AI is powering the shift.
Itโs not just about security. Itโs driving higher margins, better upsell, and recurring revenue.
Check full report โ https://thehackernews.com/2025/08/ai-slashes-workloads-for-vcisos-by-68.html
๐4๐2
๐จ UPDATE: Google confirms it was hit in the Salesforce vishing attacks.
Hackers accessed contact data for small biz clients in Juneโthen vanished.
Now? They're back, threatening victims with 72-hour bitcoin extortion demands, posing as ShinyHunters.
Read โ https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html
Hackers accessed contact data for small biz clients in Juneโthen vanished.
Now? They're back, threatening victims with 72-hour bitcoin extortion demands, posing as ShinyHunters.
Read โ https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html
๐12๐10๐1
๐จ Millions duped by fake apps on Apple & Google stores.
VexTrio, a global crime ring, used bogus VPNs & cleaners to steal data, push ads, and charge hidden fees.
Itโs still active.
Details here โ https://thehackernews.com/2025/08/fake-vpn-and-spam-blocker-apps-tied-to.html
VexTrio, a global crime ring, used bogus VPNs & cleaners to steal data, push ads, and charge hidden fees.
Itโs still active.
Details here โ https://thehackernews.com/2025/08/fake-vpn-and-spam-blocker-apps-tied-to.html
๐14๐ฅ3๐ฑ3๐1
๐จ One container in Amazon ECS can now hijack all othersโ AWS creds on the same EC2 host.
Researchers exposed a stealthy privilege escalation chain called ECScape โ no exploit, just abusing AWS internals.
Amazon: "Working as designed."
Details โ https://thehackernews.com/2025/08/researchers-uncover-ecscape-flaw-in.html
Researchers exposed a stealthy privilege escalation chain called ECScape โ no exploit, just abusing AWS internals.
Amazon: "Working as designed."
Details โ https://thehackernews.com/2025/08/researchers-uncover-ecscape-flaw-in.html
๐คฏ17๐ฑ8๐5๐1
Your pip install isnโt as safe as you think.
From typo-squatting to CVE-packed base images, Python supply chain attacks are everywhereโand evolving fast.
๐ฅ Learn how to lock down your stack in 2025. Tools, tactics, and real-world examples:
Watch the webinar โ https://thehackernews.com/2025/08/webinar-how-to-stop-python-supply-chain.html
From typo-squatting to CVE-packed base images, Python supply chain attacks are everywhereโand evolving fast.
๐ฅ Learn how to lock down your stack in 2025. Tools, tactics, and real-world examples:
Watch the webinar โ https://thehackernews.com/2025/08/webinar-how-to-stop-python-supply-chain.html
๐คฏ16๐ฅ3๐ฑ1
๐จ Attackers are hitting SonicWall firewalls againโbut itโs not a new zero-day.
Turns out, theyโre exploiting a known bug (CVE-2024-40766) and weak password hygiene.
Migrating from Gen 6 to Gen 7 without resets? Thatโs leaving doors wide open.
Full details + what to fix โ https://thehackernews.com/2025/08/sonicwall-confirms-patched.html
Turns out, theyโre exploiting a known bug (CVE-2024-40766) and weak password hygiene.
Migrating from Gen 6 to Gen 7 without resets? Thatโs leaving doors wide open.
Full details + what to fix โ https://thehackernews.com/2025/08/sonicwall-confirms-patched.html
๐ค8๐3๐3
๐จ Microsoft just warned: CVE-2025-53786 lets hackers silently escalate privileges from on-prem Exchange to the cloud.
No logs. No easy traces.
Your hybrid setup could be a silent breach vector.
Full details + fixes โ https://thehackernews.com/2025/08/microsoft-discloses-exchange-server.html
No logs. No easy traces.
Your hybrid setup could be a silent breach vector.
Full details + fixes โ https://thehackernews.com/2025/08/microsoft-discloses-exchange-server.html
๐8๐7
๐จ Hackers can hijack Axis camera networks without logging in.
A CVSS 9.0 flaw in Axis Device Manager & Camera Station enables pre-auth remote code executionโimpacting 6,500+ servers, mostly in the U.S.
Live feeds could be watched or shut down.
Details โ https://thehackernews.com/2025/08/6500-axis-servers-expose-remoting.html
A CVSS 9.0 flaw in Axis Device Manager & Camera Station enables pre-auth remote code executionโimpacting 6,500+ servers, mostly in the U.S.
Live feeds could be watched or shut down.
Details โ https://thehackernews.com/2025/08/6500-axis-servers-expose-remoting.html
๐ฅ12๐4
๐จ 11 malicious Go packages just found โ infecting both Windows and Linux.
They silently download payloads, hijack shells, and can steal browser data.
Worse: they look legit, preying on confused devs importing from GitHub.
Details devs need to see โ https://thehackernews.com/2025/08/malicious-go-npm-packages-deliver-cross.html
They silently download payloads, hijack shells, and can steal browser data.
Worse: they look legit, preying on confused devs importing from GitHub.
Details devs need to see โ https://thehackernews.com/2025/08/malicious-go-npm-packages-deliver-cross.html
๐10๐ฅ4๐ค1
๐จ Cloud attacks now execute in under 10 minutes.
AI is fueling both sides:
๐ 500% surge in AI workloads
โ ๏ธ CI/CD pipelines under fire
๐ก๏ธ Real-time defense is no longer optional
Real-time defense isnโt optionalโitโs survival.
Full 2025 report โ https://thehackernews.com/2025/08/the-ai-powered-security-shift-what-2025.html
AI is fueling both sides:
๐ 500% surge in AI workloads
โ ๏ธ CI/CD pipelines under fire
๐ก๏ธ Real-time defense is no longer optional
Real-time defense isnโt optionalโitโs survival.
Full 2025 report โ https://thehackernews.com/2025/08/the-ai-powered-security-shift-what-2025.html
๐5โก1
๐จ Hackers are hijacking legit ad tools to push fake browser updatesโspreading SocGholish malware linked to LockBit, Evil Corp & others.
Itโs a Malware-as-a-Service network selling your device as a doorway in.
How it works โ https://thehackernews.com/2025/08/socgholish-malware-spread-via-ad-tools.html
Itโs a Malware-as-a-Service network selling your device as a doorway in.
How it works โ https://thehackernews.com/2025/08/socgholish-malware-spread-via-ad-tools.html
๐12๐5๐3๐ค1
$1M in crypto goneโstolen by 150+ fake Firefox wallet extensions.
The scam: lookalike MetaMask, TronLink, Exodus add-ons that start cleanโฆ then turn malicious when no oneโs watching.
Now spreading to Chrome. AI is helping them scale.
Full story โ https://thehackernews.com/2025/08/greedybear-steals-1m-in-crypto-using.html
The scam: lookalike MetaMask, TronLink, Exodus add-ons that start cleanโฆ then turn malicious when no oneโs watching.
Now spreading to Chrome. AI is helping them scale.
Full story โ https://thehackernews.com/2025/08/greedybear-steals-1m-in-crypto-using.html
๐คฏ22๐12๐ฑ3
๐จ RubyGems & PyPI under attack:
๐ธ 60 fake RubyGems stole social media logins (275K+ downloads)
๐ธ PyPI fakes hijacked crypto staking wallets
Both hide credential-stealing code in legit-looking packages.
Details โ https://thehackernews.com/2025/08/rubygems-pypi-hit-by-malicious-packages.html
๐ธ 60 fake RubyGems stole social media logins (275K+ downloads)
๐ธ PyPI fakes hijacked crypto staking wallets
Both hide credential-stealing code in legit-looking packages.
Details โ https://thehackernews.com/2025/08/rubygems-pypi-hit-by-malicious-packages.html
๐ฅ10๐ค1