The Hacker News
โœ”
151K subscribers
1.85K photos
10 videos
3 files
7.77K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: [email protected]

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿ”ฅ AI just changed the rules of pen testing.

Now you can say: "Check if leaked creds can access prod-finance."

And in seconds, it attacks, adapts, and reportsโ€”no scripts, no guesswork.

Vibe Red Teaming is here. Testing becomes a conversation.

โ†’ Full vision from Pentera's CTO: https://thehackernews.com/2025/08/ai-is-transforming-cybersecurity.html
๐Ÿ”ฅ11๐Ÿ˜3๐Ÿ‘2๐Ÿค”1
๐Ÿšจ CISA just confirmed active exploits targeting 3 old D-Link camera and recorder flaws โ€” one remains unpatched.

These vulnerabilities expose admin passwords and enable command execution.

One affected model reached end-of-life. Still using it? You're exposed.

Mitigations required by Aug 26 โ†’ https://thehackernews.com/2025/08/cisa-adds-3-d-link-router-flaws-to-kev.html
๐Ÿ‘7๐Ÿคฏ5๐Ÿ”ฅ2๐Ÿ˜2๐Ÿค”1
๐Ÿšจ Ukraine hit by wave of cyberattacks โ€” again.

Phishing emails posing as court summons are dropping malware that steals docs, grabs screenshots, and executes remote commands.

Hereโ€™s whatโ€™s happening โ†“ https://thehackernews.com/2025/08/cert-ua-warns-of-hta-delivered-c.html
๐Ÿ˜12๐Ÿค”12๐Ÿ”ฅ5๐Ÿ˜ฑ5๐Ÿคฏ4๐Ÿ‘3
๐Ÿšจ Trend Micro flaw (CVE-2025-54948 and CVE-2025-54987) lets attackers run code before login.

Two critical bugs (CVSS 9.4) are being exploited right now in Apex One on-prem.

Admins, patch fast โ€” remote code execution is on the table.

Hereโ€™s what you need to know โ†“ https://thehackernews.com/2025/08/trend-micro-confirms-active.html
๐Ÿ‘10๐Ÿ”ฅ6
Microsoft just built an AI that reverse-engineers malware by itself.

No hints. No human help โ€” and 90%+ accuracy.

It could change how threats are foundโ€”before they even spread.

Hereโ€™s what Project Ire can do โ†“ https://thehackernews.com/2025/08/microsoft-launches-project-ire-to.html
๐Ÿค”30๐Ÿ‘11๐Ÿ˜6๐Ÿ‘4๐Ÿ”ฅ3๐Ÿ˜ฑ2๐Ÿคฏ1
๐Ÿ“ˆ vCISO adoption just exploded 319% in one year.

MSPs & MSSPs are scrambling to meet SMB demandโ€”and AI is powering the shift.

Itโ€™s not just about security. Itโ€™s driving higher margins, better upsell, and recurring revenue.

Check full report โ†’ https://thehackernews.com/2025/08/ai-slashes-workloads-for-vcisos-by-68.html
๐Ÿ‘4๐Ÿ‘2
๐Ÿšจ UPDATE: Google confirms it was hit in the Salesforce vishing attacks.

Hackers accessed contact data for small biz clients in Juneโ€”then vanished.

Now? They're back, threatening victims with 72-hour bitcoin extortion demands, posing as ShinyHunters.

Read โ†“ https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html
๐Ÿ‘12๐Ÿ˜10๐Ÿ‘1
๐Ÿšจ Millions duped by fake apps on Apple & Google stores.

VexTrio, a global crime ring, used bogus VPNs & cleaners to steal data, push ads, and charge hidden fees.

Itโ€™s still active.

Details here โ†’ https://thehackernews.com/2025/08/fake-vpn-and-spam-blocker-apps-tied-to.html
๐Ÿ˜14๐Ÿ”ฅ3๐Ÿ˜ฑ3๐Ÿ‘1
๐Ÿšจ One container in Amazon ECS can now hijack all othersโ€™ AWS creds on the same EC2 host.

Researchers exposed a stealthy privilege escalation chain called ECScape โ€” no exploit, just abusing AWS internals.

Amazon: "Working as designed."

Details โ†’ https://thehackernews.com/2025/08/researchers-uncover-ecscape-flaw-in.html
๐Ÿคฏ17๐Ÿ˜ฑ8๐Ÿ‘5๐Ÿ‘1
Your pip install isnโ€™t as safe as you think.

From typo-squatting to CVE-packed base images, Python supply chain attacks are everywhereโ€”and evolving fast.

๐ŸŽฅ Learn how to lock down your stack in 2025. Tools, tactics, and real-world examples:

Watch the webinar โ†’ https://thehackernews.com/2025/08/webinar-how-to-stop-python-supply-chain.html
๐Ÿคฏ16๐Ÿ”ฅ3๐Ÿ˜ฑ1
๐Ÿšจ Attackers are hitting SonicWall firewalls againโ€”but itโ€™s not a new zero-day.

Turns out, theyโ€™re exploiting a known bug (CVE-2024-40766) and weak password hygiene.

Migrating from Gen 6 to Gen 7 without resets? Thatโ€™s leaving doors wide open.

Full details + what to fix โ†’ https://thehackernews.com/2025/08/sonicwall-confirms-patched.html
๐Ÿค”8๐Ÿ‘3๐Ÿ˜3
๐Ÿšจ Microsoft just warned: CVE-2025-53786 lets hackers silently escalate privileges from on-prem Exchange to the cloud.

No logs. No easy traces.
Your hybrid setup could be a silent breach vector.

Full details + fixes โ†’ https://thehackernews.com/2025/08/microsoft-discloses-exchange-server.html
๐Ÿ‘8๐Ÿ˜7
๐Ÿšจ Hackers can hijack Axis camera networks without logging in.

A CVSS 9.0 flaw in Axis Device Manager & Camera Station enables pre-auth remote code executionโ€”impacting 6,500+ servers, mostly in the U.S.

Live feeds could be watched or shut down.

Details โ†’ https://thehackernews.com/2025/08/6500-axis-servers-expose-remoting.html
๐Ÿ”ฅ12๐Ÿ‘4
๐Ÿšจ 11 malicious Go packages just found โ€” infecting both Windows and Linux.

They silently download payloads, hijack shells, and can steal browser data.

Worse: they look legit, preying on confused devs importing from GitHub.

Details devs need to see โ†“ https://thehackernews.com/2025/08/malicious-go-npm-packages-deliver-cross.html
๐Ÿ˜10๐Ÿ”ฅ4๐Ÿค”1
๐Ÿšจ Cloud attacks now execute in under 10 minutes.

AI is fueling both sides:
๐Ÿ”’ 500% surge in AI workloads
โš ๏ธ CI/CD pipelines under fire
๐Ÿ›ก๏ธ Real-time defense is no longer optional

Real-time defense isnโ€™t optionalโ€”itโ€™s survival.

Full 2025 report โ†’ https://thehackernews.com/2025/08/the-ai-powered-security-shift-what-2025.html
๐Ÿ‘5โšก1
๐Ÿšจ Hackers are hijacking legit ad tools to push fake browser updatesโ€”spreading SocGholish malware linked to LockBit, Evil Corp & others.

Itโ€™s a Malware-as-a-Service network selling your device as a doorway in.

How it works โ†’ https://thehackernews.com/2025/08/socgholish-malware-spread-via-ad-tools.html
๐Ÿ‘12๐Ÿ‘5๐Ÿ˜3๐Ÿค”1
$1M in crypto goneโ€”stolen by 150+ fake Firefox wallet extensions.

The scam: lookalike MetaMask, TronLink, Exodus add-ons that start cleanโ€ฆ then turn malicious when no oneโ€™s watching.

Now spreading to Chrome. AI is helping them scale.

Full story โ†’ https://thehackernews.com/2025/08/greedybear-steals-1m-in-crypto-using.html
๐Ÿคฏ22๐Ÿ˜12๐Ÿ˜ฑ3
๐Ÿšจ RubyGems & PyPI under attack:

๐Ÿ”ธ 60 fake RubyGems stole social media logins (275K+ downloads)
๐Ÿ”ธ PyPI fakes hijacked crypto staking wallets

Both hide credential-stealing code in legit-looking packages.

Details โ†’ https://thehackernews.com/2025/08/rubygems-pypi-hit-by-malicious-packages.html
๐Ÿ”ฅ10๐Ÿค”1
๐Ÿšจ Stolen logins are now the #1 way hackers break in โ€” beating phishing & software flaws.

Many still work. Attackers donโ€™t need exploits when they can just log in.

Think your passwords are safe? You might want to check.

Full report โ†’ https://thehackernews.com/2025/08/leaked-credentials-up-160-what.html
๐Ÿ‘11๐Ÿ”ฅ1๐Ÿค”1
๐Ÿšจ Brazil hit by two cyber threats:

1๏ธโƒฃ Hackers using AI-built fake gov sites to steal IDs + cash via PIX.
2๏ธโƒฃ Efimer Trojan spreading via fake legal emails, torrents & WordPress hacks โ€” swapping crypto wallets + stealing funds.

How both attacks work โ†’ https://thehackernews.com/2025/08/ai-tools-fuel-brazilian-phishing-scam.html
๐Ÿ‘13๐Ÿ”ฅ7๐Ÿค”2๐Ÿ˜ฑ1