๐ vCISO adoption just exploded 319% in one year.
MSPs & MSSPs are scrambling to meet SMB demandโand AI is powering the shift.
Itโs not just about security. Itโs driving higher margins, better upsell, and recurring revenue.
Check full report โ https://thehackernews.com/2025/08/ai-slashes-workloads-for-vcisos-by-68.html
MSPs & MSSPs are scrambling to meet SMB demandโand AI is powering the shift.
Itโs not just about security. Itโs driving higher margins, better upsell, and recurring revenue.
Check full report โ https://thehackernews.com/2025/08/ai-slashes-workloads-for-vcisos-by-68.html
๐4๐2
๐จ UPDATE: Google confirms it was hit in the Salesforce vishing attacks.
Hackers accessed contact data for small biz clients in Juneโthen vanished.
Now? They're back, threatening victims with 72-hour bitcoin extortion demands, posing as ShinyHunters.
Read โ https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html
Hackers accessed contact data for small biz clients in Juneโthen vanished.
Now? They're back, threatening victims with 72-hour bitcoin extortion demands, posing as ShinyHunters.
Read โ https://thehackernews.com/2025/06/google-exposes-vishing-group-unc6040.html
๐12๐10๐1
๐จ Millions duped by fake apps on Apple & Google stores.
VexTrio, a global crime ring, used bogus VPNs & cleaners to steal data, push ads, and charge hidden fees.
Itโs still active.
Details here โ https://thehackernews.com/2025/08/fake-vpn-and-spam-blocker-apps-tied-to.html
VexTrio, a global crime ring, used bogus VPNs & cleaners to steal data, push ads, and charge hidden fees.
Itโs still active.
Details here โ https://thehackernews.com/2025/08/fake-vpn-and-spam-blocker-apps-tied-to.html
๐14๐ฅ3๐ฑ3๐1
๐จ One container in Amazon ECS can now hijack all othersโ AWS creds on the same EC2 host.
Researchers exposed a stealthy privilege escalation chain called ECScape โ no exploit, just abusing AWS internals.
Amazon: "Working as designed."
Details โ https://thehackernews.com/2025/08/researchers-uncover-ecscape-flaw-in.html
Researchers exposed a stealthy privilege escalation chain called ECScape โ no exploit, just abusing AWS internals.
Amazon: "Working as designed."
Details โ https://thehackernews.com/2025/08/researchers-uncover-ecscape-flaw-in.html
๐คฏ17๐ฑ8๐5๐1
Your pip install isnโt as safe as you think.
From typo-squatting to CVE-packed base images, Python supply chain attacks are everywhereโand evolving fast.
๐ฅ Learn how to lock down your stack in 2025. Tools, tactics, and real-world examples:
Watch the webinar โ https://thehackernews.com/2025/08/webinar-how-to-stop-python-supply-chain.html
From typo-squatting to CVE-packed base images, Python supply chain attacks are everywhereโand evolving fast.
๐ฅ Learn how to lock down your stack in 2025. Tools, tactics, and real-world examples:
Watch the webinar โ https://thehackernews.com/2025/08/webinar-how-to-stop-python-supply-chain.html
๐คฏ16๐ฅ3๐ฑ1
๐จ Attackers are hitting SonicWall firewalls againโbut itโs not a new zero-day.
Turns out, theyโre exploiting a known bug (CVE-2024-40766) and weak password hygiene.
Migrating from Gen 6 to Gen 7 without resets? Thatโs leaving doors wide open.
Full details + what to fix โ https://thehackernews.com/2025/08/sonicwall-confirms-patched.html
Turns out, theyโre exploiting a known bug (CVE-2024-40766) and weak password hygiene.
Migrating from Gen 6 to Gen 7 without resets? Thatโs leaving doors wide open.
Full details + what to fix โ https://thehackernews.com/2025/08/sonicwall-confirms-patched.html
๐ค8๐3๐3
๐จ Microsoft just warned: CVE-2025-53786 lets hackers silently escalate privileges from on-prem Exchange to the cloud.
No logs. No easy traces.
Your hybrid setup could be a silent breach vector.
Full details + fixes โ https://thehackernews.com/2025/08/microsoft-discloses-exchange-server.html
No logs. No easy traces.
Your hybrid setup could be a silent breach vector.
Full details + fixes โ https://thehackernews.com/2025/08/microsoft-discloses-exchange-server.html
๐8๐7
๐จ Hackers can hijack Axis camera networks without logging in.
A CVSS 9.0 flaw in Axis Device Manager & Camera Station enables pre-auth remote code executionโimpacting 6,500+ servers, mostly in the U.S.
Live feeds could be watched or shut down.
Details โ https://thehackernews.com/2025/08/6500-axis-servers-expose-remoting.html
A CVSS 9.0 flaw in Axis Device Manager & Camera Station enables pre-auth remote code executionโimpacting 6,500+ servers, mostly in the U.S.
Live feeds could be watched or shut down.
Details โ https://thehackernews.com/2025/08/6500-axis-servers-expose-remoting.html
๐ฅ12๐4
๐จ 11 malicious Go packages just found โ infecting both Windows and Linux.
They silently download payloads, hijack shells, and can steal browser data.
Worse: they look legit, preying on confused devs importing from GitHub.
Details devs need to see โ https://thehackernews.com/2025/08/malicious-go-npm-packages-deliver-cross.html
They silently download payloads, hijack shells, and can steal browser data.
Worse: they look legit, preying on confused devs importing from GitHub.
Details devs need to see โ https://thehackernews.com/2025/08/malicious-go-npm-packages-deliver-cross.html
๐10๐ฅ4๐ค1
๐จ Cloud attacks now execute in under 10 minutes.
AI is fueling both sides:
๐ 500% surge in AI workloads
โ ๏ธ CI/CD pipelines under fire
๐ก๏ธ Real-time defense is no longer optional
Real-time defense isnโt optionalโitโs survival.
Full 2025 report โ https://thehackernews.com/2025/08/the-ai-powered-security-shift-what-2025.html
AI is fueling both sides:
๐ 500% surge in AI workloads
โ ๏ธ CI/CD pipelines under fire
๐ก๏ธ Real-time defense is no longer optional
Real-time defense isnโt optionalโitโs survival.
Full 2025 report โ https://thehackernews.com/2025/08/the-ai-powered-security-shift-what-2025.html
๐5โก1
๐จ Hackers are hijacking legit ad tools to push fake browser updatesโspreading SocGholish malware linked to LockBit, Evil Corp & others.
Itโs a Malware-as-a-Service network selling your device as a doorway in.
How it works โ https://thehackernews.com/2025/08/socgholish-malware-spread-via-ad-tools.html
Itโs a Malware-as-a-Service network selling your device as a doorway in.
How it works โ https://thehackernews.com/2025/08/socgholish-malware-spread-via-ad-tools.html
๐12๐5๐3๐ค1
$1M in crypto goneโstolen by 150+ fake Firefox wallet extensions.
The scam: lookalike MetaMask, TronLink, Exodus add-ons that start cleanโฆ then turn malicious when no oneโs watching.
Now spreading to Chrome. AI is helping them scale.
Full story โ https://thehackernews.com/2025/08/greedybear-steals-1m-in-crypto-using.html
The scam: lookalike MetaMask, TronLink, Exodus add-ons that start cleanโฆ then turn malicious when no oneโs watching.
Now spreading to Chrome. AI is helping them scale.
Full story โ https://thehackernews.com/2025/08/greedybear-steals-1m-in-crypto-using.html
๐คฏ22๐12๐ฑ3
๐จ RubyGems & PyPI under attack:
๐ธ 60 fake RubyGems stole social media logins (275K+ downloads)
๐ธ PyPI fakes hijacked crypto staking wallets
Both hide credential-stealing code in legit-looking packages.
Details โ https://thehackernews.com/2025/08/rubygems-pypi-hit-by-malicious-packages.html
๐ธ 60 fake RubyGems stole social media logins (275K+ downloads)
๐ธ PyPI fakes hijacked crypto staking wallets
Both hide credential-stealing code in legit-looking packages.
Details โ https://thehackernews.com/2025/08/rubygems-pypi-hit-by-malicious-packages.html
๐ฅ10๐ค1
๐จ Stolen logins are now the #1 way hackers break in โ beating phishing & software flaws.
Many still work. Attackers donโt need exploits when they can just log in.
Think your passwords are safe? You might want to check.
Full report โ https://thehackernews.com/2025/08/leaked-credentials-up-160-what.html
Many still work. Attackers donโt need exploits when they can just log in.
Think your passwords are safe? You might want to check.
Full report โ https://thehackernews.com/2025/08/leaked-credentials-up-160-what.html
๐11๐ฅ1๐ค1
๐จ Brazil hit by two cyber threats:
1๏ธโฃ Hackers using AI-built fake gov sites to steal IDs + cash via PIX.
2๏ธโฃ Efimer Trojan spreading via fake legal emails, torrents & WordPress hacks โ swapping crypto wallets + stealing funds.
How both attacks work โ https://thehackernews.com/2025/08/ai-tools-fuel-brazilian-phishing-scam.html
1๏ธโฃ Hackers using AI-built fake gov sites to steal IDs + cash via PIX.
2๏ธโฃ Efimer Trojan spreading via fake legal emails, torrents & WordPress hacks โ swapping crypto wallets + stealing funds.
How both attacks work โ https://thehackernews.com/2025/08/ai-tools-fuel-brazilian-phishing-scam.html
๐13๐ฅ7๐ค2๐ฑ1
๐จ 14 new flaws in CyberArk & HashiCorp vaults can let hackers steal corporate secrets without a password โ some bugs sat undetected for 9 years.
Researchers warn attackers could chain them for full remote takeover.
Full story โ https://thehackernews.com/2025/08/cyberark-and-hashicorp-flaws-enable.html
Researchers warn attackers could chain them for full remote takeover.
Full story โ https://thehackernews.com/2025/08/cyberark-and-hashicorp-flaws-enable.html
๐13๐ฅ5๐3๐3๐ฑ2
๐ฅ GPT-5 jailbroken: โEcho Chamberโ + storytelling tricked it into giving banned instructions.
Related zero-click prompt injections can exfiltrate data from Google Drive, Jira, Microsoft Copilot Studio, and even hijack smart homes.
Details โ https://thehackernews.com/2025/08/researchers-uncover-gpt-5-jailbreak-and.html
Related zero-click prompt injections can exfiltrate data from Google Drive, Jira, Microsoft Copilot Studio, and even hijack smart homes.
Details โ https://thehackernews.com/2025/08/researchers-uncover-gpt-5-jailbreak-and.html
๐48๐ฅ17โก3๐3๐ค1
โก Lenovo webcams can be hacked into remote BadUSB weapons.
Flawed firmware checks let attackers send or infect a camera to inject keystrokes, survive wipes, and spread to other hosts.
Hereโs how the โBadCamโ exploit works โ https://thehackernews.com/2025/08/linux-based-lenovo-webcams-flaw-can-be.html
Flawed firmware checks let attackers send or infect a camera to inject keystrokes, survive wipes, and spread to other hosts.
Hereโs how the โBadCamโ exploit works โ https://thehackernews.com/2025/08/linux-based-lenovo-webcams-flaw-can-be.html
๐คฏ23๐ฅ10๐10๐ฑ7๐4
Hackers can bypass Windows login, steal cryptographic keys, and hide inside some Dell laptops even after a full OS reinstall โ โReVaultโ flaws hit 100+ models.
Sometimes, they donโt even need your password.
Details โ https://thehackernews.com/2025/08/researchers-reveal-revault-attack.html
Sometimes, they donโt even need your password.
Details โ https://thehackernews.com/2025/08/researchers-reveal-revault-attack.html
๐ค21๐ฅ15๐6๐คฏ4๐ฑ4
๐ฅ Windows had a hole [CVE-2025-49760] in its core RPC system that let attackers pretend to be trusted servicesโlike hijacking DNS, but inside your OS.
The wild part? Even Windows Defenderโs ID could be spoofed.
Hereโs how the EPM poisoning attack worked โ https://thehackernews.com/2025/08/researchers-detail-windows-epm.html
The wild part? Even Windows Defenderโs ID could be spoofed.
Hereโs how the EPM poisoning attack worked โ https://thehackernews.com/2025/08/researchers-detail-windows-epm.html
๐คฏ27๐9๐ฅ5๐ฑ3๐2๐ค1