🚨 Attackers are hitting SonicWall firewalls again—but it’s not a new zero-day.
Turns out, they’re exploiting a known bug (CVE-2024-40766) and weak password hygiene.
Migrating from Gen 6 to Gen 7 without resets? That’s leaving doors wide open.
Full details + what to fix → https://thehackernews.com/2025/08/sonicwall-confirms-patched.html
Turns out, they’re exploiting a known bug (CVE-2024-40766) and weak password hygiene.
Migrating from Gen 6 to Gen 7 without resets? That’s leaving doors wide open.
Full details + what to fix → https://thehackernews.com/2025/08/sonicwall-confirms-patched.html
🤔8👍3😁3
🚨 Microsoft just warned: CVE-2025-53786 lets hackers silently escalate privileges from on-prem Exchange to the cloud.
No logs. No easy traces.
Your hybrid setup could be a silent breach vector.
Full details + fixes → https://thehackernews.com/2025/08/microsoft-discloses-exchange-server.html
No logs. No easy traces.
Your hybrid setup could be a silent breach vector.
Full details + fixes → https://thehackernews.com/2025/08/microsoft-discloses-exchange-server.html
👏8😁7
🚨 Hackers can hijack Axis camera networks without logging in.
A CVSS 9.0 flaw in Axis Device Manager & Camera Station enables pre-auth remote code execution—impacting 6,500+ servers, mostly in the U.S.
Live feeds could be watched or shut down.
Details → https://thehackernews.com/2025/08/6500-axis-servers-expose-remoting.html
A CVSS 9.0 flaw in Axis Device Manager & Camera Station enables pre-auth remote code execution—impacting 6,500+ servers, mostly in the U.S.
Live feeds could be watched or shut down.
Details → https://thehackernews.com/2025/08/6500-axis-servers-expose-remoting.html
🔥12👏4
🚨 11 malicious Go packages just found — infecting both Windows and Linux.
They silently download payloads, hijack shells, and can steal browser data.
Worse: they look legit, preying on confused devs importing from GitHub.
Details devs need to see ↓ https://thehackernews.com/2025/08/malicious-go-npm-packages-deliver-cross.html
They silently download payloads, hijack shells, and can steal browser data.
Worse: they look legit, preying on confused devs importing from GitHub.
Details devs need to see ↓ https://thehackernews.com/2025/08/malicious-go-npm-packages-deliver-cross.html
😁10🔥4🤔1
🚨 Cloud attacks now execute in under 10 minutes.
AI is fueling both sides:
🔒 500% surge in AI workloads
⚠️ CI/CD pipelines under fire
🛡️ Real-time defense is no longer optional
Real-time defense isn’t optional—it’s survival.
Full 2025 report → https://thehackernews.com/2025/08/the-ai-powered-security-shift-what-2025.html
AI is fueling both sides:
🔒 500% surge in AI workloads
⚠️ CI/CD pipelines under fire
🛡️ Real-time defense is no longer optional
Real-time defense isn’t optional—it’s survival.
Full 2025 report → https://thehackernews.com/2025/08/the-ai-powered-security-shift-what-2025.html
👏5⚡1
🚨 Hackers are hijacking legit ad tools to push fake browser updates—spreading SocGholish malware linked to LockBit, Evil Corp & others.
It’s a Malware-as-a-Service network selling your device as a doorway in.
How it works → https://thehackernews.com/2025/08/socgholish-malware-spread-via-ad-tools.html
It’s a Malware-as-a-Service network selling your device as a doorway in.
How it works → https://thehackernews.com/2025/08/socgholish-malware-spread-via-ad-tools.html
👍12👏5😁3🤔1
$1M in crypto gone—stolen by 150+ fake Firefox wallet extensions.
The scam: lookalike MetaMask, TronLink, Exodus add-ons that start clean… then turn malicious when no one’s watching.
Now spreading to Chrome. AI is helping them scale.
Full story → https://thehackernews.com/2025/08/greedybear-steals-1m-in-crypto-using.html
The scam: lookalike MetaMask, TronLink, Exodus add-ons that start clean… then turn malicious when no one’s watching.
Now spreading to Chrome. AI is helping them scale.
Full story → https://thehackernews.com/2025/08/greedybear-steals-1m-in-crypto-using.html
🤯22😁12😱3
🚨 RubyGems & PyPI under attack:
🔸 60 fake RubyGems stole social media logins (275K+ downloads)
🔸 PyPI fakes hijacked crypto staking wallets
Both hide credential-stealing code in legit-looking packages.
Details → https://thehackernews.com/2025/08/rubygems-pypi-hit-by-malicious-packages.html
🔸 60 fake RubyGems stole social media logins (275K+ downloads)
🔸 PyPI fakes hijacked crypto staking wallets
Both hide credential-stealing code in legit-looking packages.
Details → https://thehackernews.com/2025/08/rubygems-pypi-hit-by-malicious-packages.html
🔥10🤔1
🚨 Stolen logins are now the #1 way hackers break in — beating phishing & software flaws.
Many still work. Attackers don’t need exploits when they can just log in.
Think your passwords are safe? You might want to check.
Full report → https://thehackernews.com/2025/08/leaked-credentials-up-160-what.html
Many still work. Attackers don’t need exploits when they can just log in.
Think your passwords are safe? You might want to check.
Full report → https://thehackernews.com/2025/08/leaked-credentials-up-160-what.html
👍11🔥1🤔1
🚨 Brazil hit by two cyber threats:
1️⃣ Hackers using AI-built fake gov sites to steal IDs + cash via PIX.
2️⃣ Efimer Trojan spreading via fake legal emails, torrents & WordPress hacks — swapping crypto wallets + stealing funds.
How both attacks work → https://thehackernews.com/2025/08/ai-tools-fuel-brazilian-phishing-scam.html
1️⃣ Hackers using AI-built fake gov sites to steal IDs + cash via PIX.
2️⃣ Efimer Trojan spreading via fake legal emails, torrents & WordPress hacks — swapping crypto wallets + stealing funds.
How both attacks work → https://thehackernews.com/2025/08/ai-tools-fuel-brazilian-phishing-scam.html
👏13🔥7🤔2😱1
🚨 14 new flaws in CyberArk & HashiCorp vaults can let hackers steal corporate secrets without a password — some bugs sat undetected for 9 years.
Researchers warn attackers could chain them for full remote takeover.
Full story → https://thehackernews.com/2025/08/cyberark-and-hashicorp-flaws-enable.html
Researchers warn attackers could chain them for full remote takeover.
Full story → https://thehackernews.com/2025/08/cyberark-and-hashicorp-flaws-enable.html
😁13🔥5👍3👏3😱2
🔥 GPT-5 jailbroken: “Echo Chamber” + storytelling tricked it into giving banned instructions.
Related zero-click prompt injections can exfiltrate data from Google Drive, Jira, Microsoft Copilot Studio, and even hijack smart homes.
Details → https://thehackernews.com/2025/08/researchers-uncover-gpt-5-jailbreak-and.html
Related zero-click prompt injections can exfiltrate data from Google Drive, Jira, Microsoft Copilot Studio, and even hijack smart homes.
Details → https://thehackernews.com/2025/08/researchers-uncover-gpt-5-jailbreak-and.html
😁48🔥17⚡3👏3🤔1
⚡ Lenovo webcams can be hacked into remote BadUSB weapons.
Flawed firmware checks let attackers send or infect a camera to inject keystrokes, survive wipes, and spread to other hosts.
Here’s how the “BadCam” exploit works → https://thehackernews.com/2025/08/linux-based-lenovo-webcams-flaw-can-be.html
Flawed firmware checks let attackers send or infect a camera to inject keystrokes, survive wipes, and spread to other hosts.
Here’s how the “BadCam” exploit works → https://thehackernews.com/2025/08/linux-based-lenovo-webcams-flaw-can-be.html
🤯23🔥10👏10😱7👍4
Hackers can bypass Windows login, steal cryptographic keys, and hide inside some Dell laptops even after a full OS reinstall — “ReVault” flaws hit 100+ models.
Sometimes, they don’t even need your password.
Details → https://thehackernews.com/2025/08/researchers-reveal-revault-attack.html
Sometimes, they don’t even need your password.
Details → https://thehackernews.com/2025/08/researchers-reveal-revault-attack.html
🤔21🔥15👍6🤯4😱4
🔥 Windows had a hole [CVE-2025-49760] in its core RPC system that let attackers pretend to be trusted services—like hijacking DNS, but inside your OS.
The wild part? Even Windows Defender’s ID could be spoofed.
Here’s how the EPM poisoning attack worked ↓ https://thehackernews.com/2025/08/researchers-detail-windows-epm.html
The wild part? Even Windows Defender’s ID could be spoofed.
Here’s how the EPM poisoning attack worked ↓ https://thehackernews.com/2025/08/researchers-detail-windows-epm.html
🤯27👍9🔥5😱3😁2🤔1
Hackers can now hijack Microsoft Domain Controllers into a global DDoS botnet—no malware, no creds, no trace.
At DEF CON, researchers revealed “Win-DDoS”: a flaw that can weaponize tens of thousands of public DCs to flood targets, crash systems, or trigger BSODs—remotely.
Here’s how it works → https://thehackernews.com/2025/08/new-win-ddos-flaws-let-attackers-turn.html
At DEF CON, researchers revealed “Win-DDoS”: a flaw that can weaponize tens of thousands of public DCs to flood targets, crash systems, or trigger BSODs—remotely.
Here’s how it works → https://thehackernews.com/2025/08/new-win-ddos-flaws-let-attackers-turn.html
🤔20😁7😱7👏6🔥3👍2
🛑 ALERT - Stop what you’re doing & update WinRAR.
A zero-day (CVE-2025-8088) is under active attack—booby-trapped archives can drop malware into Windows startup & hijack your PC.
Linked to Russian group “Paper Werewolf”
Update to v7.13 now. Details → https://thehackernews.com/2025/08/winrar-zero-day-under-active.html
A zero-day (CVE-2025-8088) is under active attack—booby-trapped archives can drop malware into Windows startup & hijack your PC.
Linked to Russian group “Paper Werewolf”
Update to v7.13 now. Details → https://thehackernews.com/2025/08/winrar-zero-day-under-active.html
🔥39👍15😱10😁6👏2🤯2
🔒 96% less remediation work. 📈 Stronger security.
One method is letting CISOs, CFOs & security teams speak the same language—business risk.
Here’s how orgs are protecting what truly drives revenue ↓ https://thehackernews.com/2025/08/6-lessons-learned-focusing-security.html
One method is letting CISOs, CFOs & security teams speak the same language—business risk.
Here’s how orgs are protecting what truly drives revenue ↓ https://thehackernews.com/2025/08/6-lessons-learned-focusing-security.html
🔥11👍5
🚨 Weekly Cybersecurity Recap is live!
WinRAR flaws, NVIDIA Triton risks, EDR bypass attacks, ransomware surge… and dozens more threats you need to know about.
🔗 Full roundup → https://thehackernews.com/2025/08/weekly-recap-badcam-attack-winrar-0-day.html
WinRAR flaws, NVIDIA Triton risks, EDR bypass attacks, ransomware surge… and dozens more threats you need to know about.
🔗 Full roundup → https://thehackernews.com/2025/08/weekly-recap-badcam-attack-winrar-0-day.html
👍10🤔4
🚨 Critical flaw in Erlang/OTP’s SSH (CVE-2025-32433) is being actively exploited — no credentials needed, full remote code execution possible.
Targets? Mostly OT networks — healthcare, agriculture, media, and high-tech sectors hit hardest.
Here’s why it’s a global threat ↓ https://thehackernews.com/2025/08/researchers-spot-surge-in-erlangotp-ssh.html
Targets? Mostly OT networks — healthcare, agriculture, media, and high-tech sectors hit hardest.
Here’s why it’s a global threat ↓ https://thehackernews.com/2025/08/researchers-spot-surge-in-erlangotp-ssh.html
🔥11👍4🤔4🤯2👏1