The Hacker News
151K subscribers
1.85K photos
10 videos
3 files
7.76K links
Official THN Telegram Channel — A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

📨 Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
🚨 Hackers can hijack Axis camera networks without logging in.

A CVSS 9.0 flaw in Axis Device Manager & Camera Station enables pre-auth remote code execution—impacting 6,500+ servers, mostly in the U.S.

Live feeds could be watched or shut down.

Details → https://thehackernews.com/2025/08/6500-axis-servers-expose-remoting.html
🔥12👏4
🚨 11 malicious Go packages just found — infecting both Windows and Linux.

They silently download payloads, hijack shells, and can steal browser data.

Worse: they look legit, preying on confused devs importing from GitHub.

Details devs need to see ↓ https://thehackernews.com/2025/08/malicious-go-npm-packages-deliver-cross.html
😁10🔥4🤔1
🚨 Cloud attacks now execute in under 10 minutes.

AI is fueling both sides:
🔒 500% surge in AI workloads
⚠️ CI/CD pipelines under fire
🛡️ Real-time defense is no longer optional

Real-time defense isn’t optional—it’s survival.

Full 2025 report → https://thehackernews.com/2025/08/the-ai-powered-security-shift-what-2025.html
👏51
🚨 Hackers are hijacking legit ad tools to push fake browser updates—spreading SocGholish malware linked to LockBit, Evil Corp & others.

It’s a Malware-as-a-Service network selling your device as a doorway in.

How it works → https://thehackernews.com/2025/08/socgholish-malware-spread-via-ad-tools.html
👍12👏5😁3🤔1
$1M in crypto gone—stolen by 150+ fake Firefox wallet extensions.

The scam: lookalike MetaMask, TronLink, Exodus add-ons that start clean… then turn malicious when no one’s watching.

Now spreading to Chrome. AI is helping them scale.

Full story → https://thehackernews.com/2025/08/greedybear-steals-1m-in-crypto-using.html
🤯22😁12😱3
🚨 RubyGems & PyPI under attack:

🔸 60 fake RubyGems stole social media logins (275K+ downloads)
🔸 PyPI fakes hijacked crypto staking wallets

Both hide credential-stealing code in legit-looking packages.

Details → https://thehackernews.com/2025/08/rubygems-pypi-hit-by-malicious-packages.html
🔥10🤔1
🚨 Stolen logins are now the #1 way hackers break in — beating phishing & software flaws.

Many still work. Attackers don’t need exploits when they can just log in.

Think your passwords are safe? You might want to check.

Full report → https://thehackernews.com/2025/08/leaked-credentials-up-160-what.html
👍11🔥1🤔1
🚨 Brazil hit by two cyber threats:

1️⃣ Hackers using AI-built fake gov sites to steal IDs + cash via PIX.
2️⃣ Efimer Trojan spreading via fake legal emails, torrents & WordPress hacks — swapping crypto wallets + stealing funds.

How both attacks work → https://thehackernews.com/2025/08/ai-tools-fuel-brazilian-phishing-scam.html
👏13🔥7🤔2😱1
🚨 14 new flaws in CyberArk & HashiCorp vaults can let hackers steal corporate secrets without a password — some bugs sat undetected for 9 years.

Researchers warn attackers could chain them for full remote takeover.

Full story → https://thehackernews.com/2025/08/cyberark-and-hashicorp-flaws-enable.html
😁13🔥5👍3👏3😱2
🔥 GPT-5 jailbroken: “Echo Chamber” + storytelling tricked it into giving banned instructions.

Related zero-click prompt injections can exfiltrate data from Google Drive, Jira, Microsoft Copilot Studio, and even hijack smart homes.

Details → https://thehackernews.com/2025/08/researchers-uncover-gpt-5-jailbreak-and.html
😁48🔥173👏3🤔1
Lenovo webcams can be hacked into remote BadUSB weapons.

Flawed firmware checks let attackers send or infect a camera to inject keystrokes, survive wipes, and spread to other hosts.

Here’s how the “BadCam” exploit works → https://thehackernews.com/2025/08/linux-based-lenovo-webcams-flaw-can-be.html
🤯23🔥10👏10😱7👍4
Hackers can bypass Windows login, steal cryptographic keys, and hide inside some Dell laptops even after a full OS reinstall — “ReVault” flaws hit 100+ models.

Sometimes, they don’t even need your password.

Details → https://thehackernews.com/2025/08/researchers-reveal-revault-attack.html
🤔21🔥15👍6🤯4😱4
🔥 Windows had a hole [CVE-2025-49760] in its core RPC system that let attackers pretend to be trusted services—like hijacking DNS, but inside your OS.

The wild part? Even Windows Defender’s ID could be spoofed.

Here’s how the EPM poisoning attack worked ↓ https://thehackernews.com/2025/08/researchers-detail-windows-epm.html
🤯27👍9🔥5😱3😁2🤔1
Hackers can now hijack Microsoft Domain Controllers into a global DDoS botnet—no malware, no creds, no trace.

At DEF CON, researchers revealed “Win-DDoS”: a flaw that can weaponize tens of thousands of public DCs to flood targets, crash systems, or trigger BSODs—remotely.

Here’s how it works → https://thehackernews.com/2025/08/new-win-ddos-flaws-let-attackers-turn.html
🤔20😁7😱7👏6🔥3👍2
🛑 ALERT - Stop what you’re doing & update WinRAR.

A zero-day (CVE-2025-8088) is under active attack—booby-trapped archives can drop malware into Windows startup & hijack your PC.

Linked to Russian group “Paper Werewolf”

Update to v7.13 now. Details → https://thehackernews.com/2025/08/winrar-zero-day-under-active.html
🔥39👍15😱10😁6👏2🤯2
🔒 96% less remediation work. 📈 Stronger security.

One method is letting CISOs, CFOs & security teams speak the same language—business risk.

Here’s how orgs are protecting what truly drives revenue ↓ https://thehackernews.com/2025/08/6-lessons-learned-focusing-security.html
🔥11👍5
🚨 Weekly Cybersecurity Recap is live!

WinRAR flaws, NVIDIA Triton risks, EDR bypass attacks, ransomware surge… and dozens more threats you need to know about.

🔗 Full roundup → https://thehackernews.com/2025/08/weekly-recap-badcam-attack-winrar-0-day.html
👍10🤔4
🚨 Critical flaw in Erlang/OTP’s SSH (CVE-2025-32433) is being actively exploited — no credentials needed, full remote code execution possible.

Targets? Mostly OT networks — healthcare, agriculture, media, and high-tech sectors hit hardest.

Here’s why it’s a global threat ↓ https://thehackernews.com/2025/08/researchers-spot-surge-in-erlangotp-ssh.html
🔥11👍4🤔4🤯2👏1
🚨 Police, military, and critical infrastructure radios worldwide are vulnerable — again.

Researchers just found new TETRA flaws letting attackers replay calls, brute-force “secure” comms, and inject fake voice/data — even on encrypted networks. No full fixes yet.

Here’s what’s at stake ↓ https://thehackernews.com/2025/08/new-tetra-radio-encryption-flaws-expose.html
🔥11🤔9👏43👍2😱2
🚨 WARNING: Dutch cyber watchdog confirms: a Citrix zero-day (CVE-2025-6543) was exploited for months before disclosure—hitting critical orgs, leaving hidden web shells, and erasing traces.

Patches are out. If you run NetScaler, act now.

Full story → https://thehackernews.com/2025/08/dutch-ncsc-confirms-active-exploitation.html
🤔7👍4😱2👏1😁1