🚨 11 malicious Go packages just found — infecting both Windows and Linux.
They silently download payloads, hijack shells, and can steal browser data.
Worse: they look legit, preying on confused devs importing from GitHub.
Details devs need to see ↓ https://thehackernews.com/2025/08/malicious-go-npm-packages-deliver-cross.html
They silently download payloads, hijack shells, and can steal browser data.
Worse: they look legit, preying on confused devs importing from GitHub.
Details devs need to see ↓ https://thehackernews.com/2025/08/malicious-go-npm-packages-deliver-cross.html
😁10🔥4🤔1
🚨 Cloud attacks now execute in under 10 minutes.
AI is fueling both sides:
🔒 500% surge in AI workloads
⚠️ CI/CD pipelines under fire
🛡️ Real-time defense is no longer optional
Real-time defense isn’t optional—it’s survival.
Full 2025 report → https://thehackernews.com/2025/08/the-ai-powered-security-shift-what-2025.html
AI is fueling both sides:
🔒 500% surge in AI workloads
⚠️ CI/CD pipelines under fire
🛡️ Real-time defense is no longer optional
Real-time defense isn’t optional—it’s survival.
Full 2025 report → https://thehackernews.com/2025/08/the-ai-powered-security-shift-what-2025.html
👏5⚡1
🚨 Hackers are hijacking legit ad tools to push fake browser updates—spreading SocGholish malware linked to LockBit, Evil Corp & others.
It’s a Malware-as-a-Service network selling your device as a doorway in.
How it works → https://thehackernews.com/2025/08/socgholish-malware-spread-via-ad-tools.html
It’s a Malware-as-a-Service network selling your device as a doorway in.
How it works → https://thehackernews.com/2025/08/socgholish-malware-spread-via-ad-tools.html
👍12👏5😁3🤔1
$1M in crypto gone—stolen by 150+ fake Firefox wallet extensions.
The scam: lookalike MetaMask, TronLink, Exodus add-ons that start clean… then turn malicious when no one’s watching.
Now spreading to Chrome. AI is helping them scale.
Full story → https://thehackernews.com/2025/08/greedybear-steals-1m-in-crypto-using.html
The scam: lookalike MetaMask, TronLink, Exodus add-ons that start clean… then turn malicious when no one’s watching.
Now spreading to Chrome. AI is helping them scale.
Full story → https://thehackernews.com/2025/08/greedybear-steals-1m-in-crypto-using.html
🤯22😁12😱3
🚨 RubyGems & PyPI under attack:
🔸 60 fake RubyGems stole social media logins (275K+ downloads)
🔸 PyPI fakes hijacked crypto staking wallets
Both hide credential-stealing code in legit-looking packages.
Details → https://thehackernews.com/2025/08/rubygems-pypi-hit-by-malicious-packages.html
🔸 60 fake RubyGems stole social media logins (275K+ downloads)
🔸 PyPI fakes hijacked crypto staking wallets
Both hide credential-stealing code in legit-looking packages.
Details → https://thehackernews.com/2025/08/rubygems-pypi-hit-by-malicious-packages.html
🔥10🤔1
🚨 Stolen logins are now the #1 way hackers break in — beating phishing & software flaws.
Many still work. Attackers don’t need exploits when they can just log in.
Think your passwords are safe? You might want to check.
Full report → https://thehackernews.com/2025/08/leaked-credentials-up-160-what.html
Many still work. Attackers don’t need exploits when they can just log in.
Think your passwords are safe? You might want to check.
Full report → https://thehackernews.com/2025/08/leaked-credentials-up-160-what.html
👍11🔥1🤔1
🚨 Brazil hit by two cyber threats:
1️⃣ Hackers using AI-built fake gov sites to steal IDs + cash via PIX.
2️⃣ Efimer Trojan spreading via fake legal emails, torrents & WordPress hacks — swapping crypto wallets + stealing funds.
How both attacks work → https://thehackernews.com/2025/08/ai-tools-fuel-brazilian-phishing-scam.html
1️⃣ Hackers using AI-built fake gov sites to steal IDs + cash via PIX.
2️⃣ Efimer Trojan spreading via fake legal emails, torrents & WordPress hacks — swapping crypto wallets + stealing funds.
How both attacks work → https://thehackernews.com/2025/08/ai-tools-fuel-brazilian-phishing-scam.html
👏13🔥7🤔2😱1
🚨 14 new flaws in CyberArk & HashiCorp vaults can let hackers steal corporate secrets without a password — some bugs sat undetected for 9 years.
Researchers warn attackers could chain them for full remote takeover.
Full story → https://thehackernews.com/2025/08/cyberark-and-hashicorp-flaws-enable.html
Researchers warn attackers could chain them for full remote takeover.
Full story → https://thehackernews.com/2025/08/cyberark-and-hashicorp-flaws-enable.html
😁13🔥5👍3👏3😱2
🔥 GPT-5 jailbroken: “Echo Chamber” + storytelling tricked it into giving banned instructions.
Related zero-click prompt injections can exfiltrate data from Google Drive, Jira, Microsoft Copilot Studio, and even hijack smart homes.
Details → https://thehackernews.com/2025/08/researchers-uncover-gpt-5-jailbreak-and.html
Related zero-click prompt injections can exfiltrate data from Google Drive, Jira, Microsoft Copilot Studio, and even hijack smart homes.
Details → https://thehackernews.com/2025/08/researchers-uncover-gpt-5-jailbreak-and.html
😁48🔥17⚡3👏3🤔1
⚡ Lenovo webcams can be hacked into remote BadUSB weapons.
Flawed firmware checks let attackers send or infect a camera to inject keystrokes, survive wipes, and spread to other hosts.
Here’s how the “BadCam” exploit works → https://thehackernews.com/2025/08/linux-based-lenovo-webcams-flaw-can-be.html
Flawed firmware checks let attackers send or infect a camera to inject keystrokes, survive wipes, and spread to other hosts.
Here’s how the “BadCam” exploit works → https://thehackernews.com/2025/08/linux-based-lenovo-webcams-flaw-can-be.html
🤯23🔥10👏10😱7👍4
Hackers can bypass Windows login, steal cryptographic keys, and hide inside some Dell laptops even after a full OS reinstall — “ReVault” flaws hit 100+ models.
Sometimes, they don’t even need your password.
Details → https://thehackernews.com/2025/08/researchers-reveal-revault-attack.html
Sometimes, they don’t even need your password.
Details → https://thehackernews.com/2025/08/researchers-reveal-revault-attack.html
🤔21🔥15👍6🤯4😱4
🔥 Windows had a hole [CVE-2025-49760] in its core RPC system that let attackers pretend to be trusted services—like hijacking DNS, but inside your OS.
The wild part? Even Windows Defender’s ID could be spoofed.
Here’s how the EPM poisoning attack worked ↓ https://thehackernews.com/2025/08/researchers-detail-windows-epm.html
The wild part? Even Windows Defender’s ID could be spoofed.
Here’s how the EPM poisoning attack worked ↓ https://thehackernews.com/2025/08/researchers-detail-windows-epm.html
🤯27👍9🔥5😱3😁2🤔1
Hackers can now hijack Microsoft Domain Controllers into a global DDoS botnet—no malware, no creds, no trace.
At DEF CON, researchers revealed “Win-DDoS”: a flaw that can weaponize tens of thousands of public DCs to flood targets, crash systems, or trigger BSODs—remotely.
Here’s how it works → https://thehackernews.com/2025/08/new-win-ddos-flaws-let-attackers-turn.html
At DEF CON, researchers revealed “Win-DDoS”: a flaw that can weaponize tens of thousands of public DCs to flood targets, crash systems, or trigger BSODs—remotely.
Here’s how it works → https://thehackernews.com/2025/08/new-win-ddos-flaws-let-attackers-turn.html
🤔20😁7😱7👏6🔥3👍2
🛑 ALERT - Stop what you’re doing & update WinRAR.
A zero-day (CVE-2025-8088) is under active attack—booby-trapped archives can drop malware into Windows startup & hijack your PC.
Linked to Russian group “Paper Werewolf”
Update to v7.13 now. Details → https://thehackernews.com/2025/08/winrar-zero-day-under-active.html
A zero-day (CVE-2025-8088) is under active attack—booby-trapped archives can drop malware into Windows startup & hijack your PC.
Linked to Russian group “Paper Werewolf”
Update to v7.13 now. Details → https://thehackernews.com/2025/08/winrar-zero-day-under-active.html
🔥39👍15😱10😁6👏2🤯2
🔒 96% less remediation work. 📈 Stronger security.
One method is letting CISOs, CFOs & security teams speak the same language—business risk.
Here’s how orgs are protecting what truly drives revenue ↓ https://thehackernews.com/2025/08/6-lessons-learned-focusing-security.html
One method is letting CISOs, CFOs & security teams speak the same language—business risk.
Here’s how orgs are protecting what truly drives revenue ↓ https://thehackernews.com/2025/08/6-lessons-learned-focusing-security.html
🔥11👍5
🚨 Weekly Cybersecurity Recap is live!
WinRAR flaws, NVIDIA Triton risks, EDR bypass attacks, ransomware surge… and dozens more threats you need to know about.
🔗 Full roundup → https://thehackernews.com/2025/08/weekly-recap-badcam-attack-winrar-0-day.html
WinRAR flaws, NVIDIA Triton risks, EDR bypass attacks, ransomware surge… and dozens more threats you need to know about.
🔗 Full roundup → https://thehackernews.com/2025/08/weekly-recap-badcam-attack-winrar-0-day.html
👍10🤔4
🚨 Critical flaw in Erlang/OTP’s SSH (CVE-2025-32433) is being actively exploited — no credentials needed, full remote code execution possible.
Targets? Mostly OT networks — healthcare, agriculture, media, and high-tech sectors hit hardest.
Here’s why it’s a global threat ↓ https://thehackernews.com/2025/08/researchers-spot-surge-in-erlangotp-ssh.html
Targets? Mostly OT networks — healthcare, agriculture, media, and high-tech sectors hit hardest.
Here’s why it’s a global threat ↓ https://thehackernews.com/2025/08/researchers-spot-surge-in-erlangotp-ssh.html
🔥11👍4🤔4🤯2👏1
🚨 Police, military, and critical infrastructure radios worldwide are vulnerable — again.
Researchers just found new TETRA flaws letting attackers replay calls, brute-force “secure” comms, and inject fake voice/data — even on encrypted networks. No full fixes yet.
Here’s what’s at stake ↓ https://thehackernews.com/2025/08/new-tetra-radio-encryption-flaws-expose.html
Researchers just found new TETRA flaws letting attackers replay calls, brute-force “secure” comms, and inject fake voice/data — even on encrypted networks. No full fixes yet.
Here’s what’s at stake ↓ https://thehackernews.com/2025/08/new-tetra-radio-encryption-flaws-expose.html
🔥11🤔9👏4⚡3👍2😱2
🚨 WARNING: Dutch cyber watchdog confirms: a Citrix zero-day (CVE-2025-6543) was exploited for months before disclosure—hitting critical orgs, leaving hidden web shells, and erasing traces.
Patches are out. If you run NetScaler, act now.
Full story → https://thehackernews.com/2025/08/dutch-ncsc-confirms-active-exploitation.html
Patches are out. If you run NetScaler, act now.
Full story → https://thehackernews.com/2025/08/dutch-ncsc-confirms-active-exploitation.html
🤔7👍4😱2👏1😁1
New research by Pentera builds on Wiz’s IngressNightmare and reveals critical injection vulnerabilities in the widely used ingress-nginx Kubernetes controller.
Pentera’s team uncovered additional attack vectors that exploit common configuration oversights - going beyond the four originally disclosed CVEs. These newly discovered injection points can allow attackers to bypass security controls, execute arbitrary code, and pivot deeper into Kubernetes clusters.
👉 Join experts live on August 20 at 11:00 AM ET for a technical deep dive into the full scope of these vulnerabilities and their real-world impact: https://thn.news/IngressNightmare-webinar
Read the full research report 👉 https://thn.news/cyberattacks-explained
Pentera’s team uncovered additional attack vectors that exploit common configuration oversights - going beyond the four originally disclosed CVEs. These newly discovered injection points can allow attackers to bypass security controls, execute arbitrary code, and pivot deeper into Kubernetes clusters.
👉 Join experts live on August 20 at 11:00 AM ET for a technical deep dive into the full scope of these vulnerabilities and their real-world impact: https://thn.news/IngressNightmare-webinar
Read the full research report 👉 https://thn.news/cyberattacks-explained
👍7👏2🤔1