The Hacker News
โœ”
151K subscribers
1.85K photos
10 videos
3 files
7.76K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: [email protected]

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿšจ Brazil hit by two cyber threats:

1๏ธโƒฃ Hackers using AI-built fake gov sites to steal IDs + cash via PIX.
2๏ธโƒฃ Efimer Trojan spreading via fake legal emails, torrents & WordPress hacks โ€” swapping crypto wallets + stealing funds.

How both attacks work โ†’ https://thehackernews.com/2025/08/ai-tools-fuel-brazilian-phishing-scam.html
๐Ÿ‘13๐Ÿ”ฅ7๐Ÿค”2๐Ÿ˜ฑ1
๐Ÿšจ 14 new flaws in CyberArk & HashiCorp vaults can let hackers steal corporate secrets without a password โ€” some bugs sat undetected for 9 years.

Researchers warn attackers could chain them for full remote takeover.

Full story โ†’ https://thehackernews.com/2025/08/cyberark-and-hashicorp-flaws-enable.html
๐Ÿ˜13๐Ÿ”ฅ5๐Ÿ‘3๐Ÿ‘3๐Ÿ˜ฑ2
๐Ÿ”ฅ GPT-5 jailbroken: โ€œEcho Chamberโ€ + storytelling tricked it into giving banned instructions.

Related zero-click prompt injections can exfiltrate data from Google Drive, Jira, Microsoft Copilot Studio, and even hijack smart homes.

Details โ†’ https://thehackernews.com/2025/08/researchers-uncover-gpt-5-jailbreak-and.html
๐Ÿ˜48๐Ÿ”ฅ17โšก3๐Ÿ‘3๐Ÿค”1
โšก Lenovo webcams can be hacked into remote BadUSB weapons.

Flawed firmware checks let attackers send or infect a camera to inject keystrokes, survive wipes, and spread to other hosts.

Hereโ€™s how the โ€œBadCamโ€ exploit works โ†’ https://thehackernews.com/2025/08/linux-based-lenovo-webcams-flaw-can-be.html
๐Ÿคฏ23๐Ÿ”ฅ10๐Ÿ‘10๐Ÿ˜ฑ7๐Ÿ‘4
Hackers can bypass Windows login, steal cryptographic keys, and hide inside some Dell laptops even after a full OS reinstall โ€” โ€œReVaultโ€ flaws hit 100+ models.

Sometimes, they donโ€™t even need your password.

Details โ†’ https://thehackernews.com/2025/08/researchers-reveal-revault-attack.html
๐Ÿค”21๐Ÿ”ฅ15๐Ÿ‘6๐Ÿคฏ4๐Ÿ˜ฑ4
๐Ÿ”ฅ Windows had a hole [CVE-2025-49760] in its core RPC system that let attackers pretend to be trusted servicesโ€”like hijacking DNS, but inside your OS.

The wild part? Even Windows Defenderโ€™s ID could be spoofed.

Hereโ€™s how the EPM poisoning attack worked โ†“ https://thehackernews.com/2025/08/researchers-detail-windows-epm.html
๐Ÿคฏ27๐Ÿ‘9๐Ÿ”ฅ5๐Ÿ˜ฑ3๐Ÿ˜2๐Ÿค”1
Hackers can now hijack Microsoft Domain Controllers into a global DDoS botnetโ€”no malware, no creds, no trace.

At DEF CON, researchers revealed โ€œWin-DDoSโ€: a flaw that can weaponize tens of thousands of public DCs to flood targets, crash systems, or trigger BSODsโ€”remotely.

Hereโ€™s how it works โ†’ https://thehackernews.com/2025/08/new-win-ddos-flaws-let-attackers-turn.html
๐Ÿค”20๐Ÿ˜7๐Ÿ˜ฑ7๐Ÿ‘6๐Ÿ”ฅ3๐Ÿ‘2
๐Ÿ›‘ ALERT - Stop what youโ€™re doing & update WinRAR.

A zero-day (CVE-2025-8088) is under active attackโ€”booby-trapped archives can drop malware into Windows startup & hijack your PC.

Linked to Russian group โ€œPaper Werewolfโ€

Update to v7.13 now. Details โ†’ https://thehackernews.com/2025/08/winrar-zero-day-under-active.html
๐Ÿ”ฅ39๐Ÿ‘15๐Ÿ˜ฑ10๐Ÿ˜6๐Ÿ‘2๐Ÿคฏ2
๐Ÿ”’ 96% less remediation work. ๐Ÿ“ˆ Stronger security.

One method is letting CISOs, CFOs & security teams speak the same languageโ€”business risk.

Hereโ€™s how orgs are protecting what truly drives revenue โ†“ https://thehackernews.com/2025/08/6-lessons-learned-focusing-security.html
๐Ÿ”ฅ11๐Ÿ‘5
๐Ÿšจ Weekly Cybersecurity Recap is live!

WinRAR flaws, NVIDIA Triton risks, EDR bypass attacks, ransomware surgeโ€ฆ and dozens more threats you need to know about.

๐Ÿ”— Full roundup โ†’ https://thehackernews.com/2025/08/weekly-recap-badcam-attack-winrar-0-day.html
๐Ÿ‘10๐Ÿค”4
๐Ÿšจ Critical flaw in Erlang/OTPโ€™s SSH (CVE-2025-32433) is being actively exploited โ€” no credentials needed, full remote code execution possible.

Targets? Mostly OT networks โ€” healthcare, agriculture, media, and high-tech sectors hit hardest.

Hereโ€™s why itโ€™s a global threat โ†“ https://thehackernews.com/2025/08/researchers-spot-surge-in-erlangotp-ssh.html
๐Ÿ”ฅ11๐Ÿ‘4๐Ÿค”4๐Ÿคฏ2๐Ÿ‘1
๐Ÿšจ Police, military, and critical infrastructure radios worldwide are vulnerable โ€” again.

Researchers just found new TETRA flaws letting attackers replay calls, brute-force โ€œsecureโ€ comms, and inject fake voice/data โ€” even on encrypted networks. No full fixes yet.

Hereโ€™s whatโ€™s at stake โ†“ https://thehackernews.com/2025/08/new-tetra-radio-encryption-flaws-expose.html
๐Ÿ”ฅ11๐Ÿค”9๐Ÿ‘4โšก3๐Ÿ‘2๐Ÿ˜ฑ2
๐Ÿšจ WARNING: Dutch cyber watchdog confirms: a Citrix zero-day (CVE-2025-6543) was exploited for months before disclosureโ€”hitting critical orgs, leaving hidden web shells, and erasing traces.

Patches are out. If you run NetScaler, act now.

Full story โ†’ https://thehackernews.com/2025/08/dutch-ncsc-confirms-active-exploitation.html
๐Ÿค”7๐Ÿ‘4๐Ÿ˜ฑ2๐Ÿ‘1๐Ÿ˜1
New research by Pentera builds on Wizโ€™s IngressNightmare and reveals critical injection vulnerabilities in the widely used ingress-nginx Kubernetes controller.

Penteraโ€™s team uncovered additional attack vectors that exploit common configuration oversights - going beyond the four originally disclosed CVEs. These newly discovered injection points can allow attackers to bypass security controls, execute arbitrary code, and pivot deeper into Kubernetes clusters.

๐Ÿ‘‰ Join experts live on August 20 at 11:00 AM ET for a technical deep dive into the full scope of these vulnerabilities and their real-world impact: https://thn.news/IngressNightmare-webinar

Read the full research report ๐Ÿ‘‰ https://thn.news/cyberattacks-explained
๐Ÿ‘7๐Ÿ‘2๐Ÿค”1
๐Ÿ‡ท๐Ÿ‡บ New Threat: Curly COMrades hacked govt & energy networks in Georgia & Moldova โ€” stealing credentials & hiding for months.

Their secret weapon? Hijacking Windowsโ€™ own components to run commands as SYSTEMโ€ฆ and no one notices.

Find details here โ†’ https://thehackernews.com/2025/08/new-curly-comrades-apt-using-ngen-com.html
๐Ÿคฏ11๐Ÿ˜2๐Ÿ”ฅ1๐Ÿ‘1
Identity attacks are evolving, but are your IR playbooks keeping up? Join Push Security's Josh Gideon on August 13th & 14th as he dives into the new challenges facing incident responders in the cloud. Don't miss out on a step-by-step walkthrough of how security teams are using browser telemetry to supercharge their security investigations.

Register here: https://thn.news/identity-attacks-webinar-tg
๐Ÿ‘7
๐Ÿšจ Your browser is now your biggest insider threat.

๐Ÿค– GenAI prompts
โš ๏ธ Risky extensions
๐Ÿ’ป Unmanaged devices

All leaking data in-session.

๐ŸฅŠ Enterprise Browser vs. Secure Extension โ€” 9 brutal rounds.

Who wins? โ†’ https://thehackernews.com/2025/08/the-ultimate-battle-enterprise-browsers.html
๐Ÿค”14๐Ÿ‘4๐Ÿ‘2
โš ๏ธ Two of the most dangerous hacker groups โ€” ShinyHunters & Scattered Spider โ€” are joining forces.

Theyโ€™ve hit Salesforce users worldwide, and signs show their next big target: banks & financial firms.

Hereโ€™s why this alliance is bad news โ†“ https://thehackernews.com/2025/08/cybercrime-groups-shinyhunters.html
๐Ÿ˜12๐Ÿคฏ7๐Ÿค”4๐Ÿ‘2๐Ÿ‘1
๐Ÿšจ 780+ malicious IPs just launched a coordinated brute-force attack on Fortinet SSL VPNs โ€” shifting mid-campaign to hit FortiManager.

Researchers warn this pattern often precedes a new CVE disclosure within weeks.

Read โ†’ https://thehackernews.com/2025/08/fortinet-ssl-vpns-hit-by-global-brute.html
๐Ÿ˜15๐Ÿค”6โšก4๐Ÿ”ฅ1
๐Ÿšจ Over a year after the XZ Utils backdoor was exposed, 35 infected Docker images are still live on Docker Hub โ€” some built on top of each other, quietly spreading the malware.

They can let attackers bypass SSH auth & run root commands.

Full story โ†’ https://thehackernews.com/2025/08/researchers-spot-xz-utils-backdoor-in.html
๐Ÿ˜ฑ11๐Ÿ˜9๐Ÿคฏ5๐Ÿ”ฅ2โšก1๐Ÿค”1