🚨 New supply-chain attacks hit open-source repos.
• PyPI: termncolor & colorinal delivered multi-stage malware with Windows & Linux backdoors.
• npm: fake packages posed as dev tools & job tests, stealing iCloud Keychain, browser data, wallets.
Details → https://thehackernews.com/2025/08/malicious-pypi-and-npm-packages.html
• PyPI: termncolor & colorinal delivered multi-stage malware with Windows & Linux backdoors.
• npm: fake packages posed as dev tools & job tests, stealing iCloud Keychain, browser data, wallets.
Details → https://thehackernews.com/2025/08/malicious-pypi-and-npm-packages.html
🤯9😁4👍2
🚨 Compliance isn’t optional. Fail GDPR, HIPAA, or PCI DSS → massive fines, lawsuits, even shutdowns.
The scary part? Most don’t even know where they’re failing.
Here’s how Wazuh helps fix it:
✅ Real-time alerts
✅ Compliance dashboards
✅ Active response
Read this now → https://thehackernews.com/2025/08/wazuh-for-regulatory-compliance.html
The scary part? Most don’t even know where they’re failing.
Here’s how Wazuh helps fix it:
✅ Real-time alerts
✅ Compliance dashboards
✅ Active response
Read this now → https://thehackernews.com/2025/08/wazuh-for-regulatory-compliance.html
👍23
46% of security leaders lose sleep over growing regulatory complexity.
Move beyond checkbox compliance and turn GRC into a strategic advantage with this new Tines guide.
What's in the guide:
🔸 Common challenges for security and compliance teams today
🔸 Four areas where GRC teams can leverage workflow orchestration and automation for immediate impact
🔸 Case study stories from Druva, Path AI, and more
Get the full guide here: https://thn.news/automating-grc-guide
Move beyond checkbox compliance and turn GRC into a strategic advantage with this new Tines guide.
What's in the guide:
🔸 Common challenges for security and compliance teams today
🔸 Four areas where GRC teams can leverage workflow orchestration and automation for immediate impact
🔸 Case study stories from Druva, Path AI, and more
Get the full guide here: https://thn.news/automating-grc-guide
😁12
⚡ Cybersecurity isn’t failing in one big breach—it’s leaking everywhere.
This week’s signals show just how fast cracks turn into collapse:
– NFC trojan stealing cards via “tap-to-pay” 🎴
– Active exploits in N-able N-central
– Espionage ops in Georgia & Moldova
– Docker Hub images still hiding the XZ backdoor
– U.S. expands crypto sanctions
– Hackers rushing to weaponize new CVEs
Each story points to one truth: hesitation = risk.
Read full RECAP → https://thehackernews.com/2025/08/weekly-recap-nfc-fraud-curly-comrades-n.html
This week’s signals show just how fast cracks turn into collapse:
– NFC trojan stealing cards via “tap-to-pay” 🎴
– Active exploits in N-able N-central
– Espionage ops in Georgia & Moldova
– Docker Hub images still hiding the XZ backdoor
– U.S. expands crypto sanctions
– Hackers rushing to weaponize new CVEs
Each story points to one truth: hesitation = risk.
Read full RECAP → https://thehackernews.com/2025/08/weekly-recap-nfc-fraud-curly-comrades-n.html
🤯9😁4😱2
⚠️ Hackers just weaponized a new Windows flaw (CVE-2025-29824) to drop the PipeMagic backdoor—fueling RansomExx attacks.
The bait? Fake ChatGPT apps and Chrome updates.
Still active. Still evolving.
Details here → https://thehackernews.com/2025/08/microsoft-windows-vulnerability.html
The bait? Fake ChatGPT apps and Chrome updates.
Still active. Still evolving.
Details here → https://thehackernews.com/2025/08/microsoft-windows-vulnerability.html
🔥15🤯2👍1😱1
That copyright email in your inbox? It might not be legal trouble—it might be malware.
The “Noodlophile” attack hides in fake copyright notices, abuses Telegram, and slips past security tools.
If your brand lives on social media—you’re a target.
Here’s how it works ↓ https://thehackernews.com/2025/08/noodlophile-malware-campaign-expands.html
The “Noodlophile” attack hides in fake copyright notices, abuses Telegram, and slips past security tools.
If your brand lives on social media—you’re a target.
Here’s how it works ↓ https://thehackernews.com/2025/08/noodlophile-malware-campaign-expands.html
🤔13👍5👏1
⚡ Microsoft warns: PipeMagic isn’t malware—it’s a framework for stealth attacks. Storm-2460 is hitting IT, finance & real estate worldwide.
Details → https://thehackernews.com/2025/08/microsoft-windows-vulnerability.html
Details → https://thehackernews.com/2025/08/microsoft-windows-vulnerability.html
🤯11🤔5🔥4
⚡ PyPI just killed a major supply chain threat.
Over 1,800 email addresses tied to expired domains have been unverified—closing a loophole attackers used to hijack Python packages.
It’s a win, but not a cure-all.
👉 Full story ↓ https://thehackernews.com/2025/08/pypi-blocks-1800-expired-domain-emails.html
Over 1,800 email addresses tied to expired domains have been unverified—closing a loophole attackers used to hijack Python packages.
It’s a win, but not a cure-all.
👉 Full story ↓ https://thehackernews.com/2025/08/pypi-blocks-1800-expired-domain-emails.html
⚡11🤯6
Russia’s Secret Blizzard just did something scarier than phishing → They hacked the root of trust—bypassing MFA and silently stealing “secure” traffic.
When TLS itself is broken, FIDO and MFA collapse.
How to defend against state-level attacks ↓ https://thehackernews.com/expert-insights/2025/08/how-to-defend-against-root-of-trust.html
When TLS itself is broken, FIDO and MFA collapse.
How to defend against state-level attacks ↓ https://thehackernews.com/expert-insights/2025/08/how-to-defend-against-root-of-trust.html
🔥26👏4
The U.K. just dropped its demand that Apple build a backdoor into iCloud.
That order would’ve opened Americans’ encrypted data to governments—and hackers.
The plan’s dead. But the fight over encryption isn’t.
Here’s what happened → https://thehackernews.com/2025/08/uk-government-drops-apple-encryption.html
That order would’ve opened Americans’ encrypted data to governments—and hackers.
The plan’s dead. But the fight over encryption isn’t.
Here’s what happened → https://thehackernews.com/2025/08/uk-government-drops-apple-encryption.html
👏13⚡12👍8🔥6
🚨 Hackers are chaining two SAP flaws (CVSS 10.0 + 9.1) to bypass login and fully take over systems.
Ransomware crews + China-linked spies are already using it in the wild.
SAP patched in April/May—but attackers were exploiting since March.
Details here → https://thehackernews.com/2025/08/public-exploit-for-chained-sap-flaws.html
Ransomware crews + China-linked spies are already using it in the wild.
SAP patched in April/May—but attackers were exploiting since March.
Details here → https://thehackernews.com/2025/08/public-exploit-for-chained-sap-flaws.html
⚡12🤯1
🚨 60% of breaches in 2024 came from one source: people.
Not because employees are careless—because security is confusing, complex, and built for auditors, not humans. Until culture is fixed, tech alone won’t save you.
Here’s how to change that ↓ https://thehackernews.com/2025/08/why-your-security-culture-is-critical.html
Not because employees are careless—because security is confusing, complex, and built for auditors, not humans. Until culture is fixed, tech alone won’t save you.
Here’s how to change that ↓ https://thehackernews.com/2025/08/why-your-security-culture-is-critical.html
👏7👍4😱3🔥2
🚨 New RAT alert: Hackers are hitting trading firms with GodRAT—a backdoor hidden inside fake financial docs sent over Skype.
It steals files, passwords, and even drops more malware.
Built on 20-year-old Gh0st RAT code, but deadlier.
Full details → https://thehackernews.com/2025/08/new-godrat-trojan-targets-trading-firms.html
It steals files, passwords, and even drops more malware.
Built on 20-year-old Gh0st RAT code, but deadlier.
Full details → https://thehackernews.com/2025/08/new-godrat-trojan-targets-trading-firms.html
🤔12👍6⚡2
Hackers are breaking into Linux cloud servers using a 2-year-old bug in Apache ActiveMQ.
The twist? After sneaking in, they patch the flaw themselves—locking out rivals and hiding from defenders.
Full story here → https://thehackernews.com/2025/08/apache-activemq-flaw-exploited-to.html
The twist? After sneaking in, they patch the flaw themselves—locking out rivals and hiding from defenders.
Full story here → https://thehackernews.com/2025/08/apache-activemq-flaw-exploited-to.html
😁30🤔10🤯10🔥4😱4👏1
🚨 A 22-year-old from Oregon built a DDoS-for-hire botnet so massive it launched 370,000+ attacks across 80 countries.
Powered by 95,000 hacked devices, “RapperBot” could blast traffic at 6 Tbps—enough to cripple major platforms.
The FBI just shut it down.
Full story → https://thehackernews.com/2025/08/doj-charges-22-year-old-for-running.html
Powered by 95,000 hacked devices, “RapperBot” could blast traffic at 6 Tbps—enough to cripple major platforms.
The FBI just shut it down.
Full story → https://thehackernews.com/2025/08/doj-charges-22-year-old-for-running.html
🤯32🔥11👏11😁6⚡2🤔2
🚨 Nearly half of AI-generated code snippets contain exploitable bugs.
Worse? Developers trust them blindly—introducing SQL injections, hardcoded secrets, and overly permissive cloud configs at scale.
AI isn’t just coding faster—it’s coding insecurely.
Full story ↓ https://thehackernews.com/expert-insights/2025/08/ais-hidden-security-debt.html
Worse? Developers trust them blindly—introducing SQL injections, hardcoded secrets, and overly permissive cloud configs at scale.
AI isn’t just coding faster—it’s coding insecurely.
Full story ↓ https://thehackernews.com/expert-insights/2025/08/ais-hidden-security-debt.html
😁22🤯7⚡3👍2🤔2
North Korean hackers ran a months-long cyber-espionage op against diplomats—hiding malware traffic in GitHub & Dropbox.
Their activity froze during Chinese national holidays.
Details → https://thehackernews.com/2025/08/north-korea-uses-github-in-diplomat.html
Their activity froze during Chinese national holidays.
Details → https://thehackernews.com/2025/08/north-korea-uses-github-in-diplomat.html
😁19🔥5
Ransomware. Outages. Human error.
The threats are multiplying—and downtime is no longer an option.
The survival playbook? A rock-solid BIA: the map that makes your BCDR strategy actually work.
Here’s why IT leaders can’t afford to skip it ↓ https://thehackernews.com/2025/08/turning-bia-insights-into-resilient-recovery.html
The threats are multiplying—and downtime is no longer an option.
The survival playbook? A rock-solid BIA: the map that makes your BCDR strategy actually work.
Here’s why IT leaders can’t afford to skip it ↓ https://thehackernews.com/2025/08/turning-bia-insights-into-resilient-recovery.html
🔥6👍4
451 Research Reveals: Why AI & SaaS Security Can’t Be Managed Separately.
Security leaders: AI is reshaping your SaaS environment faster than old tools can keep up. Hear from Justin Lam, Principal Analyst at 451 Research, in a live session breaking down the new realities:
🔸 Hidden risks from shadow AI and third-party SaaS
🔸 Real-world attack scenarios and trends, including ShinyHunters
🔸 How unified SaaS & AI security platforms close the gaps
Save your seat for actionable insights, practical frameworks, and a live Q&A with one of the industry’s top minds—so your team is ready for what’s next.
Save My Spot → https://thn.news/ai-saas-attack-surface
Security leaders: AI is reshaping your SaaS environment faster than old tools can keep up. Hear from Justin Lam, Principal Analyst at 451 Research, in a live session breaking down the new realities:
🔸 Hidden risks from shadow AI and third-party SaaS
🔸 Real-world attack scenarios and trends, including ShinyHunters
🔸 How unified SaaS & AI security platforms close the gaps
Save your seat for actionable insights, practical frameworks, and a live Q&A with one of the industry’s top minds—so your team is ready for what’s next.
Save My Spot → https://thn.news/ai-saas-attack-surface
👍5🤯1
🔥 WEBINAR ALERT!
Shadow AI agents are already running inside your business—often unseen, unlogged, and unmanaged.
Once hacked, they don’t think. They just execute—24/7.
Most security programs aren’t built for this.
Join our next webinar to learn how to stop them before attackers strike ↓ https://thehackernews.com/2025/08/webinar-discover-and-control-shadow-ai.html
Shadow AI agents are already running inside your business—often unseen, unlogged, and unmanaged.
Once hacked, they don’t think. They just execute—24/7.
Most security programs aren’t built for this.
Join our next webinar to learn how to stop them before attackers strike ↓ https://thehackernews.com/2025/08/webinar-discover-and-control-shadow-ai.html
🔥7⚡1😁1🤯1