The Hacker News
151K subscribers
1.86K photos
10 videos
3 files
7.77K links
Official THN Telegram Channel — A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

📨 Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
🚨 Compliance isn’t optional. Fail GDPR, HIPAA, or PCI DSS → massive fines, lawsuits, even shutdowns.

The scary part? Most don’t even know where they’re failing.

Here’s how Wazuh helps fix it:
Real-time alerts
Compliance dashboards
Active response

Read this now → https://thehackernews.com/2025/08/wazuh-for-regulatory-compliance.html
👍23
46% of security leaders lose sleep over growing regulatory complexity.

Move beyond checkbox compliance and turn GRC into a strategic advantage with this new Tines guide.

What's in the guide:
🔸 Common challenges for security and compliance teams today
🔸 Four areas where GRC teams can leverage workflow orchestration and automation for immediate impact
🔸 Case study stories from Druva, Path AI, and more

Get the full guide here: https://thn.news/automating-grc-guide
😁12
Cybersecurity isn’t failing in one big breach—it’s leaking everywhere.

This week’s signals show just how fast cracks turn into collapse:

– NFC trojan stealing cards via “tap-to-pay” 🎴
– Active exploits in N-able N-central
– Espionage ops in Georgia & Moldova
– Docker Hub images still hiding the XZ backdoor
– U.S. expands crypto sanctions
– Hackers rushing to weaponize new CVEs

Each story points to one truth: hesitation = risk.

Read full RECAP → https://thehackernews.com/2025/08/weekly-recap-nfc-fraud-curly-comrades-n.html
🤯9😁4😱2
⚠️ Hackers just weaponized a new Windows flaw (CVE-2025-29824) to drop the PipeMagic backdoor—fueling RansomExx attacks.

The bait? Fake ChatGPT apps and Chrome updates.
Still active. Still evolving.

Details here → https://thehackernews.com/2025/08/microsoft-windows-vulnerability.html
🔥15🤯2👍1😱1
That copyright email in your inbox? It might not be legal trouble—it might be malware.

The “Noodlophile” attack hides in fake copyright notices, abuses Telegram, and slips past security tools.

If your brand lives on social media—you’re a target.

Here’s how it works ↓ https://thehackernews.com/2025/08/noodlophile-malware-campaign-expands.html
🤔13👍5👏1
Microsoft warns: PipeMagic isn’t malware—it’s a framework for stealth attacks. Storm-2460 is hitting IT, finance & real estate worldwide.

Details → https://thehackernews.com/2025/08/microsoft-windows-vulnerability.html
🤯11🤔5🔥4
PyPI just killed a major supply chain threat.

Over 1,800 email addresses tied to expired domains have been unverified—closing a loophole attackers used to hijack Python packages.

It’s a win, but not a cure-all.

👉 Full story ↓ https://thehackernews.com/2025/08/pypi-blocks-1800-expired-domain-emails.html
11🤯6
Russia’s Secret Blizzard just did something scarier than phishing → They hacked the root of trust—bypassing MFA and silently stealing “secure” traffic.

When TLS itself is broken, FIDO and MFA collapse.

How to defend against state-level attacks ↓ https://thehackernews.com/expert-insights/2025/08/how-to-defend-against-root-of-trust.html
🔥26👏4
The U.K. just dropped its demand that Apple build a backdoor into iCloud.

That order would’ve opened Americans’ encrypted data to governments—and hackers.

The plan’s dead. But the fight over encryption isn’t.

Here’s what happened → https://thehackernews.com/2025/08/uk-government-drops-apple-encryption.html
👏1312👍8🔥6
🚨 Hackers are chaining two SAP flaws (CVSS 10.0 + 9.1) to bypass login and fully take over systems.

Ransomware crews + China-linked spies are already using it in the wild.

SAP patched in April/May—but attackers were exploiting since March.

Details here → https://thehackernews.com/2025/08/public-exploit-for-chained-sap-flaws.html
12🤯1
🚨 60% of breaches in 2024 came from one source: people.

Not because employees are careless—because security is confusing, complex, and built for auditors, not humans. Until culture is fixed, tech alone won’t save you.

Here’s how to change that ↓ https://thehackernews.com/2025/08/why-your-security-culture-is-critical.html
👏7👍4😱3🔥2
🚨 New RAT alert: Hackers are hitting trading firms with GodRAT—a backdoor hidden inside fake financial docs sent over Skype.

It steals files, passwords, and even drops more malware.

Built on 20-year-old Gh0st RAT code, but deadlier.

Full details → https://thehackernews.com/2025/08/new-godrat-trojan-targets-trading-firms.html
🤔12👍62
Hackers are breaking into Linux cloud servers using a 2-year-old bug in Apache ActiveMQ.

The twist? After sneaking in, they patch the flaw themselves—locking out rivals and hiding from defenders.

Full story here → https://thehackernews.com/2025/08/apache-activemq-flaw-exploited-to.html
😁30🤔10🤯10🔥4😱4👏1
🚨 A 22-year-old from Oregon built a DDoS-for-hire botnet so massive it launched 370,000+ attacks across 80 countries.

Powered by 95,000 hacked devices, “RapperBot” could blast traffic at 6 Tbps—enough to cripple major platforms.

The FBI just shut it down.

Full story → https://thehackernews.com/2025/08/doj-charges-22-year-old-for-running.html
🤯32🔥11👏11😁62🤔2
🚨 Nearly half of AI-generated code snippets contain exploitable bugs.

Worse? Developers trust them blindly—introducing SQL injections, hardcoded secrets, and overly permissive cloud configs at scale.

AI isn’t just coding faster—it’s coding insecurely.

Full story ↓ https://thehackernews.com/expert-insights/2025/08/ais-hidden-security-debt.html
😁22🤯73👍2🤔2
North Korean hackers ran a months-long cyber-espionage op against diplomats—hiding malware traffic in GitHub & Dropbox.

Their activity froze during Chinese national holidays.

Details → https://thehackernews.com/2025/08/north-korea-uses-github-in-diplomat.html
😁19🔥5
Ransomware. Outages. Human error.

The threats are multiplying—and downtime is no longer an option.

The survival playbook? A rock-solid BIA: the map that makes your BCDR strategy actually work.

Here’s why IT leaders can’t afford to skip it ↓ https://thehackernews.com/2025/08/turning-bia-insights-into-resilient-recovery.html
🔥6👍4
451 Research Reveals: Why AI & SaaS Security Can’t Be Managed Separately.

Security leaders: AI is reshaping your SaaS environment faster than old tools can keep up. Hear from Justin Lam, Principal Analyst at 451 Research, in a live session breaking down the new realities:

🔸 Hidden risks from shadow AI and third-party SaaS
🔸 Real-world attack scenarios and trends, including ShinyHunters
🔸 How unified SaaS & AI security platforms close the gaps

Save your seat for actionable insights, practical frameworks, and a live Q&A with one of the industry’s top minds—so your team is ready for what’s next.

Save My Spot → https://thn.news/ai-saas-attack-surface
👍5🤯1
🔥 WEBINAR ALERT!

Shadow AI agents are already running inside your business—often unseen, unlogged, and unmanaged.

Once hacked, they don’t think. They just execute—24/7.

Most security programs aren’t built for this.

Join our next webinar to learn how to stop them before attackers strike ↓ https://thehackernews.com/2025/08/webinar-discover-and-control-shadow-ai.html
🔥71😁1🤯1
🛑 PromptFix ALERT! Researchers show AI browsers like Comet can be tricked by hidden prompts inside fake CAPTCHAs.

Moreover, AI browsers may unknowingly:
• Auto-click phishing links
• Autofill credit cards and addresses
• Trigger malware downloads

🔗 Full details here → https://thehackernews.com/2025/08/experts-find-ai-browsers-can-be-tricked.html
😁131👍1🤔1