The Hacker News
151K subscribers
1.86K photos
10 videos
3 files
7.77K links
Official THN Telegram Channel — A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

📨 Contact: [email protected]

🌐 Website: https://thehackernews.com
Download Telegram
🚨 Apple just patched a zero-day already under attack.

Hackers were exploiting a malicious image bug (CVE-2025-43300) in iPhones, iPads & Macs.

Apple says it was used in extremely sophisticated targeted attacks.

Update now. Details ↓ https://thehackernews.com/2025/08/apple-patches-cve-2025-43300-zero-day.html
👍13😱7🤔1
🚫 That “CEO” on your Zoom call? Might be an AI fake.

Deepfake scams have already stolen $25M+ in single hits—voices, faces, even biometrics can be forged.
The line between real and fake is gone.

How to spot it before it’s too late ↓ https://thehackernews.com/expert-insights/2025/08/defending-against-adversarial-ai-and.html
🤯12🤔3👍1👏1😁1
A 20-year-old hacker just got 10 YEARS in prison.

Noah Urban, part of the Scattered Spider crew, stole millions through SIM swaps & crypto heists—and now owes $13M in restitution.

But the gang isn’t gone. They’ve merged with other groups to get even stronger.

Full story → https://thehackernews.com/2025/08/scattered-spider-hacker-gets-10-years.html
🤯23🔥8👏3😱3
🚨 Shadow AI Agents = The New Insider Threat

They’re already inside your enterprise—untracked, unowned, and attackers are exploiting them.

In our next webinar, SailPoint's Steve Toole reveals:
🔸 How shadow agents emerge
🔸 Real-world attack paths
🔸 What CISOs must do now

Don’t let invisible AI identities be your weakest link.

🔗 Register → https://thehacker.news/shadow-ai-agents-threats
👍8
👾 Hackers are using a new malware loader—QuirkyLoader—to spread Agent Tesla, AsyncRAT, Snake Keylogger & more.

One campaign even targeted a Taiwan cybersecurity company with spyware built to steal passwords & keystrokes.

Learn more about this threat ↓ https://thehackernews.com/2025/08/hackers-using-new-quirkyloader-malware.html
👍15😁4
🚨 Webinar: Automating Google Workspace Security Policies 🚨

Manual enforcement is impossible — scripts break, alerts pile up, and approvals drag on. Join Google Cloud Security and Zenphi experts to see how human-in-the-loop automation keeps IT in control while enforcing policies consistently.

🕒 When: August 27, 10 AM PT
👉 Register Here to Join Live or Get the Replay: https://thn.news/google-workspace-policies

What You’ll Learn:
📤 Block Gmail Forwarding to Personal Accounts – detect & disable instantly, log for audit.
👀 Shadow IT Monitoring – track OAuth apps & Chrome extensions without endless checks.
👋 Automated Offboarding – revoke access, clear permissions, and document the process.
💡 Bonus: Get exclusive access to the latest Google Cloud Security Trends Report.
🤔5🔥1
🔥 Nearly half of orgs failed password-cracking tests in 2025 (up from last year).

Once inside? Attackers succeed in 98% of cases using valid accounts—slipping past defenses unnoticed.

The weakest link isn’t malware. It’s your passwords.

Read the report → https://thehackernews.com/2025/08/weak-passwords-and-compromised-accounts.html
😁12🔥4
Hackers are luring people with fake CAPTCHA pages—then tricking them into copy-pasting malware.

The result: a new backdoor, CORNFLAKE.V3, that steals credentials, hides behind Cloudflare, and won’t go away once it’s in.

Here’s how the attack works → https://thehackernews.com/2025/08/cybercriminals-deploy-cornflakev3.html
🔥17👍41
🚨 Four new Commvault flaws just dropped — and they can be chained for pre-auth remote code execution.

Attackers could seize control before you even log in.

Worst part? One chain works if the default admin password was never changed.

Patch now. Details here → https://thehackernews.com/2025/08/pre-auth-exploit-chains-found-in.html
🔥11
A Houston software dev just got 4 years in prison.

Why? He built a hidden kill switch that locked out thousands of coworkers the moment his account was disabled.

The sabotage cost his company hundreds of thousands.

Details ↓ https://thehackernews.com/2025/08/ex-developer-jailed-four-years-for.html
😁38🔥21👍3
Three China-backed hacking groups are tearing into cloud & telecom networks worldwide.

🐼 Murky Panda → hijacked cloud partners to backdoor Entra ID
🐼 Genesis Panda → burrowed deep into CSP accounts
🐼 Glacial Panda → raided telecom networks in 11 countries .

Different methods.
Same mission: espionage.

Details here → https://thehackernews.com/2025/08/chinese-hackers-murky-genesis-and.html
12🔥5👏4😱2
🚨 1,209 cybercriminals arrested across 18 African countries.

• $97.4 million recovered
• 88,000 victims
• 11,432 malicious infrastructures dismantled

From crypto fraud to ransomware, Operation Serengeti shows the global fight against cybercrime is heating up.

Read → https://thehackernews.com/2025/08/interpol-arrests-1209-cybercriminals.html
🤯147👏3👍2🤔1
Why are we still delivering pentest results like it’s 2010?

Static PDFs. Email attachments. Weeks of delay.

Automation flips the script: findings delivered in real time, workflows auto-tracked. This is the future of pentest delivery.

See how → https://thehackernews.com/2025/08/automation-is-redefining-pentest.html
🔥102👍2🤔1
🛑 WARNING: A phishing email with a RAR file can hijack your Linux system—without opening the file’s content.

The malware? Hidden in the file name itself.

No macros. No hidden content. Just a filename that executes Bash.

This trick slips past antivirus scans.

Here’s how it works ↓ https://thehackernews.com/2025/08/linux-malware-delivered-via-malicious.html
🔥33🤯18🤔7😁4👍3
⚠️ Cyberattacks are shifting gears.

➟ One crew hijacks GeoServer (CVE-2024-36401) to quietly sell your internet bandwidth.

➟ Another builds PolarEdge, a 40k-device botnet hidden in firewalls & routers.

➟ And “Gayfemboy” — a Mirai offshoot — spreads across industries to fuel DDoS.

Different names. Same trend: stealth, scale, and profit.

Details → https://thehackernews.com/2025/08/geoserver-exploits-polaredge-and.html
🤯16🔥5👏2
⚠️ A “hacking tool” on Go isn’t what it seems.

The package pretends to brute-force SSH—but secretly sends stolen logins to a Telegram bot controlled by a Russian actor.

The package is still on pkg.go.dev.

Full report → https://thehackernews.com/2025/08/malicious-go-module-poses-as-ssh-brute.html
🔥31👍6👏2🤔2
A “Meeting Notice.pdf” lands in your inbox. You open it. Firefox pops up with a real doc.

Nothing feels wrong.

But behind the scenes? Malware is already stealing govt data.

That’s APT36’s latest trick to target Indian govt systems → https://thehackernews.com/2025/08/transparent-tribe-targets-indian-govt.html
😁17🔥14👍2😱1
The bad news didn’t wait:

💥 Password managers cracked
⚠️ Zero-days exploited live
☁️ Clouds breached
🤖 AI risks emerging
🌐 Governments cracking down

This week’s cyber recap is unmissable → https://thehackernews.com/2025/08/weekly-recap-password-manager-flaws.html
8😁7
Enterprises are catching just 1 in 7 attacks.

The rest? Slipping by undetected.

The 2025 Blue Report exposes the hidden detection gap putting critical data at risk.

See what’s missing → https://thehackernews.com/2025/08/why-siem-rules-fail-and-how-to-fix-them.html
👍6🤯4🔥2
🚨 A new phishing wave is hitting global industries.

Fake voicemails & purchase orders are luring victims into downloading UpCrypter—a stealthy malware loader that drops RATs like PureHVNC & DarkCrystal, giving attackers full control.

Details here ↓ https://thehackernews.com/2025/08/phishing-campaign-uses-upcrypter-in.html
👏11