๐จ Webinar: Automating Google Workspace Security Policies ๐จ
Manual enforcement is impossible โ scripts break, alerts pile up, and approvals drag on. Join Google Cloud Security and Zenphi experts to see how human-in-the-loop automation keeps IT in control while enforcing policies consistently.
๐ When: August 27, 10 AM PT
๐ Register Here to Join Live or Get the Replay: https://thn.news/google-workspace-policies
What Youโll Learn:
๐ค Block Gmail Forwarding to Personal Accounts โ detect & disable instantly, log for audit.
๐ Shadow IT Monitoring โ track OAuth apps & Chrome extensions without endless checks.
๐ Automated Offboarding โ revoke access, clear permissions, and document the process.
๐ก Bonus: Get exclusive access to the latest Google Cloud Security Trends Report.
Manual enforcement is impossible โ scripts break, alerts pile up, and approvals drag on. Join Google Cloud Security and Zenphi experts to see how human-in-the-loop automation keeps IT in control while enforcing policies consistently.
๐ When: August 27, 10 AM PT
๐ Register Here to Join Live or Get the Replay: https://thn.news/google-workspace-policies
What Youโll Learn:
๐ค Block Gmail Forwarding to Personal Accounts โ detect & disable instantly, log for audit.
๐ Shadow IT Monitoring โ track OAuth apps & Chrome extensions without endless checks.
๐ Automated Offboarding โ revoke access, clear permissions, and document the process.
๐ก Bonus: Get exclusive access to the latest Google Cloud Security Trends Report.
๐ค5๐ฅ1
๐ฅ Nearly half of orgs failed password-cracking tests in 2025 (up from last year).
Once inside? Attackers succeed in 98% of cases using valid accountsโslipping past defenses unnoticed.
The weakest link isnโt malware. Itโs your passwords.
Read the report โ https://thehackernews.com/2025/08/weak-passwords-and-compromised-accounts.html
Once inside? Attackers succeed in 98% of cases using valid accountsโslipping past defenses unnoticed.
The weakest link isnโt malware. Itโs your passwords.
Read the report โ https://thehackernews.com/2025/08/weak-passwords-and-compromised-accounts.html
๐12๐ฅ4
Hackers are luring people with fake CAPTCHA pagesโthen tricking them into copy-pasting malware.
The result: a new backdoor, CORNFLAKE.V3, that steals credentials, hides behind Cloudflare, and wonโt go away once itโs in.
Hereโs how the attack works โ https://thehackernews.com/2025/08/cybercriminals-deploy-cornflakev3.html
The result: a new backdoor, CORNFLAKE.V3, that steals credentials, hides behind Cloudflare, and wonโt go away once itโs in.
Hereโs how the attack works โ https://thehackernews.com/2025/08/cybercriminals-deploy-cornflakev3.html
๐ฅ17๐4โก1
๐จ Four new Commvault flaws just dropped โ and they can be chained for pre-auth remote code execution.
Attackers could seize control before you even log in.
Worst part? One chain works if the default admin password was never changed.
Patch now. Details here โ https://thehackernews.com/2025/08/pre-auth-exploit-chains-found-in.html
Attackers could seize control before you even log in.
Worst part? One chain works if the default admin password was never changed.
Patch now. Details here โ https://thehackernews.com/2025/08/pre-auth-exploit-chains-found-in.html
๐ฅ11
A Houston software dev just got 4 years in prison.
Why? He built a hidden kill switch that locked out thousands of coworkers the moment his account was disabled.
The sabotage cost his company hundreds of thousands.
Details โ https://thehackernews.com/2025/08/ex-developer-jailed-four-years-for.html
Why? He built a hidden kill switch that locked out thousands of coworkers the moment his account was disabled.
The sabotage cost his company hundreds of thousands.
Details โ https://thehackernews.com/2025/08/ex-developer-jailed-four-years-for.html
๐38๐ฅ21๐3
Three China-backed hacking groups are tearing into cloud & telecom networks worldwide.
๐ผ Murky Panda โ hijacked cloud partners to backdoor Entra ID
๐ผ Genesis Panda โ burrowed deep into CSP accounts
๐ผ Glacial Panda โ raided telecom networks in 11 countries .
Different methods.
Same mission: espionage.
Details here โ https://thehackernews.com/2025/08/chinese-hackers-murky-genesis-and.html
๐ผ Murky Panda โ hijacked cloud partners to backdoor Entra ID
๐ผ Genesis Panda โ burrowed deep into CSP accounts
๐ผ Glacial Panda โ raided telecom networks in 11 countries .
Different methods.
Same mission: espionage.
Details here โ https://thehackernews.com/2025/08/chinese-hackers-murky-genesis-and.html
โก12๐ฅ5๐4๐ฑ2
๐จ 1,209 cybercriminals arrested across 18 African countries.
โข $97.4 million recovered
โข 88,000 victims
โข 11,432 malicious infrastructures dismantled
From crypto fraud to ransomware, Operation Serengeti shows the global fight against cybercrime is heating up.
Read โ https://thehackernews.com/2025/08/interpol-arrests-1209-cybercriminals.html
โข $97.4 million recovered
โข 88,000 victims
โข 11,432 malicious infrastructures dismantled
From crypto fraud to ransomware, Operation Serengeti shows the global fight against cybercrime is heating up.
Read โ https://thehackernews.com/2025/08/interpol-arrests-1209-cybercriminals.html
๐คฏ14โก7๐3๐2๐ค1
Why are we still delivering pentest results like itโs 2010?
Static PDFs. Email attachments. Weeks of delay.
Automation flips the script: findings delivered in real time, workflows auto-tracked. This is the future of pentest delivery.
See how โ https://thehackernews.com/2025/08/automation-is-redefining-pentest.html
Static PDFs. Email attachments. Weeks of delay.
Automation flips the script: findings delivered in real time, workflows auto-tracked. This is the future of pentest delivery.
See how โ https://thehackernews.com/2025/08/automation-is-redefining-pentest.html
๐ฅ10โก2๐2๐ค1
๐ WARNING: A phishing email with a RAR file can hijack your Linux systemโwithout opening the fileโs content.
The malware? Hidden in the file name itself.
No macros. No hidden content. Just a filename that executes Bash.
This trick slips past antivirus scans.
Hereโs how it works โ https://thehackernews.com/2025/08/linux-malware-delivered-via-malicious.html
The malware? Hidden in the file name itself.
No macros. No hidden content. Just a filename that executes Bash.
This trick slips past antivirus scans.
Hereโs how it works โ https://thehackernews.com/2025/08/linux-malware-delivered-via-malicious.html
๐ฅ33๐คฏ18๐ค7๐4๐3
โ ๏ธ Cyberattacks are shifting gears.
โ One crew hijacks GeoServer (CVE-2024-36401) to quietly sell your internet bandwidth.
โ Another builds PolarEdge, a 40k-device botnet hidden in firewalls & routers.
โ And โGayfemboyโ โ a Mirai offshoot โ spreads across industries to fuel DDoS.
Different names. Same trend: stealth, scale, and profit.
Details โ https://thehackernews.com/2025/08/geoserver-exploits-polaredge-and.html
โ One crew hijacks GeoServer (CVE-2024-36401) to quietly sell your internet bandwidth.
โ Another builds PolarEdge, a 40k-device botnet hidden in firewalls & routers.
โ And โGayfemboyโ โ a Mirai offshoot โ spreads across industries to fuel DDoS.
Different names. Same trend: stealth, scale, and profit.
Details โ https://thehackernews.com/2025/08/geoserver-exploits-polaredge-and.html
๐คฏ16๐ฅ5๐2
โ ๏ธ A โhacking toolโ on Go isnโt what it seems.
The package pretends to brute-force SSHโbut secretly sends stolen logins to a Telegram bot controlled by a Russian actor.
The package is still on pkg.go.dev.
Full report โ https://thehackernews.com/2025/08/malicious-go-module-poses-as-ssh-brute.html
The package pretends to brute-force SSHโbut secretly sends stolen logins to a Telegram bot controlled by a Russian actor.
The package is still on pkg.go.dev.
Full report โ https://thehackernews.com/2025/08/malicious-go-module-poses-as-ssh-brute.html
๐ฅ31๐6๐2๐ค2
A โMeeting Notice.pdfโ lands in your inbox. You open it. Firefox pops up with a real doc.
Nothing feels wrong.
But behind the scenes? Malware is already stealing govt data.
Thatโs APT36โs latest trick to target Indian govt systems โ https://thehackernews.com/2025/08/transparent-tribe-targets-indian-govt.html
Nothing feels wrong.
But behind the scenes? Malware is already stealing govt data.
Thatโs APT36โs latest trick to target Indian govt systems โ https://thehackernews.com/2025/08/transparent-tribe-targets-indian-govt.html
๐17๐ฅ14๐2๐ฑ1
The bad news didnโt wait:
๐ฅ Password managers cracked
โ ๏ธ Zero-days exploited live
โ๏ธ Clouds breached
๐ค AI risks emerging
๐ Governments cracking down
This weekโs cyber recap is unmissable โ https://thehackernews.com/2025/08/weekly-recap-password-manager-flaws.html
๐ฅ Password managers cracked
โ ๏ธ Zero-days exploited live
โ๏ธ Clouds breached
๐ค AI risks emerging
๐ Governments cracking down
This weekโs cyber recap is unmissable โ https://thehackernews.com/2025/08/weekly-recap-password-manager-flaws.html
โก8๐7
Enterprises are catching just 1 in 7 attacks.
The rest? Slipping by undetected.
The 2025 Blue Report exposes the hidden detection gap putting critical data at risk.
See whatโs missing โ https://thehackernews.com/2025/08/why-siem-rules-fail-and-how-to-fix-them.html
The rest? Slipping by undetected.
The 2025 Blue Report exposes the hidden detection gap putting critical data at risk.
See whatโs missing โ https://thehackernews.com/2025/08/why-siem-rules-fail-and-how-to-fix-them.html
๐6๐คฏ4๐ฅ2
๐จ A new phishing wave is hitting global industries.
Fake voicemails & purchase orders are luring victims into downloading UpCrypterโa stealthy malware loader that drops RATs like PureHVNC & DarkCrystal, giving attackers full control.
Details here โ https://thehackernews.com/2025/08/phishing-campaign-uses-upcrypter-in.html
Fake voicemails & purchase orders are luring victims into downloading UpCrypterโa stealthy malware loader that drops RATs like PureHVNC & DarkCrystal, giving attackers full control.
Details here โ https://thehackernews.com/2025/08/phishing-campaign-uses-upcrypter-in.html
๐11
๐จ Critical flaw in Docker Desktop (CVE-2025-9074, 9.3/10) lets a malicious container escape and hijack the host.
On Windows, attackers can mount the full C:\ drive, read sensitive files, even escalate to admin. macOS saferโbut not safe.
Patch now (v4.44.3). Details โ https://thehackernews.com/2025/08/docker-fixes-cve-2025-9074-critical.html
On Windows, attackers can mount the full C:\ drive, read sensitive files, even escalate to admin. macOS saferโbut not safe.
Patch now (v4.44.3). Details โ https://thehackernews.com/2025/08/docker-fixes-cve-2025-9074-critical.html
๐8๐ฅ7โก2๐1
โ ๏ธ ALERT: Chinese hackers hijacked Wi-Fi portals to spy on diplomatsโusing fake Adobe updates signed with valid certificates.
The attack drops a PlugX backdoor that steals files, logs keystrokes & runs remote commands.
Hereโs how it works โ https://thehackernews.com/2025/08/unc6384-deploys-plugx-via-captive.html
The attack drops a PlugX backdoor that steals files, logs keystrokes & runs remote commands.
Hereโs how it works โ https://thehackernews.com/2025/08/unc6384-deploys-plugx-via-captive.html
๐ฅ12๐6โก5๐ฑ5
CISA just flagged 3 new actively exploited flawsโtwo in Citrix Session Recording, one in Git.
The Git bug (CVE-2025-48384) can let attackers run arbitrary code just by cloning a repo. Proof-of-concept exploit is already out.
Hereโs what you need to know โ https://thehackernews.com/2025/08/cisa-adds-three-exploited.html
The Git bug (CVE-2025-48384) can let attackers run arbitrary code just by cloning a repo. Proof-of-concept exploit is already out.
Hereโs what you need to know โ https://thehackernews.com/2025/08/cisa-adds-three-exploited.html
๐ฅ8๐คฏ7โก3
๐ Important: Google is locking down Android.
Starting Sept 2026, every app โ even outside the Play Store โ must come from a verified developer.
No more anonymous sideloads. No quick comebacks for malware gangs.
First up: Brazil, Indonesia, Singapore, Thailand.
Full story โ https://thehackernews.com/2025/08/google-to-verify-all-android-developers.html
Starting Sept 2026, every app โ even outside the Play Store โ must come from a verified developer.
No more anonymous sideloads. No quick comebacks for malware gangs.
First up: Brazil, Indonesia, Singapore, Thailand.
Full story โ https://thehackernews.com/2025/08/google-to-verify-all-android-developers.html
๐ฑ43๐14๐7๐คฏ6๐5๐ค5โก1
๐ข Google & Workday both confirmed breaches this summer โ attackers slipped in through social engineering, not software flaws.
The group behind it, ShinyHunters, used phone scams + fake apps to access Salesforce data.
Hereโs what actually happened โ https://thehackernews.com/expert-insights/2025/08/shinyhunters-data-breach-vs-saas-why.html
The group behind it, ShinyHunters, used phone scams + fake apps to access Salesforce data.
Hereโs what actually happened โ https://thehackernews.com/expert-insights/2025/08/shinyhunters-data-breach-vs-saas-why.html
๐7