The Hacker News
โœ”
152K subscribers
1.87K photos
10 videos
3 files
7.78K links
โญ Official THN Telegram Channel โ€” A trusted, widely read, independent source for breaking news and tech coverage about cybersecurity and hacking.

๐Ÿ“จ Contact: [email protected]

๐ŸŒ Website: https://thehackernews.com
Download Telegram
๐Ÿšจ Webinar: Automating Google Workspace Security Policies ๐Ÿšจ

Manual enforcement is impossible โ€” scripts break, alerts pile up, and approvals drag on. Join Google Cloud Security and Zenphi experts to see how human-in-the-loop automation keeps IT in control while enforcing policies consistently.

๐Ÿ•’ When: August 27, 10 AM PT
๐Ÿ‘‰ Register Here to Join Live or Get the Replay: https://thn.news/google-workspace-policies

What Youโ€™ll Learn:
๐Ÿ“ค Block Gmail Forwarding to Personal Accounts โ€“ detect & disable instantly, log for audit.
๐Ÿ‘€ Shadow IT Monitoring โ€“ track OAuth apps & Chrome extensions without endless checks.
๐Ÿ‘‹ Automated Offboarding โ€“ revoke access, clear permissions, and document the process.
๐Ÿ’ก Bonus: Get exclusive access to the latest Google Cloud Security Trends Report.
๐Ÿค”5๐Ÿ”ฅ1
๐Ÿ”ฅ Nearly half of orgs failed password-cracking tests in 2025 (up from last year).

Once inside? Attackers succeed in 98% of cases using valid accountsโ€”slipping past defenses unnoticed.

The weakest link isnโ€™t malware. Itโ€™s your passwords.

Read the report โ†’ https://thehackernews.com/2025/08/weak-passwords-and-compromised-accounts.html
๐Ÿ˜12๐Ÿ”ฅ4
Hackers are luring people with fake CAPTCHA pagesโ€”then tricking them into copy-pasting malware.

The result: a new backdoor, CORNFLAKE.V3, that steals credentials, hides behind Cloudflare, and wonโ€™t go away once itโ€™s in.

Hereโ€™s how the attack works โ†’ https://thehackernews.com/2025/08/cybercriminals-deploy-cornflakev3.html
๐Ÿ”ฅ17๐Ÿ‘4โšก1
๐Ÿšจ Four new Commvault flaws just dropped โ€” and they can be chained for pre-auth remote code execution.

Attackers could seize control before you even log in.

Worst part? One chain works if the default admin password was never changed.

Patch now. Details here โ†’ https://thehackernews.com/2025/08/pre-auth-exploit-chains-found-in.html
๐Ÿ”ฅ11
A Houston software dev just got 4 years in prison.

Why? He built a hidden kill switch that locked out thousands of coworkers the moment his account was disabled.

The sabotage cost his company hundreds of thousands.

Details โ†“ https://thehackernews.com/2025/08/ex-developer-jailed-four-years-for.html
๐Ÿ˜38๐Ÿ”ฅ21๐Ÿ‘3
Three China-backed hacking groups are tearing into cloud & telecom networks worldwide.

๐Ÿผ Murky Panda โ†’ hijacked cloud partners to backdoor Entra ID
๐Ÿผ Genesis Panda โ†’ burrowed deep into CSP accounts
๐Ÿผ Glacial Panda โ†’ raided telecom networks in 11 countries .

Different methods.
Same mission: espionage.

Details here โ†’ https://thehackernews.com/2025/08/chinese-hackers-murky-genesis-and.html
โšก12๐Ÿ”ฅ5๐Ÿ‘4๐Ÿ˜ฑ2
๐Ÿšจ 1,209 cybercriminals arrested across 18 African countries.

โ€ข $97.4 million recovered
โ€ข 88,000 victims
โ€ข 11,432 malicious infrastructures dismantled

From crypto fraud to ransomware, Operation Serengeti shows the global fight against cybercrime is heating up.

Read โ†’ https://thehackernews.com/2025/08/interpol-arrests-1209-cybercriminals.html
๐Ÿคฏ14โšก7๐Ÿ‘3๐Ÿ‘2๐Ÿค”1
Why are we still delivering pentest results like itโ€™s 2010?

Static PDFs. Email attachments. Weeks of delay.

Automation flips the script: findings delivered in real time, workflows auto-tracked. This is the future of pentest delivery.

See how โ†’ https://thehackernews.com/2025/08/automation-is-redefining-pentest.html
๐Ÿ”ฅ10โšก2๐Ÿ‘2๐Ÿค”1
๐Ÿ›‘ WARNING: A phishing email with a RAR file can hijack your Linux systemโ€”without opening the fileโ€™s content.

The malware? Hidden in the file name itself.

No macros. No hidden content. Just a filename that executes Bash.

This trick slips past antivirus scans.

Hereโ€™s how it works โ†“ https://thehackernews.com/2025/08/linux-malware-delivered-via-malicious.html
๐Ÿ”ฅ33๐Ÿคฏ18๐Ÿค”7๐Ÿ˜4๐Ÿ‘3
โš ๏ธ Cyberattacks are shifting gears.

โžŸ One crew hijacks GeoServer (CVE-2024-36401) to quietly sell your internet bandwidth.

โžŸ Another builds PolarEdge, a 40k-device botnet hidden in firewalls & routers.

โžŸ And โ€œGayfemboyโ€ โ€” a Mirai offshoot โ€” spreads across industries to fuel DDoS.

Different names. Same trend: stealth, scale, and profit.

Details โ†’ https://thehackernews.com/2025/08/geoserver-exploits-polaredge-and.html
๐Ÿคฏ16๐Ÿ”ฅ5๐Ÿ‘2
โš ๏ธ A โ€œhacking toolโ€ on Go isnโ€™t what it seems.

The package pretends to brute-force SSHโ€”but secretly sends stolen logins to a Telegram bot controlled by a Russian actor.

The package is still on pkg.go.dev.

Full report โ†’ https://thehackernews.com/2025/08/malicious-go-module-poses-as-ssh-brute.html
๐Ÿ”ฅ31๐Ÿ‘6๐Ÿ‘2๐Ÿค”2
A โ€œMeeting Notice.pdfโ€ lands in your inbox. You open it. Firefox pops up with a real doc.

Nothing feels wrong.

But behind the scenes? Malware is already stealing govt data.

Thatโ€™s APT36โ€™s latest trick to target Indian govt systems โ†’ https://thehackernews.com/2025/08/transparent-tribe-targets-indian-govt.html
๐Ÿ˜17๐Ÿ”ฅ14๐Ÿ‘2๐Ÿ˜ฑ1
The bad news didnโ€™t wait:

๐Ÿ’ฅ Password managers cracked
โš ๏ธ Zero-days exploited live
โ˜๏ธ Clouds breached
๐Ÿค– AI risks emerging
๐ŸŒ Governments cracking down

This weekโ€™s cyber recap is unmissable โ†’ https://thehackernews.com/2025/08/weekly-recap-password-manager-flaws.html
โšก8๐Ÿ˜7
Enterprises are catching just 1 in 7 attacks.

The rest? Slipping by undetected.

The 2025 Blue Report exposes the hidden detection gap putting critical data at risk.

See whatโ€™s missing โ†’ https://thehackernews.com/2025/08/why-siem-rules-fail-and-how-to-fix-them.html
๐Ÿ‘6๐Ÿคฏ4๐Ÿ”ฅ2
๐Ÿšจ A new phishing wave is hitting global industries.

Fake voicemails & purchase orders are luring victims into downloading UpCrypterโ€”a stealthy malware loader that drops RATs like PureHVNC & DarkCrystal, giving attackers full control.

Details here โ†“ https://thehackernews.com/2025/08/phishing-campaign-uses-upcrypter-in.html
๐Ÿ‘11
๐Ÿšจ Critical flaw in Docker Desktop (CVE-2025-9074, 9.3/10) lets a malicious container escape and hijack the host.

On Windows, attackers can mount the full C:\ drive, read sensitive files, even escalate to admin. macOS saferโ€”but not safe.

Patch now (v4.44.3). Details โ†’ https://thehackernews.com/2025/08/docker-fixes-cve-2025-9074-critical.html
๐Ÿ˜8๐Ÿ”ฅ7โšก2๐Ÿ‘1
โš ๏ธ ALERT: Chinese hackers hijacked Wi-Fi portals to spy on diplomatsโ€”using fake Adobe updates signed with valid certificates.

The attack drops a PlugX backdoor that steals files, logs keystrokes & runs remote commands.

Hereโ€™s how it works โ†“ https://thehackernews.com/2025/08/unc6384-deploys-plugx-via-captive.html
๐Ÿ”ฅ12๐Ÿ‘6โšก5๐Ÿ˜ฑ5
CISA just flagged 3 new actively exploited flawsโ€”two in Citrix Session Recording, one in Git.

The Git bug (CVE-2025-48384) can let attackers run arbitrary code just by cloning a repo. Proof-of-concept exploit is already out.

Hereโ€™s what you need to know โ†“ https://thehackernews.com/2025/08/cisa-adds-three-exploited.html
๐Ÿ”ฅ8๐Ÿคฏ7โšก3
๐Ÿ›‘ Important: Google is locking down Android.

Starting Sept 2026, every app โ€” even outside the Play Store โ€” must come from a verified developer.

No more anonymous sideloads. No quick comebacks for malware gangs.

First up: Brazil, Indonesia, Singapore, Thailand.

Full story โ†“ https://thehackernews.com/2025/08/google-to-verify-all-android-developers.html
๐Ÿ˜ฑ43๐Ÿ‘14๐Ÿ‘7๐Ÿคฏ6๐Ÿ˜5๐Ÿค”5โšก1
๐Ÿ“ข Google & Workday both confirmed breaches this summer โ€” attackers slipped in through social engineering, not software flaws.

The group behind it, ShinyHunters, used phone scams + fake apps to access Salesforce data.

Hereโ€™s what actually happened โ†“ https://thehackernews.com/expert-insights/2025/08/shinyhunters-data-breach-vs-saas-why.html
๐Ÿ‘7