🚨 A new phishing wave is hitting global industries.
Fake voicemails & purchase orders are luring victims into downloading UpCrypter—a stealthy malware loader that drops RATs like PureHVNC & DarkCrystal, giving attackers full control.
Details here ↓ https://thehackernews.com/2025/08/phishing-campaign-uses-upcrypter-in.html
Fake voicemails & purchase orders are luring victims into downloading UpCrypter—a stealthy malware loader that drops RATs like PureHVNC & DarkCrystal, giving attackers full control.
Details here ↓ https://thehackernews.com/2025/08/phishing-campaign-uses-upcrypter-in.html
👏11
🚨 Critical flaw in Docker Desktop (CVE-2025-9074, 9.3/10) lets a malicious container escape and hijack the host.
On Windows, attackers can mount the full C:\ drive, read sensitive files, even escalate to admin. macOS safer—but not safe.
Patch now (v4.44.3). Details → https://thehackernews.com/2025/08/docker-fixes-cve-2025-9074-critical.html
On Windows, attackers can mount the full C:\ drive, read sensitive files, even escalate to admin. macOS safer—but not safe.
Patch now (v4.44.3). Details → https://thehackernews.com/2025/08/docker-fixes-cve-2025-9074-critical.html
😁8🔥7⚡2👍1
⚠️ ALERT: Chinese hackers hijacked Wi-Fi portals to spy on diplomats—using fake Adobe updates signed with valid certificates.
The attack drops a PlugX backdoor that steals files, logs keystrokes & runs remote commands.
Here’s how it works ↓ https://thehackernews.com/2025/08/unc6384-deploys-plugx-via-captive.html
The attack drops a PlugX backdoor that steals files, logs keystrokes & runs remote commands.
Here’s how it works ↓ https://thehackernews.com/2025/08/unc6384-deploys-plugx-via-captive.html
🔥12👏6⚡5😱5
CISA just flagged 3 new actively exploited flaws—two in Citrix Session Recording, one in Git.
The Git bug (CVE-2025-48384) can let attackers run arbitrary code just by cloning a repo. Proof-of-concept exploit is already out.
Here’s what you need to know ↓ https://thehackernews.com/2025/08/cisa-adds-three-exploited.html
The Git bug (CVE-2025-48384) can let attackers run arbitrary code just by cloning a repo. Proof-of-concept exploit is already out.
Here’s what you need to know ↓ https://thehackernews.com/2025/08/cisa-adds-three-exploited.html
🔥8🤯7⚡3
🛑 Important: Google is locking down Android.
Starting Sept 2026, every app — even outside the Play Store — must come from a verified developer.
No more anonymous sideloads. No quick comebacks for malware gangs.
First up: Brazil, Indonesia, Singapore, Thailand.
Full story ↓ https://thehackernews.com/2025/08/google-to-verify-all-android-developers.html
Starting Sept 2026, every app — even outside the Play Store — must come from a verified developer.
No more anonymous sideloads. No quick comebacks for malware gangs.
First up: Brazil, Indonesia, Singapore, Thailand.
Full story ↓ https://thehackernews.com/2025/08/google-to-verify-all-android-developers.html
😱43👍14👏7🤯6😁5🤔5⚡1
📢 Google & Workday both confirmed breaches this summer — attackers slipped in through social engineering, not software flaws.
The group behind it, ShinyHunters, used phone scams + fake apps to access Salesforce data.
Here’s what actually happened ↓ https://thehackernews.com/expert-insights/2025/08/shinyhunters-data-breach-vs-saas-why.html
The group behind it, ShinyHunters, used phone scams + fake apps to access Salesforce data.
Here’s what actually happened ↓ https://thehackernews.com/expert-insights/2025/08/shinyhunters-data-breach-vs-saas-why.html
👏7
🚨 A new Android banking trojan just leveled up: HOOK now locks victims’ screens with ransomware-style extortion demands.
Worse? It can also steal your banking logins, crypto wallets, PIN codes—and even stream your screen.
Here’s how it works ↓ https://thehackernews.com/2025/08/hook-android-trojan-adds-ransomware.html
Worse? It can also steal your banking logins, crypto wallets, PIN codes—and even stream your screen.
Here’s how it works ↓ https://thehackernews.com/2025/08/hook-android-trojan-adds-ransomware.html
🤯10👍4😁1😱1
🚨 Over 100 hacked WordPress sites are being used in a new campaign called ShadowCaptcha — luring visitors with fake CAPTCHA checks that drop info-stealers, ransomware, and crypto miners.
The trick? Copy-pasted commands from your clipboard turn into attacks.
Here’s what you need to know ↓ https://thehackernews.com/2025/08/shadowcaptcha-exploits-wordpress-sites.html
The trick? Copy-pasted commands from your clipboard turn into attacks.
Here’s what you need to know ↓ https://thehackernews.com/2025/08/shadowcaptcha-exploits-wordpress-sites.html
👍15🤯3
Hackers are hijacking “Contact Us” forms to breach supply chain giants.
Weeks of fake NDAs and polite emails → a booby-trapped ZIP delivers MixShell, stealth malware built to stay hidden.
This isn’t phishing as you know it.
Learn more ↓ https://thehackernews.com/2025/08/mixshell-malware-delivered-via-contact.html
Weeks of fake NDAs and polite emails → a booby-trapped ZIP delivers MixShell, stealth malware built to stay hidden.
This isn’t phishing as you know it.
Learn more ↓ https://thehackernews.com/2025/08/mixshell-malware-delivered-via-contact.html
🤯10🔥4👏2
🚨 Cyberattacks are faster than ever.
For the 5th year straight, Gartner named SentinelOne a Leader in Endpoint Protection—thanks to AI that detects threats 63% faster and auto-rolls back ransomware.
Details → https://thehackernews.com/2025/07/ai-driven-trends-in-endpoint-security.html
For the 5th year straight, Gartner named SentinelOne a Leader in Endpoint Protection—thanks to AI that detects threats 63% faster and auto-rolls back ransomware.
Details → https://thehackernews.com/2025/07/ai-driven-trends-in-endpoint-security.html
👏11🤔5👍2🤯2😱2
🚨 New 5G attack discovered.
Researchers built Sni5Gect, a tool that can hijack the 5G handshake, crash phones, or silently downgrade them to 4G — no fake cell tower needed.
Here’s the full story → https://thehackernews.com/2025/08/new-sni5gect-attack-crashes-phones-and.html
Researchers built Sni5Gect, a tool that can hijack the 5G handshake, crash phones, or silently downgrade them to 4G — no fake cell tower needed.
Here’s the full story → https://thehackernews.com/2025/08/new-sni5gect-attack-crashes-phones-and.html
🤯35👍5😱4
🚨 Citrix just patched 3 critical NetScaler flaws—one (CVE-2025-7775) is already under active attack.
Hackers can hijack systems (RCE) or crash them. No workarounds, only updates.
Admins need to move fast.
Full details here → https://thehackernews.com/2025/08/citrix-patches-three-netscaler-flaws.html
Hackers can hijack systems (RCE) or crash them. No workarounds, only updates.
Admins need to move fast.
Full details here → https://thehackernews.com/2025/08/citrix-patches-three-netscaler-flaws.html
👍13🔥6
⚠️ Cyber researchers just exposed 5 attack clusters tied to hacking group Blind Eagle—targeting Colombia’s government, banks, and critical sectors since 2024.
They’re using cracked RATs, fake bank portals, and even Discord & Google Drive to deliver malware.
Details → https://thehackernews.com/2025/08/blind-eagles-five-clusters-target.html
They’re using cracked RATs, fake bank portals, and even Discord & Google Drive to deliver malware.
Details → https://thehackernews.com/2025/08/blind-eagles-five-clusters-target.html
😁12🔥5
Hackers hijacked Salesloft’s Drift AI chat app to steal OAuth tokens and break into Salesforce customer data.
They weren’t after marketing chats — they pulled AWS access keys, Snowflake tokens, and credentials.
Details here → https://thehackernews.com/2025/08/salesloft-oauth-breach-via-drift-ai.html
They weren’t after marketing chats — they pulled AWS access keys, Snowflake tokens, and credentials.
Details here → https://thehackernews.com/2025/08/salesloft-oauth-breach-via-drift-ai.html
⚡8🔥4👏4
This media is not supported in your browser
VIEW IN TELEGRAM
BeyondTrust recently dropped the cybersecurity's first-ever arcade game! 🕹️
It's fast, fun, and sneakily educational. Test your reflexes now - no sign-ups, no cookies, just pure fun.
Play now: https://thn.news/acronym-game
It's fast, fun, and sneakily educational. Test your reflexes now - no sign-ups, no cookies, just pure fun.
Play now: https://thn.news/acronym-game
🤔20🔥10😱3🤯1
⚡ Employees are flooding your stack with AI tools.
The real danger isn’t adoption—it’s shadow AI leaking data with zero guardrails.
🔍 CISOs: 5 rules to stop today’s experiments from becoming tomorrow’s breach ↓ https://thehackernews.com/2025/08/the-5-golden-rules-of-safe-ai-adoption.html
The real danger isn’t adoption—it’s shadow AI leaking data with zero guardrails.
🔍 CISOs: 5 rules to stop today’s experiments from becoming tomorrow’s breach ↓ https://thehackernews.com/2025/08/the-5-golden-rules-of-safe-ai-adoption.html
👍7🔥4😱2
🚨 ShadowSilk hackers just hit nearly 30+ gov targets across Central Asia & APAC.
The crew? A Russian-Chinese tag team using Telegram bots to hide C2 traffic + stealing Chrome passwords.
They’re still active—new victims found in July.
Read → https://thehackernews.com/2025/08/shadowsilk-hits-36-government-targets.html
The crew? A Russian-Chinese tag team using Telegram bots to hide C2 traffic + stealing Chrome passwords.
They’re still active—new victims found in July.
Read → https://thehackernews.com/2025/08/shadowsilk-hits-36-government-targets.html
🔥14👏2
Hackers just weaponized Anthropic’s AI chatbot Claude to run ransomware-style attacks.
📌 17 orgs hit—healthcare, gov, even emergency services
📌 Ransoms up to $500K
📌 The AI made its own decisions on what data to steal
This is the future of cybercrime.
Full story → https://thehackernews.com/2025/08/anthropic-disrupts-ai-powered.html
📌 17 orgs hit—healthcare, gov, even emergency services
📌 Ransoms up to $500K
📌 The AI made its own decisions on what data to steal
This is the future of cybercrime.
Full story → https://thehackernews.com/2025/08/anthropic-disrupts-ai-powered.html
🤯10😁7🔥5👏5
🚨 AI-powered ransomware is here.
Researchers just uncovered PromptLock—ransomware strain that uses OpenAI’s new gpt-oss:20b model to write unique attack scripts on every run.
◉ Cross-platform: Windows, Linux, macOS.
◉ Harder to spot. Harder to stop.
◉ For now, it’s “just” a PoC.
Details → https://thehackernews.com/2025/08/someone-created-first-ai-powered.html
Researchers just uncovered PromptLock—ransomware strain that uses OpenAI’s new gpt-oss:20b model to write unique attack scripts on every run.
◉ Cross-platform: Windows, Linux, macOS.
◉ Harder to spot. Harder to stop.
◉ For now, it’s “just” a PoC.
Details → https://thehackernews.com/2025/08/someone-created-first-ai-powered.html
🤔11👍5🔥5😁1🤯1
⚠️ More tools ≠ more security.
Keeper’s CEO says layered products can’t keep up—only a unified platform with zero trust, least privilege & AI can.
The future of defense isn’t more tools. It’s one platform.
Watch... Here’s why → https://thehackernews.com/videos/2025/08/the-new-mindset-platforms-over-products.html
Keeper’s CEO says layered products can’t keep up—only a unified platform with zero trust, least privilege & AI can.
The future of defense isn’t more tools. It’s one platform.
Watch... Here’s why → https://thehackernews.com/videos/2025/08/the-new-mindset-platforms-over-products.html
👍4🔥1