⚠️ AI agents are taking over core business tasks—opening dangerous new attack paths.
Data leaks. Adversarial hacks. Trust at risk.
Your defenses aren’t ready.
Join the live webinar to learn how to protect your AI systems → https://thehacker.news/ai-agents-security
Data leaks. Adversarial hacks. Trust at risk.
Your defenses aren’t ready.
Join the live webinar to learn how to protect your AI systems → https://thehacker.news/ai-agents-security
😁10🤯4😱1
🚨 U.S. Secret Service dismantles a covert SIM network threatening officials.
More than 300 SIM servers and 100,000 SIM cards found across the NY tri-state area—near the UN General Assembly—posing an imminent national security threat.
Nation-state actors suspected.
Details → https://thehackernews.com/2025/09/us-secret-service-seizes-300-sim.html
More than 300 SIM servers and 100,000 SIM cards found across the NY tri-state area—near the UN General Assembly—posing an imminent national security threat.
Nation-state actors suspected.
Details → https://thehackernews.com/2025/09/us-secret-service-seizes-300-sim.html
🤔15😁5🔥2😱2
🚨 Europe just took down a massive €100M crypto scam.
Since 2018, 5 suspects tricked investors across 23 countries—then vanished with the cash.
Cops froze accounts and seized assets.
Full story → https://thehackernews.com/2025/09/eurojust-arrests-5-in-100m.html
Since 2018, 5 suspects tricked investors across 23 countries—then vanished with the cash.
Cops froze accounts and seized assets.
Full story → https://thehackernews.com/2025/09/eurojust-arrests-5-in-100m.html
🔥24
🚨 Two new flaws let attackers slip past Supermicro’s BMC Root of Trust!
Hackers can sneak in a fake signed firmware image (CVE-2025-7937 & CVE-2025-6198) and take over the BMC—then the whole server—permanently.
Full story → https://thehackernews.com/2025/09/two-new-supermicro-bmc-bugs-allow.html
Hackers can sneak in a fake signed firmware image (CVE-2025-7937 & CVE-2025-6198) and take over the BMC—then the whole server—permanently.
Full story → https://thehackernews.com/2025/09/two-new-supermicro-bmc-bugs-allow.html
😁17🤔2😱2
⚠️ State-backed hackers just broke into Libraesva’s email security gateway.
A flaw (CVE-2025-59689) lets a single malicious email run commands on your server—and it’s already been exploited.
Update now before you’re next → https://thehackernews.com/2025/09/state-sponsored-hackers-exploiting.html
A flaw (CVE-2025-59689) lets a single malicious email run commands on your server—and it’s already been exploited.
Update now before you’re next → https://thehackernews.com/2025/09/state-sponsored-hackers-exploiting.html
😱7👏5😁2⚡1
🚨 Researchers spotted real-world attacks exploiting a Linux flaw (CVE-2025-51591) in Pandoc to target AWS EC2 IMDS and steal IAM creds.
If you’re still on IMDSv1, you’re a sitting duck. Enforce IMDSv2 & sandbox Pandoc.
Details → https://thehackernews.com/2025/09/hackers-exploit-pandoc-cve-2025-51591.html
If you’re still on IMDSv1, you’re a sitting duck. Enforce IMDSv2 & sandbox Pandoc.
Details → https://thehackernews.com/2025/09/hackers-exploit-pandoc-cve-2025-51591.html
🔥8
Cybersecurity is shifting—from chasing attacks to predicting them.
🔍 Threat-Informed Defense (MITRE-backed) helps teams find security gaps before hackers strike.
How to make your defenses bulletproof ↓ https://thehackernews.com/expert-insights/2025/09/turning-intelligence-into-action-with.html
🔍 Threat-Informed Defense (MITRE-backed) helps teams find security gaps before hackers strike.
How to make your defenses bulletproof ↓ https://thehackernews.com/expert-insights/2025/09/turning-intelligence-into-action-with.html
👍10
🚨 49 merchants hit by a stealthy Stripe skimmer.
Hackers used pixel-perfect fake checkout iframes to steal credit card data—bypassing decades-old “secure by design” policies.
Old defenses like CSP & X-Frame-Options? Useless.
Active monitoring is now the only shield.
Learn more → https://thehackernews.com/2025/09/iframe-security-exposed-blind-spot.html
Hackers used pixel-perfect fake checkout iframes to steal credit card data—bypassing decades-old “secure by design” policies.
Old defenses like CSP & X-Frame-Options? Useless.
Active monitoring is now the only shield.
Learn more → https://thehackernews.com/2025/09/iframe-security-exposed-blind-spot.html
😱8👏4
🚨 New cyber threat spotted: YiBackdoor
• Shares core code with IcedID & Latrodectus—same notorious developers.
• Executes commands, steals screenshots, loads stealthy plugins.
• Likely a test run for future ransomware attacks.
Details → https://thehackernews.com/2025/09/new-yibackdoor-malware-shares-major.html
• Shares core code with IcedID & Latrodectus—same notorious developers.
• Executes commands, steals screenshots, loads stealthy plugins.
• Likely a test run for future ransomware attacks.
Details → https://thehackernews.com/2025/09/new-yibackdoor-malware-shares-major.html
👏6
💀 158 years in business—gone in days.
Hackers guessed ONE weak password, unleashed ransomware, wiped backups & bankrupted KNP Logistics.
700 jobs lost in days. Your password is all it takes.
Full story → https://thehackernews.com/2025/09/how-one-bad-password-ended-158-year-old.html
Hackers guessed ONE weak password, unleashed ransomware, wiped backups & bankrupted KNP Logistics.
700 jobs lost in days. Your password is all it takes.
Full story → https://thehackernews.com/2025/09/how-one-bad-password-ended-158-year-old.html
🤯41😱5🔥4👏3
🚨 Researchers found critical authentication bypass flaws in Wondershare RepairIt (CVE-2025-10643/10644).
Hardcoded cloud tokens + no encryption exposed user data and let attackers swap AI models—turning updates into a supply chain backdoor.
Details → https://thehackernews.com/2025/09/two-critical-flaws-uncovered-in.html
Hardcoded cloud tokens + no encryption exposed user data and let attackers swap AI models—turning updates into a supply chain backdoor.
Details → https://thehackernews.com/2025/09/two-critical-flaws-uncovered-in.html
🤯6🔥4👏2😁1
🛑 China-backed hackers have silently breached top U.S. legal, SaaS & tech firms—hiding for 393 days with a custom backdoor called BRICKSTORM.
They’re stealing emails, cloning servers & staying invisible to security tools.
Read → https://thehackernews.com/2025/09/unc5221-uses-brickstorm-backdoor-to.html
They’re stealing emails, cloning servers & staying invisible to security tools.
Read → https://thehackernews.com/2025/09/unc5221-uses-brickstorm-backdoor-to.html
🔥15👏7🤔6😁4
⚠️ Chinese state hackers just breached defense contractors in the U.S.—plus gov agencies from Asia to Europe.
The RedNovember group hijacked VPNs & firewalls from Cisco, Palo Alto, Ivanti and more—using open-source backdoors to stay hidden.
Full story → https://thehackernews.com/2025/09/chinese-hackers-rednovember-target.html
The RedNovember group hijacked VPNs & firewalls from Cisco, Palo Alto, Ivanti and more—using open-source backdoors to stay hidden.
Full story → https://thehackernews.com/2025/09/chinese-hackers-rednovember-target.html
😁8🔥6🤯6👏5👍1
🚨 Cisco flaw already under attack: CVE-2025-20352 lets remote hackers crash systems or run code as root via SNMP.
Cisco IOS & IOS XE devices with SNMP enabled are at risk—Meraki MS390 & Catalyst 9300 included. Patch to IOS XE 17.15.4a now.
Details → https://thehackernews.com/2025/09/cisco-warns-of-actively-exploited-snmp.html
Cisco IOS & IOS XE devices with SNMP enabled are at risk—Meraki MS390 & Catalyst 9300 included. Patch to IOS XE 17.15.4a now.
Details → https://thehackernews.com/2025/09/cisco-warns-of-actively-exploited-snmp.html
👍7👏2😁2
🚨 Two fake Rust crates stole Solana & Ethereum wallet keys
faster_log & async_println racked up 8,424 downloads before crates[.]io killed them.
They cloned real code & sent private keys to a fake Solana endpoint.
Details → https://thehackernews.com/2025/09/malicious-rust-crates-steal-solana-and.html
faster_log & async_println racked up 8,424 downloads before crates[.]io killed them.
They cloned real code & sent private keys to a fake Solana endpoint.
Details → https://thehackernews.com/2025/09/malicious-rust-crates-steal-solana-and.html
😁10🔥2
🚨 DDoS attacks are exploding: up 41% YoY with a record-shattering 2.2 Tbps strike in early 2025.
Tech firms are now the #1 target, finance is climbing fast, and app/API attacks hit 38% of all incidents.
Read full report here → https://thehackernews.com/2025/09/tech-overtakes-gaming-as-top-ddos.html
Tech firms are now the #1 target, finance is climbing fast, and app/API attacks hit 38% of all incidents.
Read full report here → https://thehackernews.com/2025/09/tech-overtakes-gaming-as-top-ddos.html
👏10
🛡 [New] Threatsday Bulletin is live!
⚡ SonicWall rootkit patch
⚡ GeoServer federal breach
⚡ Scattered Spider confession
⚡ Shai-Hulud npm worm
⚡ …and more critical updates
Stay ahead of this week’s biggest cyber threats → https://thehackernews.com/2025/09/threatsday-bulletin-rootkit-patch.html
⚡ SonicWall rootkit patch
⚡ GeoServer federal breach
⚡ Scattered Spider confession
⚡ Shai-Hulud npm worm
⚡ …and more critical updates
Stay ahead of this week’s biggest cyber threats → https://thehackernews.com/2025/09/threatsday-bulletin-rootkit-patch.html
🔥8
🚨 61% of new software flaws get stamped “critical” every year—yet only about 10% are truly dangerous.
Security teams are drowning in fake urgency while real threats slip through.
Gartner’s new Continuous Threat Exposure Management flips the script: prove which risks actually matter.
Read → https://thehackernews.com/2025/09/ctems-core-prioritization-and-validation.html
Security teams are drowning in fake urgency while real threats slip through.
Gartner’s new Continuous Threat Exposure Management flips the script: prove which risks actually matter.
Read → https://thehackernews.com/2025/09/ctems-core-prioritization-and-validation.html
👍8
⚠️ North Korea’s hackers just unleashed a new backdoor—AkdoorTea.
Fake job interviews trick devs into running “camera fix” scripts that hijack Windows, macOS & Linux to steal crypto and drop miners.
Here’s what you need to know ↓ https://thehackernews.com/2025/09/north-korean-hackers-use-new-akdoortea.html
Fake job interviews trick devs into running “camera fix” scripts that hijack Windows, macOS & Linux to steal crypto and drop miners.
Here’s what you need to know ↓ https://thehackernews.com/2025/09/north-korean-hackers-use-new-akdoortea.html
👍8🤯1
🔒 Learn to Secure Containers — Free Certification!
Master practical container security: choosing base images, scanning for vulnerabilities, and securing production.
🎓 Free, self-paced, certification included.
Start Free Course ↓ https://thn.news/docker-security-guide
Master practical container security: choosing base images, scanning for vulnerabilities, and securing production.
🎓 Free, self-paced, certification included.
Start Free Course ↓ https://thn.news/docker-security-guide
🤔10