🚨 58% of security pros were told to hide a breach this year — a 38% spike since 2023.
The irony? While execs boast “confidence,” 84% of real attacks slip in through tools already inside your network.
The part no one’s talking about ↓ https://thehackernews.com/2025/10/2025-cybersecurity-reality-check.html
The irony? While execs boast “confidence,” 84% of real attacks slip in through tools already inside your network.
The part no one’s talking about ↓ https://thehackernews.com/2025/10/2025-cybersecurity-reality-check.html
😁12👍2
🚨 A single Jupyter notebook user could hijack an entire AI platform.
Red Hat OpenShift AI flaw (CVE-2025-10725) lets low-privileged accounts escalate to full cluster admin—total takeover possible.
That’s not the scariest part ↓ https://thehackernews.com/2025/10/critical-red-hat-openshift-ai-flaw.html
Red Hat OpenShift AI flaw (CVE-2025-10725) lets low-privileged accounts escalate to full cluster admin—total takeover possible.
That’s not the scariest part ↓ https://thehackernews.com/2025/10/critical-red-hat-openshift-ai-flaw.html
😁9👏6🤔4👍1
⚠️ Automation alone won’t save you.
Too much AI = black-box risk.
Too many rules = brittle systems.
Too much human = bottlenecks.
The strongest workflows blend all three—intentionally.
See how in our next webinar ↓ https://thehackernews.com/2025/10/how-leading-security-teams-blend-ai.html
Too much AI = black-box risk.
Too many rules = brittle systems.
Too much human = bottlenecks.
The strongest workflows blend all three—intentionally.
See how in our next webinar ↓ https://thehackernews.com/2025/10/how-leading-security-teams-blend-ai.html
😁13⚡5👍3
🚨 New CVE in OneLogin (7.7 CVSS): API flaw exposed all OIDC client secrets.
Any attacker with valid keys could impersonate apps + move laterally.
Patched in 2025.3.0 — details here ↓ https://thehackernews.com/2025/10/onelogin-bug-let-attackers-use-api-keys.html
Any attacker with valid keys could impersonate apps + move laterally.
Patched in 2025.3.0 — details here ↓ https://thehackernews.com/2025/10/onelogin-bug-let-attackers-use-api-keys.html
😁6🤔3👍1
This media is not supported in your browser
VIEW IN TELEGRAM
🚨 Researchers just cracked Intel SGX on DDR4.
Attackers can now steal enclave keys with a $1k device bought online.
They can masquerade as genuine SGX hardware—while spying on your data.
The exploit: “WireTap.” Details ↓ https://thehackernews.com/2025/10/new-wiretap-attack-extracts-intel-sgx.html
Attackers can now steal enclave keys with a $1k device bought online.
They can masquerade as genuine SGX hardware—while spying on your data.
The exploit: “WireTap.” Details ↓ https://thehackernews.com/2025/10/new-wiretap-attack-extracts-intel-sgx.html
😁18⚡6🤯4👍1🔥1
Companies are spending millions on DDoS defense.
The result? Every single one surveyed still got hit.
The reason: defenses still rely on humans.
Full report ↓ https://thehackernews.com/expert-insights/2025/09/the-state-of-ddos-defenses-unpacking.html
The result? Every single one surveyed still got hit.
The reason: defenses still rely on humans.
Full report ↓ https://thehackernews.com/expert-insights/2025/09/the-state-of-ddos-defenses-unpacking.html
😁19🔥5⚡2👍1
🚨 Your “Signal” app might not be Signal at all!
Two spyware strains—ProSpy & ToSpy—masquerade as Signal and ToTok to infect Androids—and they’ve been active for years.
One version hides by launching the real app—while stealing your files, messages, and contacts.
Details ↓ https://thehackernews.com/2025/10/warning-beware-of-android-spyware.html
Two spyware strains—ProSpy & ToSpy—masquerade as Signal and ToTok to infect Androids—and they’ve been active for years.
One version hides by launching the real app—while stealing your files, messages, and contacts.
Details ↓ https://thehackernews.com/2025/10/warning-beware-of-android-spyware.html
😱20⚡7🤯7👍1😁1
🚨 Switching to a continuous detection workflow surfaced up to 58% more threats and cut MTTR by 21 min per case.
The gap? Tool-switching—not alert floods.
Unique detail: an interactive sandbox reveals click-triggered payloads & staged downloads.
See the 3 steps ↓ https://thehackernews.com/2025/10/how-to-close-threat-detection-gaps-your.html
The gap? Tool-switching—not alert floods.
Unique detail: an interactive sandbox reveals click-triggered payloads & staged downloads.
See the 3 steps ↓ https://thehackernews.com/2025/10/how-to-close-threat-detection-gaps-your.html
🤔8👍2
🚨 Hundreds of hacked accounts are blasting extortion emails at execs.
Hackers claim Oracle E-Business Suite data theft—leveraging Cl0p’s name for credibility.
Google can’t confirm it’s Cl0p… but the contact details match their leak site.
Details → https://thehackernews.com/2025/10/google-mandiant-probes-new-oracle.html
Hackers claim Oracle E-Business Suite data theft—leveraging Cl0p’s name for credibility.
Google can’t confirm it’s Cl0p… but the contact details match their leak site.
Details → https://thehackernews.com/2025/10/google-mandiant-probes-new-oracle.html
🔥8😁2
⚠️ This week’s Threatsday Bulletin is here.
🔹 CarPlay exploit (CVE-2025-24132)
🔹 Root access—no clicks needed
🔹 Patch released, but OEMs haven’t applied it
🔹 and more critical threats you can’t ignore...
Your systems may already be at risk.
Read ↓ https://thehackernews.com/2025/10/threatsday-bulletin-carplay-exploit.html
🔹 CarPlay exploit (CVE-2025-24132)
🔹 Root access—no clicks needed
🔹 Patch released, but OEMs haven’t applied it
🔹 and more critical threats you can’t ignore...
Your systems may already be at risk.
Read ↓ https://thehackernews.com/2025/10/threatsday-bulletin-carplay-exploit.html
🔥7👏1
🚨Pentest findings are still being buried in PDFs. By the time they reach IT, attackers may already be in.
The twist? The fix isn’t more reports—it’s automation. Real-time ticketing, instant alerts, zero lag.
The 7 workflows every security team should automate ↓ https://thehackernews.com/2025/10/automating-pentest-delivery-7-key.html
The twist? The fix isn’t more reports—it’s automation. Real-time ticketing, instant alerts, zero lag.
The 7 workflows every security team should automate ↓ https://thehackernews.com/2025/10/automating-pentest-delivery-7-key.html
🔥6😁1
🚨 Malicious PyPI package spotted: “soopsocks” hit 2,653 downloads before takedown.
Advertised as a SOCKS5 proxy, it secretly:
– Dropped a Go-based backdoor (_AUTORUN.EXE)
– Ran PowerShell + VBScript
– Changed firewall rules
– Exfiltrated system data
Full report ↓ https://thehackernews.com/2025/10/alert-malicious-pypi-package-soopsocks.html
Advertised as a SOCKS5 proxy, it secretly:
– Dropped a Go-based backdoor (_AUTORUN.EXE)
– Ran PowerShell + VBScript
– Changed firewall rules
– Exfiltrated system data
Full report ↓ https://thehackernews.com/2025/10/alert-malicious-pypi-package-soopsocks.html
😁8🤯1
🚨 A single click on a shortcut file was enough.
Confucius hackers just stole passwords, screenshots & files across Pakistan’s government and defense networks.
They hid the breach behind routine Windows .LNK files — a trick most security tools missed.
Read ↓ https://thehackernews.com/2025/10/confucius-hackers-hit-pakistan-with-new.html
Confucius hackers just stole passwords, screenshots & files across Pakistan’s government and defense networks.
They hid the breach behind routine Windows .LNK files — a trick most security tools missed.
Read ↓ https://thehackernews.com/2025/10/confucius-hackers-hit-pakistan-with-new.html
👍7🤯4🔥1
🚨 U.K. just ordered Apple to break iCloud encryption.
The target? Every Briton’s backups.
Officials want far more than just disabling Advanced Data Protection—secret orders demand access to entire categories of iCloud data.
How deep does this go? ↓ https://thehackernews.com/2025/10/threatsday-bulletin-carplay-exploit.html#u-k-demands-access-targets-britons-backups
The target? Every Briton’s backups.
Officials want far more than just disabling Advanced Data Protection—secret orders demand access to entire categories of iCloud data.
How deep does this go? ↓ https://thehackernews.com/2025/10/threatsday-bulletin-carplay-exploit.html#u-k-demands-access-targets-britons-backups
😁15🤯11🔥3🤔3👏1
🚨 Ordinary PDFs just became hacker weapons.
A new “MatrixPDF” toolkit turns any file into a phishing lure. Even legit docs now hide fake secure prompts + JS redirects.
One click = stolen creds or malware payload.
Details ↓ https://thehackernews.com/2025/10/threatsday-bulletin-carplay-exploit.html#normal-pdfs-turn-into-malware-traps
A new “MatrixPDF” toolkit turns any file into a phishing lure. Even legit docs now hide fake secure prompts + JS redirects.
One click = stolen creds or malware payload.
Details ↓ https://thehackernews.com/2025/10/threatsday-bulletin-carplay-exploit.html#normal-pdfs-turn-into-malware-traps
👏16🔥8🤯7👍1😁1😱1
🚨 Google Drive now pauses itself when it detects ransomware.
The AI spots mass file encryption attempts—then halts syncing before your data gets nuked.
It learned its tricks from millions of real victim files.
How it works → https://thehackernews.com/2025/10/threatsday-bulletin-carplay-exploit.html#drive-pauses-syncs-buys-you-minutes
#threatsday #cybersecurity
The AI spots mass file encryption attempts—then halts syncing before your data gets nuked.
It learned its tricks from millions of real victim files.
How it works → https://thehackernews.com/2025/10/threatsday-bulletin-carplay-exploit.html#drive-pauses-syncs-buys-you-minutes
#threatsday #cybersecurity
🔥27👏10👍2😁2
This media is not supported in your browser
VIEW IN TELEGRAM
🚨 CISA just flagged a live zero-day in Smartbedded Meteobridge.
Remote attackers can hijack weather stations → full root access.
No login needed—just click a link. CGI script + eval = instant code execution.
Patches only dropped in May ↓ https://thehackernews.com/2025/10/cisa-flags-meteobridge-cve-2025-4008.html
Remote attackers can hijack weather stations → full root access.
No login needed—just click a link. CGI script + eval = instant code execution.
Patches only dropped in May ↓ https://thehackernews.com/2025/10/cisa-flags-meteobridge-cve-2025-4008.html
🤯9⚡4👏2
🚨 A new APT group is hijacking real government email accounts to hack Russian state agencies.
Their malware exfiltrates data through a Telegram bot.
And it’s not just Russia—English & Arabic filenames suggest the target list is much wider.
Read ↓ https://thehackernews.com/2025/10/new-cavalry-werewolf-attack-hits.html
Their malware exfiltrates data through a Telegram bot.
And it’s not just Russia—English & Arabic filenames suggest the target list is much wider.
Read ↓ https://thehackernews.com/2025/10/new-cavalry-werewolf-attack-hits.html
🤯9🔥5😁2
⚡ Enterprises are hitting a new blind spot.
Passwork 7 now combines password + secrets management in one platform.
That means SSH keys, tokens, and DB logins live next to everyday credentials — all gated by roles and vault design.
One misstep = organization-wide exposure.
Here’s how it works ↓ https://thehackernews.com/2025/10/product-walkthrough-how-passwork-7.html
Passwork 7 now combines password + secrets management in one platform.
That means SSH keys, tokens, and DB logins live next to everyday credentials — all gated by roles and vault design.
One misstep = organization-wide exposure.
Here’s how it works ↓ https://thehackernews.com/2025/10/product-walkthrough-how-passwork-7.html
👍5😁1
🕵️ One click. One ZIP.
SORVEPOTEL self-replicates through WhatsApp Web — blasting itself to all your contacts and groups until your account is banned.
Targets enterprises, uses LNK → PowerShell for persistence.
Read more → https://thehackernews.com/2025/10/researchers-warn-of-self-spreading.html
SORVEPOTEL self-replicates through WhatsApp Web — blasting itself to all your contacts and groups until your account is banned.
Targets enterprises, uses LNK → PowerShell for persistence.
Read more → https://thehackernews.com/2025/10/researchers-warn-of-self-spreading.html
😁12🤯8😱3