🚨 24 million secrets exposed on GitHub—and AI is making it worse.
Repos using Copilot are 40% more likely to leak credentials.
Think API keys, SSH tokens… the stuff attackers love.
The worst part? Most devs don’t even know they’re leaking them.
Here’s how to fix it ↓ https://thehackernews.com/expert-insights/2025/06/exposed-developer-secrets-are-big.html
Repos using Copilot are 40% more likely to leak credentials.
Think API keys, SSH tokens… the stuff attackers love.
The worst part? Most devs don’t even know they’re leaking them.
Here’s how to fix it ↓ https://thehackernews.com/expert-insights/2025/06/exposed-developer-secrets-are-big.html
😁15😱4👍3🔥2
🕷️ Scattered Spider is now hitting U.S. insurance giants — not just retailers.
⚠️ They’re bypassing MFA, tricking help desks, and breaching entire IT ecosystems.
Here’s how they do it — and how to stop them ↓ https://thehackernews.com/2025/06/google-warns-of-scattered-spider.html
⚠️ They’re bypassing MFA, tricking help desks, and breaching entire IT ecosystems.
Here’s how they do it — and how to stop them ↓ https://thehackernews.com/2025/06/google-warns-of-scattered-spider.html
🤯7👍5🔥1👏1
🚨 New phishing campaign hits Taiwan, delivering stealthy malware like Gh0stCringe and HoldingHands RAT.
Hackers use fake tax emails, sneaky PDFs, and ZIP traps to hijack systems and spy on users.
It’s all linked to China-backed Silver Fox APT.
Here’s what’s happening → https://thehackernews.com/2025/06/silver-fox-apt-targets-taiwan-with.html
Hackers use fake tax emails, sneaky PDFs, and ZIP traps to hijack systems and spy on users.
It’s all linked to China-backed Silver Fox APT.
Here’s what’s happening → https://thehackernews.com/2025/06/silver-fox-apt-targets-taiwan-with.html
😱8👍7😁4🤔1
🚨 130,000 devices. One forgotten service account.
A 2024 botnet attack used stale Microsoft 365 accounts with weak passwords—bypassing MFA silently via legacy auth.
If you're not auditing AD service accounts, you're already exposed.
Here’s how to fix it ↓ https://thehackernews.com/2025/06/are-forgotten-ad-service-accounts.html
A 2024 botnet attack used stale Microsoft 365 accounts with weak passwords—bypassing MFA silently via legacy auth.
If you're not auditing AD service accounts, you're already exposed.
Here’s how to fix it ↓ https://thehackernews.com/2025/06/are-forgotten-ad-service-accounts.html
😁21👍1
🚨 A LangChain vulnerability let attackers steal OpenAI API keys, prompts & files—just by clicking “Try It.”
All data silently routed through a malicious proxy.
Details → https://thehackernews.com/2025/06/langchain-langsmith-bug-let-hackers.html
Patched now—but the risk was real.
All data silently routed through a malicious proxy.
Details → https://thehackernews.com/2025/06/langchain-langsmith-bug-let-hackers.html
Patched now—but the risk was real.
🤯7🤔5👍2😁2
🚨 A Chrome zero-day (CVE-2025-2783) was used in a live attack to drop a stealthy backdoor.
The hacker group TaxOff tricked targets with fake forum invites—one click, full compromise.
Here’s how the Trinper malware quietly hijacked systems ↓ https://thehackernews.com/2025/06/google-chrome-zero-day-cve-2025-2783.html
The hacker group TaxOff tricked targets with fake forum invites—one click, full compromise.
Here’s how the Trinper malware quietly hijacked systems ↓ https://thehackernews.com/2025/06/google-chrome-zero-day-cve-2025-2783.html
🔥21🤔9⚡4👍3😁1🤯1
🚨 Iran slows internet access following Israeli missile strikes and cyber attacks on Bank Sepah.
Both sides ramp up digital warfare as state hackers and hacktivist groups escalate regional cyber conflict.
Here’s what’s unfolding ↓ https://thehackernews.com/2025/06/iran-restricts-internet-access-to.html
Both sides ramp up digital warfare as state hackers and hacktivist groups escalate regional cyber conflict.
Here’s what’s unfolding ↓ https://thehackernews.com/2025/06/iran-restricts-internet-access-to.html
😁19😱14👍4🔥1
⚠️ Critical flaw in Veeam Backup (CVSS 9.9) lets attackers execute code remotely—even after a prior patch.
Researchers warn: the old fix could be bypassed. New version out now.
Don’t wait. Update now → https://thehackernews.com/2025/06/veeam-patches-cve-2025-23121-critical.html
Researchers warn: the old fix could be bypassed. New version out now.
Don’t wait. Update now → https://thehackernews.com/2025/06/veeam-patches-cve-2025-23121-critical.html
👍16😱1
🛠️🔓 A critical Linux kernel flaw (CVE-2023-0386) is now confirmed actively exploited—granting root access via a simple trick.
CISA just added it to the KEV list. Agencies have until July 8 to fix it.
Details here → https://thehackernews.com/2025/06/cisa-warns-of-active-exploitation-of.html
CISA just added it to the KEV list. Agencies have until July 8 to fix it.
Details here → https://thehackernews.com/2025/06/cisa-warns-of-active-exploitation-of.html
🔥20😱2👍1
A CIA analyst stole Top Secret docs—including Israel's plans to strike Iran—and leaked them online.
He tried to cover his tracks with image edits and file wipes.
Now? Just 37 months in prison.
Here’s what happened ↓ https://thehackernews.com/2025/06/ex-cia-analyst-sentenced-to-37-months.html
He tried to cover his tracks with image edits and file wipes.
Now? Just 37 months in prison.
Here’s what happened ↓ https://thehackernews.com/2025/06/ex-cia-analyst-sentenced-to-37-months.html
👍23👏8😁6🤯4🤔2
Tacking on compliance late? You risk more than fines—think failed audits, stalled deals, and fragile systems.
Build it in from day one.
Here's why ↓ https://thehackernews.com/expert-insights/2025/06/the-hidden-cost-of-treating-compliance.html
Build it in from day one.
Here's why ↓ https://thehackernews.com/expert-insights/2025/06/the-hidden-cost-of-treating-compliance.html
🤯5👏3👍2
🧪⚠️ Water Curse hijacked 76 GitHub repos to spread stealthy, multi-stage malware.
Posing as dev tools, it steals credentials, hijacks sessions, and persists undetected—active since March 2023.
Details → https://thehackernews.com/2025/06/water-curse-hijacks-76-github-accounts.html
Posing as dev tools, it steals credentials, hijacks sessions, and persists undetected—active since March 2023.
Details → https://thehackernews.com/2025/06/water-curse-hijacks-76-github-accounts.html
🤯13😱5
Webinar: Shadow IT Monitoring Across OAuth & Chrome + Gmail Security — Without Scripts or Rigid Tools
If you’re a Google Workspace Admin, you’ve seen it all:
📤 Emails forwarded to personal accounts
🔗 OAuth apps with risky Drive or Gmail access
🧩 Unapproved Chrome extensions sneaking through
📩 ...and endless back-and-forth approval emails
You don’t need another alert—you need enforcement.
Join us for a fast-paced session where we’ll show how Admins are automating:
✅ Gmail forwarding rule detection & response
✅ Passive shadow IT monitoring across OAuth & Chrome
✅ Extension & app approval requests with AI-powered policy logic
Featuring:
Mike Klambro – Ex-Google, now helping orgs scale security workflows
Fernanda Lopez – Customer Success Engineer at Zenphi.
When: June 26, in 3 time zones
👉 Register here: https://thn.news/google-workspace-security
If you’re a Google Workspace Admin, you’ve seen it all:
📤 Emails forwarded to personal accounts
🔗 OAuth apps with risky Drive or Gmail access
🧩 Unapproved Chrome extensions sneaking through
📩 ...and endless back-and-forth approval emails
You don’t need another alert—you need enforcement.
Join us for a fast-paced session where we’ll show how Admins are automating:
✅ Gmail forwarding rule detection & response
✅ Passive shadow IT monitoring across OAuth & Chrome
✅ Extension & app approval requests with AI-powered policy logic
Featuring:
Mike Klambro – Ex-Google, now helping orgs scale security workflows
Fernanda Lopez – Customer Success Engineer at Zenphi.
When: June 26, in 3 time zones
👉 Register here: https://thn.news/google-workspace-security
😁6😱2👍1
🚨 Over 1,500 Minecraft players infected by fake mod downloads on GitHub
A Russian-speaking group used the “Stargazers Ghost Network” to drop Java + .NET stealers via undetected cheats. Victims lost browser passwords, wallet data, Discord tokens, and more.
Details here → https://thehackernews.com/2025/06/1500-minecraft-players-infected-by-java.html
A Russian-speaking group used the “Stargazers Ghost Network” to drop Java + .NET stealers via undetected cheats. Victims lost browser passwords, wallet data, Discord tokens, and more.
Details here → https://thehackernews.com/2025/06/1500-minecraft-players-infected-by-java.html
😁33🤯10👍6🤔1
🚨 Hackers are hijacking Cloudflare Tunnel subdomains to launch memory-injected RATs—right through fake PDFs.
The trick? Shortcut files + stealth loaders + Python payloads, all hosted on legit URLs.
Here’s how they’re getting past detection → https://thehackernews.com/2025/06/new-malware-campaign-uses-cloudflare.html
The trick? Shortcut files + stealth loaders + Python payloads, all hosted on legit URLs.
Here’s how they’re getting past detection → https://thehackernews.com/2025/06/new-malware-campaign-uses-cloudflare.html
👍14🤔8🔥5⚡2
🛡️ FedRAMP isn’t just for big enterprises anymore.
A cybersecurity startup breaks down how it cleared FedRAMP Moderate—on startup speed.
💰 Cost: $1M+
⏱️ Time: 12+ months
📚 Lessons: Align early, integrate security, avoid federal-only forks.
Here’s how they did it ↓ https://thehackernews.com/2025/06/fedramp-at-startup-speed-lessons-learned.html
A cybersecurity startup breaks down how it cleared FedRAMP Moderate—on startup speed.
💰 Cost: $1M+
⏱️ Time: 12+ months
📚 Lessons: Align early, integrate security, avoid federal-only forks.
Here’s how they did it ↓ https://thehackernews.com/2025/06/fedramp-at-startup-speed-lessons-learned.html
🤯8🔥5
🚨 New Linux Root Exploits Discovered!
2 chained flaws (CVE-2025-6018 & 6019) let any local user become root in seconds—no zero-day needed.
The worst part? Most distros are vulnerable by default.
Details here → https://thehackernews.com/2025/06/new-linux-flaws-enable-full-root-access.html
2 chained flaws (CVE-2025-6018 & 6019) let any local user become root in seconds—no zero-day needed.
The worst part? Most distros are vulnerable by default.
Details here → https://thehackernews.com/2025/06/new-linux-flaws-enable-full-root-access.html
🔥17👍4👏2
Meta is rolling out passkeys across Facebook, Messenger, and Meta Pay—biometrics instead of passwords or SMS codes.
The goal? No more phishing, leaks, or login scams.
Full details on what’s changing → https://thehackernews.com/2025/06/meta-adds-passkey-login-support-to.html
The goal? No more phishing, leaks, or login scams.
Full details on what’s changing → https://thehackernews.com/2025/06/meta-adds-passkey-login-support-to.html
🤔21👏6🔥5👍3😁2
🚨 Russian APT29 hackers hijacked Gmail accounts using app passwords—bypassing 2FA with social engineering.
They posed as the U.S. State Dept to steal access from academics and critics.
Full story → https://thehackernews.com/2025/06/russian-apt29-exploits-gmail-app.html
They posed as the U.S. State Dept to steal access from academics and critics.
Full story → https://thehackernews.com/2025/06/russian-apt29-exploits-gmail-app.html
🤔16😁10🔥7👍6👏4🤯1
This media is not supported in your browser
VIEW IN TELEGRAM
⚠️ Most cyberattacks today don’t crash doors—they slip through unnoticed, hiding in trusted tools.
No malware alerts. No strange IPs. Just routine traffic—until it’s too late.
Watch this free WEBINAR to see how top experts spot and stop these hidden attacks: https://thehackernews.com/2025/06/uncover-lots-attacks-hiding-in-trusted.html
No malware alerts. No strange IPs. Just routine traffic—until it’s too late.
Watch this free WEBINAR to see how top experts spot and stop these hidden attacks: https://thehackernews.com/2025/06/uncover-lots-attacks-hiding-in-trusted.html
😱9🔥4👍3👏2