Forwarded from The Hacker News
🚨 Shadow AI is exploding inside enterprises. Employees are adopting LLM-powered apps without oversight—creating blind spots, supply chain risks, and data leaks.
Wing Security says traditional defenses can’t keep up. The fix? Real-time discovery + AI supply chain governance.
Read → https://thehackernews.com/2025/09/evolving-enterprise-defense-to-secure.html
Wing Security says traditional defenses can’t keep up. The fix? Real-time discovery + AI supply chain governance.
Read → https://thehackernews.com/2025/09/evolving-enterprise-defense-to-secure.html
Forwarded from The Hacker News
🚨 A new Android banking trojan is here: Datzbro.
It doesn’t just steal logins—it recreates your screen in real time for full device takeover.
Victims? Seniors lured via fake “active trip” groups on Facebook.
Details → https://thehackernews.com/2025/09/new-android-trojan-datzbro-tricking.html
It doesn’t just steal logins—it recreates your screen in real time for full device takeover.
Victims? Seniors lured via fake “active trip” groups on Facebook.
Details → https://thehackernews.com/2025/09/new-android-trojan-datzbro-tricking.html
Forwarded from The Hacker News
🔥 [New] VMware zero-day (CVE-2025-41244) exploited in the wild!
UNC5174 popped root by abusing a regex bug in get_version() — drop /tmp/httpd, open a socket, and you’re root.
Already active since Oct ’24.
Details → https://thehackernews.com/2025/09/urgent-china-linked-hackers-exploit-new.html
UNC5174 popped root by abusing a regex bug in get_version() — drop /tmp/httpd, open a socket, and you’re root.
Already active since Oct ’24.
Details → https://thehackernews.com/2025/09/urgent-china-linked-hackers-exploit-new.html
Forwarded from The Hacker News
🛠AI won’t fix your workflows—it might break them.
Learn how top teams actually blend humans + LLMs without over-engineering.
Secure, auditable, scalable.
📅 Join the webinar → https://thehacker.news/ai-automating-cybersecurity
Learn how top teams actually blend humans + LLMs without over-engineering.
Secure, auditable, scalable.
📅 Join the webinar → https://thehacker.news/ai-automating-cybersecurity
Forwarded from The Hacker News
🚨 Microsoft just made Sentinel an agentic SIEM.
Now GA: Sentinel data lake + preview of Graph & MCP server.
AI agents can retro-hunt, trace attack paths & plug into VS Code. From reactive to predictive defense.
Details → https://thehackernews.com/2025/09/microsoft-expands-sentinel-into-agentic.html
Now GA: Sentinel data lake + preview of Graph & MCP server.
AI agents can retro-hunt, trace attack paths & plug into VS Code. From reactive to predictive defense.
Details → https://thehackernews.com/2025/09/microsoft-expands-sentinel-into-agentic.html
Forwarded from The Hacker News
🚨 Google’s Gemini AI had a “Trifecta” of flaws that let attackers steal user data + hijack cloud assets.
The wildest part? Hackers could smuggle prompts inside HTTP headers to make Gemini expose IAM misconfigs & query Cloud APIs on their behalf.
Read → https://thehackernews.com/2025/09/researchers-disclose-google-gemini-ai.html
The wildest part? Hackers could smuggle prompts inside HTTP headers to make Gemini expose IAM misconfigs & query Cloud APIs on their behalf.
Read → https://thehackernews.com/2025/09/researchers-disclose-google-gemini-ai.html
Forwarded from The Hacker News
Containers boost speed and scale, but they also introduce risks that can be overlooked.
In this 30-minute session, we’ll challenge the biggest myths surrounding container security.
Save your spot now: https://thn.news/tech-stack-defense
In this 30-minute session, we’ll challenge the biggest myths surrounding container security.
Save your spot now: https://thn.news/tech-stack-defense
Forwarded from The Hacker News
💡 SOC alert chaos isn’t a volume problem—it’s the model.
Conifers’ CognitiveSOC™ turns raw alerts into context-rich stories: false positives drop, MTTR shrinks from hours → minutes.
More context, less chaos → https://thehackernews.com/2025/09/stop-alert-chaos-context-is-key-to.html
Conifers’ CognitiveSOC™ turns raw alerts into context-rich stories: false positives drop, MTTR shrinks from hours → minutes.
More context, less chaos → https://thehackernews.com/2025/09/stop-alert-chaos-context-is-key-to.html
Forwarded from The Hacker News
🚨 New China-linked hacking group uncovered: Phantom Taurus.
Targets: foreign ministries, embassies, & military ops across Africa, the Middle East, & Asia.
Their weapon? A custom .NET malware suite (NET-STAR) that hijacks IIS servers, timestomps files, & evades AMSI/ETW.
Read → https://thehackernews.com/2025/09/phantom-taurus-new-china-linked-hacker.html
Targets: foreign ministries, embassies, & military ops across Africa, the Middle East, & Asia.
Their weapon? A custom .NET malware suite (NET-STAR) that hijacks IIS servers, timestomps files, & evades AMSI/ETW.
Read → https://thehackernews.com/2025/09/phantom-taurus-new-china-linked-hacker.html
Forwarded from The Hacker News
🔥 A $50 hardware hack just broke Intel SGX & AMD SEV-SNP—the backbone of confidential cloud computing.
Researchers built a cheap DDR4 interposer that slips past trust checks, then flips a switch to rewrite encrypted memory on the fly.
The kicker? Fixing it would require redesigning memory encryption itself.
Details → https://thehackernews.com/2025/10/50-battering-ram-attack-breaks-intel.html
Researchers built a cheap DDR4 interposer that slips past trust checks, then flips a switch to rewrite encrypted memory on the fly.
The kicker? Fixing it would require redesigning memory encryption itself.
Details → https://thehackernews.com/2025/10/50-battering-ram-attack-breaks-intel.html
Forwarded from The Hacker News
CISOs are done buying shiny tools.
The new playbook? Threat-Informed Defense—using intel + adversary emulation to prove if your controls actually stop real attacker TTPs.
From poisoned CI/CD pipelines to identity-based API attacks—here’s how to operationalize it ↓ https://thehackernews.com/expert-insights/2025/09/turning-intelligence-into-action-with.html
The new playbook? Threat-Informed Defense—using intel + adversary emulation to prove if your controls actually stop real attacker TTPs.
From poisoned CI/CD pipelines to identity-based API attacks—here’s how to operationalize it ↓ https://thehackernews.com/expert-insights/2025/09/turning-intelligence-into-action-with.html
Forwarded from The Hacker News
⚠️ CERT-UA: Hackers are sneaking a new CABINETRAT backdoor into Ukraine via Excel XLL add-ins shared on Signal.
Shellcode is hidden inside a PNG (“Office.png”), launched by excel.exe /e in stealth mode.
Details here → https://thehackernews.com/2025/10/ukraine-warns-of-cabinetrat-backdoor.html
Shellcode is hidden inside a PNG (“Office.png”), launched by excel.exe /e in stealth mode.
Details here → https://thehackernews.com/2025/10/ukraine-warns-of-cabinetrat-backdoor.html
Forwarded from The Hacker News
🚨 New Android banking trojan spotted — Klopatra has hijacked 3,000+ devices in Spain & Italy.
It hides with Virbox-grade protection (never seen before in Android malware), uses hidden VNC to drain bank accounts at night—while victims think their phone is off.
Details here → https://thehackernews.com/2025/10/new-android-banking-trojan-klopatra.html
It hides with Virbox-grade protection (never seen before in Android malware), uses hidden VNC to drain bank accounts at night—while victims think their phone is off.
Details here → https://thehackernews.com/2025/10/new-android-banking-trojan-klopatra.html
Forwarded from The Hacker News
🚨 Attackers are hijacking industrial routers to blast out smishing texts across Europe.
Milesight routers expose an API that lets anyone send SMS without authentication. At least 572 devices remain wide open.
Find details here → https://thehackernews.com/2025/10/hackers-exploit-milesight-routers-to.html
Milesight routers expose an API that lets anyone send SMS without authentication. At least 572 devices remain wide open.
Find details here → https://thehackernews.com/2025/10/hackers-exploit-milesight-routers-to.html
Forwarded from The Hacker News
🚨 58% of security pros were told to hide a breach this year — a 38% spike since 2023.
The irony? While execs boast “confidence,” 84% of real attacks slip in through tools already inside your network.
The part no one’s talking about ↓ https://thehackernews.com/2025/10/2025-cybersecurity-reality-check.html
The irony? While execs boast “confidence,” 84% of real attacks slip in through tools already inside your network.
The part no one’s talking about ↓ https://thehackernews.com/2025/10/2025-cybersecurity-reality-check.html
Forwarded from The Hacker News
🚨 A single Jupyter notebook user could hijack an entire AI platform.
Red Hat OpenShift AI flaw (CVE-2025-10725) lets low-privileged accounts escalate to full cluster admin—total takeover possible.
That’s not the scariest part ↓ https://thehackernews.com/2025/10/critical-red-hat-openshift-ai-flaw.html
Red Hat OpenShift AI flaw (CVE-2025-10725) lets low-privileged accounts escalate to full cluster admin—total takeover possible.
That’s not the scariest part ↓ https://thehackernews.com/2025/10/critical-red-hat-openshift-ai-flaw.html
Forwarded from The Hacker News
⚠️ Automation alone won’t save you.
Too much AI = black-box risk.
Too many rules = brittle systems.
Too much human = bottlenecks.
The strongest workflows blend all three—intentionally.
See how in our next webinar ↓ https://thehackernews.com/2025/10/how-leading-security-teams-blend-ai.html
Too much AI = black-box risk.
Too many rules = brittle systems.
Too much human = bottlenecks.
The strongest workflows blend all three—intentionally.
See how in our next webinar ↓ https://thehackernews.com/2025/10/how-leading-security-teams-blend-ai.html
Forwarded from The Hacker News
🚨 New CVE in OneLogin (7.7 CVSS): API flaw exposed all OIDC client secrets.
Any attacker with valid keys could impersonate apps + move laterally.
Patched in 2025.3.0 — details here ↓ https://thehackernews.com/2025/10/onelogin-bug-let-attackers-use-api-keys.html
Any attacker with valid keys could impersonate apps + move laterally.
Patched in 2025.3.0 — details here ↓ https://thehackernews.com/2025/10/onelogin-bug-let-attackers-use-api-keys.html
Forwarded from The Hacker News
This media is not supported in your browser
VIEW IN TELEGRAM
🚨 Researchers just cracked Intel SGX on DDR4.
Attackers can now steal enclave keys with a $1k device bought online.
They can masquerade as genuine SGX hardware—while spying on your data.
The exploit: “WireTap.” Details ↓ https://thehackernews.com/2025/10/new-wiretap-attack-extracts-intel-sgx.html
Attackers can now steal enclave keys with a $1k device bought online.
They can masquerade as genuine SGX hardware—while spying on your data.
The exploit: “WireTap.” Details ↓ https://thehackernews.com/2025/10/new-wiretap-attack-extracts-intel-sgx.html
Forwarded from The Hacker News
Companies are spending millions on DDoS defense.
The result? Every single one surveyed still got hit.
The reason: defenses still rely on humans.
Full report ↓ https://thehackernews.com/expert-insights/2025/09/the-state-of-ddos-defenses-unpacking.html
The result? Every single one surveyed still got hit.
The reason: defenses still rely on humans.
Full report ↓ https://thehackernews.com/expert-insights/2025/09/the-state-of-ddos-defenses-unpacking.html
Forwarded from The Hacker News
🚨 Your “Signal” app might not be Signal at all!
Two spyware strains—ProSpy & ToSpy—masquerade as Signal and ToTok to infect Androids—and they’ve been active for years.
One version hides by launching the real app—while stealing your files, messages, and contacts.
Details ↓ https://thehackernews.com/2025/10/warning-beware-of-android-spyware.html
Two spyware strains—ProSpy & ToSpy—masquerade as Signal and ToTok to infect Androids—and they’ve been active for years.
One version hides by launching the real app—while stealing your files, messages, and contacts.
Details ↓ https://thehackernews.com/2025/10/warning-beware-of-android-spyware.html