WARNING: Bitcoin Wallets Created b/w 2011-2015 Vulnerable to Hacking

THN Daily Updates
Newsletter
cover

Webinar: Navigating the Cloud Attack Landscape: 2023 Trends, Techniques, and Tactics

From Zenbleed to Kubernetes attacks - 2023 is proving a challenging year for cloud security. Get equipped with with strategies to combat these threats

Download Now Sponsored
LATEST NEWS Nov 20, 2023

Why Defenders Should Embrace a Hacker Mindset

Today’s security leaders must manage a constantly evolving attack surface and a dynamic threat environment due to interconnected devices, cloud serv... ...

Read More
Twitter Facebook LinkedIn

LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox Technique

The stealer malware known as LummaC2 (aka Lumma Stealer) now features a new anti-sandbox technique that leverages the mathematical principle of trig... ...

Read More
Twitter Facebook LinkedIn

Kubernetes Security Best Practices

In this new Kubernetes security cheat sheet, Wiz shares 10 advanced steps to safeguard your Kubernetes Clusters across: components, networks security, and pods. Get this free 6-page cheat sheet ...

Read More
Twitter Facebook LinkedIn

Randstorm Exploit: Bitcoin Wallets Created b/w 2011-2015 Vulnerable to Hacking

Bitcoin wallets created between 2011 and 2015 are susceptible to a new kind of exploit called Randstorm that makes it possible to recover passwords ... ...

Read More
Twitter Facebook LinkedIn

Indian Hack-for-Hire Group Targeted U.S., China, and More for Over 10 Years

An Indian hack-for-hire group targeted the U.S., China, Myanmar, Pakistan, Kuwait, and other countries as part of a wide-ranging espionage, surveillan... ...

Read More
Twitter Facebook LinkedIn

8Base Group Deploying New Phobos Ransomware Variant via SmokeLoader

The threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to conduct their financially motivated attacks. The ... ...

Read More
Twitter Facebook LinkedIn

Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks

Russian cyber espionage actors affiliated with the Federal Security Service (FSB) have been observed using a USB propagating worm called LitterDrifte... ...

Read More
Twitter Facebook LinkedIn

Beware: Malicious Google Ads Trick WinSCP Users into Installing Malware

Threat actors are leveraging manipulated search results and bogus Google ads that trick users who are looking to download legitimate software such as ... ...

Read More
Twitter Facebook LinkedIn
cover

Webinar: Navigating the Cloud Attack Landscape: 2023 Trends, Techniques, and Tactics

From Zenbleed to Kubernetes attacks - 2023 is proving a challenging year for cloud security. Get equipped with with strategies to combat these threats

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | 2nd Floor, 219, K.P BLock, Pitampura, Delhi

Older messages

Zero-Day Flaw in Zimbra Email Software Exploited by Four Hacker Groups

Saturday, November 18, 2023

THN Daily Updates Newsletter cover Insider Risk Management: Adapting to the Evolving Security Landscape This comprehensive, 68 page eBook dives into how insider threat is a risk management problem

Zero-Day Flaw in Zimbra Email Software Exploited by Four Hacker Groups

Friday, November 17, 2023

THN Daily Updates Newsletter cover The 7 Deadly Sins of Low-Code Security and How to Avoid Them What are the top security risks and concerns for Low-Code/No-Code development? This paper lists the seven

Latest Hacking News — Intel and AMD CPU Vulnerabilities | Windows Zero-Days

Friday, November 17, 2023

THN Daily Updates Newsletter cover Insider Threats: When the Attacker Has Valid Credentials Combat hard-to-find, costly, and dangerous insider threats Download Now Sponsored LATEST NEWS Nov 15, 2023

New PoC Exploit for Apache ActiveMQ Flaw Could Let Attackers Fly Under the Radar

Friday, November 17, 2023

THN Daily Updates Newsletter cover Webinar: Navigating the Cloud Attack Landscape: 2023 Trends, Techniques, and Tactics From Zenbleed to Kubernetes attacks - 2023 is proving a challenging year for

CISA Sets a Deadline - Patch Juniper Junos OS Flaws Before November 17

Tuesday, November 14, 2023

The Hacker News Daily Updates Newsletter cover Insider Threats: When the Attacker Has Valid Credentials Combat hard-to-find, costly, and dangerous insider threats Download Now Sponsored LATEST NEWS Nov

You Might Also Like

📧 How I Implemented Full-Text Search On My Website

Saturday, September 21, 2024

​ How I Implemented Full-Text Search On My Website Read on: m​y website / Read time: 8 minutes The .NET Weekly is brought to you by: Take Your Dev Collaboration To the Next Level ​ ​Postman v11 takes

Moore’s Flinch 💾

Saturday, September 21, 2024

Qualcomm reportedly makes a bold play for Intel. Here's a version for your browser. Hunting for the end of the long tail • September 20, 2024 Moore's Flinch The rumor mill is picking up steam

Power BI Weekly #276 - 20th September 2024

Friday, September 20, 2024

Power BI Weekly Newsletter Issue #276 powered by endjin Welcome to the (belated) 276th edition of Power BI Weekly! Sorry for the delay for this edition - a combination of vacation and general busyness

👆 Is Swiping Faster Than Typing on a Phone Keyboard? — Google Home Features You Gotta Try

Friday, September 20, 2024

Also: What the iPhone 16 Colors Really Look Like, and More! How-To Geek Logo September 20, 2024 Did You Know Thorny dragons, a species of small lizard native to Australia, appear to be able to drink

I recorded a video for you

Friday, September 20, 2024

if you prefer to watch this email instead of reading it, then… ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

JSK Daily for Sep 20, 2024

Friday, September 20, 2024

JSK Daily for Sep 20, 2024 View this email in your browser A community curated daily e-mail of JavaScript news Attention JavaScript Developers: New Certification Program Hey there p> Bob Senoff Read

The Heat Is On

Friday, September 20, 2024

Nike Ouster, iPhone Transfer Pain, Small Strawberry Models, China AI, iPhone Licenses, Shohei the Money, Disney's Unfreeze The Heat Is On Nike Ouster, iPhone Transfer Pain, Small Strawberry Models,

How to Get More Eyes on Your Stories: Social Media Promotion Tips 💡

Friday, September 20, 2024

Hello again, Hacker💚 Have you ever written an amazing, near-perfect article only for the views to not reflect your hard work? We know what that feels like, so here are some quick tips on how to promote

Ranked | The Most Reliable Car Brands, According to Consumer Reports 🚗

Friday, September 20, 2024

Consumer Reports ranked the most reliable car brands using surveys and analysis of over 330000 vehicles. Which cars are most reliable? View Online | Subscribe | Download Our App Presented by: Get more

Daily Coding Problem: Problem #1562 [Easy]

Friday, September 20, 2024

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Amazon. Consider the following scenario: there are N mice and N holes placed at integer