Akira Ransomware Gang Extorts $42 Million; Now Targets Linux Servers

THN Daily Updates
Newsletter
cover

Webinar -- The Future of Threat Hunting Is Powered by Generative AI

From Data to Defense: Step Into the Next Era of Cybersecurity with CensysGPT

Download Now Sponsored
LATEST NEWS Apr 19, 2024

How Attackers Can Own a Business Without Touching the Endpoint

Attackers are increasingly making use of “networkless” attack techniques targeting cloud apps and identities. Here’s how att... ...

Read More
Twitter Facebook LinkedIn

Akira Ransomware Gang Extorts $42 Million; Now Targets Linux Servers

Threat actors behind the Akira ransomware group have extorted approximately $42 million in illicit proceeds after breaching the networks of more than ... ...

Read More
Twitter Facebook LinkedIn

Free shadow SaaS inventory. Discover and secure all SaaS, IaaS and PaaS accounts

Get a full inventory of all SaaS accounts ever created by anyone in your org, in minutes. No agents, browser plug-ins or network changes required. Get started today with a free ...

Read More
Twitter Facebook LinkedIn

Hackers Target Middle East Governments with Evasive "CR4T" Backdoor

Government entities in the Middle East have been targeted as part of a previously undocumented campaign to deliver a new backdoor dubbed CR4... ...

Read More
Twitter Facebook LinkedIn

OfflRouter Malware Evades Detection in Ukraine for Almost a Decade

Select Ukrainian government networks have remained infected with a malware called OfflRouter since 2015. Cisco Talos said its findings are based on an... ...

Read More
Twitter Facebook LinkedIn

FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor

The infamous cybercrime syndicate known as FIN7 has been linked to a spear-phishing campaign targeting the U.S. automotive industry to deliver a known... ...

Read More
Twitter Facebook LinkedIn

Recover from Ransomware in 5 Minutes—We will Teach You How!

Super Low RPO with Continuous Data Protection:Dial Back to Just Seconds Before an Attack Zerto, a Hewlett Packard Enterprise company, can help you det... ...

Read More
Twitter Facebook LinkedIn

New Android Trojan 'SoumniBot' Evades Detection with Clever Tricks

A new Android trojan called SoumniBot has been detected in the wild targeting users in South Korea by leveraging weaknesses in the manifest ... ...

Read More
Twitter Facebook LinkedIn
cover

Webinar -- The Future of Threat Hunting Is Powered by Generative AI

From Data to Defense: Step Into the Next Era of Cybersecurity with CensysGPT

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | K.P Block, Pitampura, Delhi

Older messages

Beware: New Android Trojan 'SoumniBot' Evades Detection with Clever Tricks

Thursday, April 18, 2024

THN Daily Updates Newsletter cover Webinar -- Supply Chain Under Siege: Unveiling Hidden Threats Stop playing defense--start hunting threats. Protect your software supply chain with proactive

Comply with Google & Yahoo's New 2024 Email Authentication Requirements

Wednesday, April 17, 2024

Protect your domain from phishing and spoofing with PowerDMARC ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware

Wednesday, April 17, 2024

THN Daily Updates Newsletter cover Windows Server 2022 & PowerShell All-in-One For Dummies ($30.00 Value) FREE for a Limited Time All the essentials for administering Windows Server 2022 in one

Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw

Tuesday, April 16, 2024

THN Daily Updates Newsletter cover Webinar -- The Future of Threat Hunting Is Powered by Generative AI From Data to Defense: Step Into the Next Era of Cybersecurity with CensysGPT Download Now

Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users

Monday, April 15, 2024

THN Daily Updates Newsletter cover Webinar -- Data Security is Different at the Petabyte Scale Discover the secrets to securing fast-moving, massive data sets with insights from industry titans

You Might Also Like

Weekend Reading — The Agentic AI revolution

Saturday, March 8, 2025

Street Art Utopia “Darth Fisher sculpture by Frankey for Amsterdam Light Festival in Amsterdam, The Netherlands. Photos by Janus van den Eijnden.” Tech Stuff Claude Code overview The Agentic AI

Daily Coding Problem: Problem #1712 [Easy]

Saturday, March 8, 2025

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Google. Given the root of a binary search tree, and a target K , return two nodes in the

⚙️ AI agents are failing the compliance industry

Saturday, March 8, 2025

March 08, 2025 | Read Online Subscribe | Advertise Good Morning. Welcome to this special edition of The Deep View, brought to you in collaboration with Delve. 2025 is the year of AI agents. While

Ranked | The World's Best-Selling Cars From 2024 🚗

Saturday, March 8, 2025

Which vehicles are dominating global sales? See our latest graphic ranking the world's best-selling cars from 2024. View Online | Subscribe | Download Our App See new charts from hundreds of

🐍 New Python tutorials on Real Python

Saturday, March 8, 2025

Hey there, There's always something going on over at Real Python as far as Python tutorials go. Here's what you may have missed this past week: Quiz: What Is the Python Global Interpreter Lock

Want to get ready for how AI will change your career?

Saturday, March 8, 2025

Professionals and parents ask me this a lot ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations

Saturday, March 8, 2025

THN Daily Updates Newsletter cover ⚡ LIVE WEBINAR ➟ ASPM: The Future of AppSec -- Boom or Bust? Discover How ASPM is Redefining Application Security with Smarter, Unified Solutions. Download Now

🍿 Will We Ever Own Movies Again? — How Accurate Are Cell Phone Network Coverage Maps

Saturday, March 8, 2025

Also: 6 Iconic Games You Didn't Know Were Actually Knockoffs How-To Geek Logo March 8, 2025 Did You Know Although best known for her role as Trinity in the iconic 1999 sci-fi film The Matrix, that

2.4M new accounts in Feb

Saturday, March 8, 2025

YouTube for enterprise onboarding, new UX audits grants program, OG Tracker Feb report, and more ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

SWLW #641: The Meeting Manifesto, Avoiding Strategy Drift, and more.

Saturday, March 8, 2025

Weekly articles & videos about people, culture and leadership: everything you need to design the org that makes the product. A weekly newsletter by Oren Ellenbogen with the best content I found