Microsoft Defender Flaw Exploited to Deliver ACR, Lumma, and Meduza Stealers

THN Daily Updates
Newsletter
cover

Kali Linux Penetration Testing Bible ($25.00 Value) FREE for a Limited Time

Your ultimate guide to pentesting with Kali Linux

Download Now Sponsored
LATEST NEWS Jul 24, 2024

How a Trust Center Solves Your Security Questionnaire Problem

Security questionnaires aren’t just an inconvenience — they’re a recurring problem for security and sales teams. They bleed time from organizati... ...

Read More
Twitter Facebook LinkedIn

How to Reduce SaaS Spend and Risk Without Impacting Productivity

There is one simple driver behind the modern explosion in SaaS adoption: productivity. We have reached an era where purpose-built tools exist for almo... ...

Read More
Twitter Facebook LinkedIn

Join the Live Session: State of Trust in AI

Trust management is one of cybersecurity's hottest emerging terms. But what is it? And why should you care? This piece explores trust management from concept to execution, plus how to leverage it for your ...

Read More
Twitter Facebook LinkedIn

Patchwork Hackers Target Bhutan with Advanced Brute Ratel C4 Tool

The threat actor known as Patchwork has been linked to a cyber attack targeting entities with ties to Bhutan to deliver the Brute Ratel C4 framework a... ...

Read More
Twitter Facebook LinkedIn

CrowdStrike Explains Friday Incident Crashing Millions of Windows Devices

Cybersecurity firm CrowdStrike on Wednesday blamed an issue in its validation system for causing millions of Windows devices to crash as part of a wid... ...

Read More
Twitter Facebook LinkedIn

Microsoft Defender Flaw Exploited to Deliver ACR, Lumma, and Meduza Stealers

A now-patched security flaw in the Microsoft Defender SmartScreen has been exploited as part of a new campaign designed to deliver information stealer... ...

Read More
Twitter Facebook LinkedIn

CISA Adds Twilio Authy and IE Flaws to Exploited Vulnerabilities List

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog, ba... ...

Read More
Twitter Facebook LinkedIn

Chinese Hackers Target Taiwan and U.S. NGO with MgBot and MACMA Malware

Organizations in Taiwan and a U.S. non-governmental organization (NGO) based in China have been targeted by a Beijing-affiliated state-sponsored hacki... ...

Read More
Twitter Facebook LinkedIn
cover

Kali Linux Penetration Testing Bible ($25.00 Value) FREE for a Limited Time

Your ultimate guide to pentesting with Kali Linux

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | 2nd Floor, 219, K.P BLock, Pitampura, Delhi

Older messages

eBook: The Cyber Insurance MFA Checklist

Tuesday, July 23, 2024

How to Comply with the Cyber Insurance MFA Checklist ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

Alert: New ICS Malware 'FrostyGoop' Targeting Critical Infrastructure

Tuesday, July 23, 2024

THN Daily Updates Newsletter cover [Watch LIVE] Turn Developers into Allies: The Power of Security Champion Programs Transform Your Team: Learn How Security Champions Turn Developers into Security

New Linux Variant of Play Ransomware Targeting VMware ESXi Systems

Monday, July 22, 2024

THN Daily Updates Newsletter cover Professional JavaScript for Web Developers, 5th Edition ($48.00 Value) FREE for a Limited Time Update and upgrade your JavaScript skillset for ES 2023 with the

Biggest IT Outage in History — Who's Behind It and What's the Impact?

Saturday, July 20, 2024

THN Daily Updates Newsletter cover Professional JavaScript for Web Developers, 5th Edition ($48.00 Value) FREE for a Limited Time Update and upgrade your JavaScript skillset for ES 2023 with the

APT41 Infiltrates Networks in Italy, Spain, Taiwan, Turkey, and the U.K.

Friday, July 19, 2024

THN Daily Updates Newsletter cover [Watch LIVE] Turn Developers into Allies: The Power of Security Champion Programs Transform Your Team: Learn How Security Champions Turn Developers into Security

You Might Also Like

🕹️ That One Time Apple Made a Console — Analog Computers Are Coming Back

Monday, September 16, 2024

Also: The PlayStation 5 Pro is a Bargain, and More! How-To Geek Logo September 16, 2024 Did You Know Rats, mice, and other rodents communicate not just in the range of sound frequencies humans can hear

[AI Incubator] Fall enrollment is now open 🍁🎓

Monday, September 16, 2024

NEW: We're adding more live coaching sessions ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

Deepdive – Competitive Analysis

Monday, September 16, 2024

As a Product Manager, staying ahead of the competition isn't just an advantage—it's a necessity. ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

Daily Coding Problem: Problem #1558 [Easy]

Monday, September 16, 2024

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Twitter. A classroom consists of N students, whose friendships can be represented in an

When Logs and metrics aren't enough: Discovering Modern Observability

Monday, September 16, 2024

Let's return to the previous series and discuss the typical challenge of distributed systems: Observability. We'll continue to use managing a connection pool for database access as an example

The Art of finishing & The browser for research

Monday, September 16, 2024

A new deep dive about a new browser, track everything and understand your life, the story of Figma Sans, and a lot more in this week's issue of Creativerly. Creativerly The Art of finishing &

AI Student Demo Day is LIVE!

Monday, September 16, 2024

Here's the link to join ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

Charted | Coal Consumption by Region (1965-2023) 📈

Monday, September 16, 2024

This graphic presents global coal consumption by region from 1965 to 2023, highlighting Asia's continued role in driving demand. View Online | Subscribe | Download Our App Experience Data Without

5 Gaming Franchises That Need to Return

Monday, September 16, 2024

Top Tech Content sent at Noon! A dev conference with discussions, workshops, and 1:1 feedback sessions Read this email in your browser How are you, @newsletterest1? 🪐 What's happening in tech today

GCP Newsletter #416

Monday, September 16, 2024

Welcome to issue #416 September 16th, 2024 News Backup and DR Service Compute Engine Official Blog Introducing backup vaults for cyber resilience and simplified Compute Engine backups - Google Cloud