Beware - New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data

THN Daily Updates
Newsletter
cover

The Ultimate Kali Linux Book: Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting, Third Edition ($43.99 Value) FREE for a Limited Time

Embark on an exciting journey into the world of Kali Linux -- the central hub for advanced penetration testing.

Download Now Sponsored
LATEST NEWS Aug 24, 2024

CISA Urges Federal Agencies to Patch Versa Director Vulnerability by September

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has placed a security flaw impacting Versa Director to its Known Exploited Vulnerabilities (KEV) catalog based on evidence of active ...

Read More
Twitter Facebook LinkedIn

Meta Exposes Iranian Hacker Group Targeting Global Political Figures on WhatsApp

Meta Platforms on Friday became the latest company after Microsoft, Google, and OpenAI to expose the activities of an Iranian state-sponsored threat actor, who it said used a set of WhatsApp accounts ...

Read More
Twitter Facebook LinkedIn

The Security Leader's Playbook: Automate effectively across your security work

Embracing workflow automation in security can lead to fewer mistakes and more efficient teams. But only if it’s done well. Learn how to build an effective security workflow automation and AI program in the latest guide from ...

Read More
Twitter Facebook LinkedIn

PEAKLIGHT Downloader Deployed in Attacks Targeting Windows with Malicious Movie Downloads

Cybersecurity researchers have uncovered a never-before-seen dropper that serves as a conduit to launch next-stage malware with the ultimate goal of infecting Windows systems with information ...

Read More
Twitter Facebook LinkedIn

Webinar: Experience the Power of a Must-Have All-in-One Cybersecurity Platform

Let's be honest. The world of cybersecurity feels like a constant war zone. You're bombarded by threats, scrambling to keep up with patches, and drowning in an endless flood of alerts. It's ...

Read More
Twitter Facebook LinkedIn

Focus on What Matters Most: Exposure Management and Your Attack Surface

Read the full article for key points from Intruder’s VP of Product, Andy Hornegold’s recent talk on exposure management. If you’d like to hear Andy’s insights first-hand, watch ...

Read More
Twitter Facebook LinkedIn

How to Modernize Your Microsoft 365 Data Protection Strategy to Ensure Business Continuity

Safeguard Microsoft 365 data with advanced backup solutions. Discover essential strategies to prevent cyberattacks and ensure business continuity.

Read More
Twitter Facebook LinkedIn

New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data

The threat actors behind a recently observed Qilin ransomware attack have stolen credentials stored in Google Chrome browsers on a small set of compromised endpoints. The use of credential harvesting ...

Read More
Twitter Facebook LinkedIn
cover

The Ultimate Kali Linux Book: Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting, Third Edition ($43.99 Value) FREE for a Limited Time

Embark on an exciting journey into the world of Kali Linux -- the central hub for advanced penetration testing.

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | 2nd Floor, 219, K.P BLock, Pitampura, Delhi

Older messages

Beware - New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data

Friday, August 23, 2024

THN Daily Updates Newsletter cover Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time This desk reference handbook gives a hands-on experience on various algorithms and

Urgent - Google Fixes High-Severity Chrome Flaw Actively Exploited in the Wild

Thursday, August 22, 2024

THN Daily Updates Newsletter cover Cybersecurity Strategies and Best Practices ($39.99 Value) FREE for a Limited Time A comprehensive guide to mastering enterprise cyber defense tactics and techniques

Join Your Infosec Peers at Audit & Beyond!

Wednesday, August 21, 2024

#8 - hero-min.png You're invited to this year's premier event for risk and compliance leaders, Audit & Beyond. The event will feature thought leadership from Infosec leaders across all

New macOS Malware TodoSwift Linked to North Korean Hacking Groups

Wednesday, August 21, 2024

THN Daily Updates Newsletter cover Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time This desk reference handbook gives a hands-on experience on various algorithms and

CISA Warns of Critical Jenkins Vulnerability Exploited in Ransomware Attacks

Tuesday, August 20, 2024

THN Daily Updates Newsletter cover Machine Learning with Python: Unlocking AI Potential with Python and Machine Learning ($9.99 Value) FREE for a Limited Time The course starts by setting the

You Might Also Like

📧 Introduction to Dapr for .NET Developers

Saturday, March 1, 2025

​ Introduction to Dapr for .NET Developers Read on: m​y website / Read time: 10 minutes The .NET Weekly is brought to you by: ​Get every Dometrain Course at 40% off! Dometrain is an educational courses

This Week in Rust #588

Saturday, March 1, 2025

Email isn't displaying correctly? Read this e-mail on the Web This Week in Rust issue 588 — 26 FEB 2025 Hello and welcome to another issue of This Week in Rust! Rust is a programming language

WebAIM February 2025 Newsletter

Friday, February 28, 2025

WebAIM February 2025 Newsletter Read this newsletter online at https://webaim.org/newsletter/2025/february Feature Global Digital Accessibility Salary Survey Results The results of the WebAIM and GAAD

JSK Daily for Feb 28, 2025

Friday, February 28, 2025

JSK Daily for Feb 28, 2025 View this email in your browser A community curated daily e-mail of JavaScript news Introducing the New Angular TextArea Component It is a robust and flexible user interface

Daily Coding Problem: Problem #1704 [Medium]

Friday, February 28, 2025

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Amazon. At a popular bar, each customer has a set of favorite drinks, and will happily

iOS Dev Weekly – Issue 701

Friday, February 28, 2025

What does Dave write about when he has a fever? 🤒 Let's find out! ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

Feature | The Best Visualizations from February on Voronoi 🏆

Friday, February 28, 2025

See the most popular, most discussed, and most liked visualizations on our new data storytelling app Voronoi from February. View Online | Subscribe About a year ago, we launched Voronoi, our free new

Issue #582: Phaser Launcher, DOOM in TypeScript types, and A Prison for Dreams

Friday, February 28, 2025

View this email in your browser Issue #582 - February 28th 2025 Weekly newsletter about Web Game Development. If you have anything you want to share with our community please let me know by replying to

Stop Android photo surveillance 🔍

Friday, February 28, 2025

Cheaper streaming 📺; 1Password nightmare 💀 -- ZDNET ZDNET Week in Review - US February 28, 2025 machine eye A new Android feature is scanning your photos for 'sensitive content' - how to stop

Why Natural Language Coding Isn’t for Everyone—Yet

Friday, February 28, 2025

Top Tech Content sent at Noon! Boost Your Article on HackerNoon for $159.99! Read this email in your browser How are you, @newsletterest1? 🪐 What's happening in tech today, February 28, 2025? The