macOS Version of HZ RAT Backdoor Targets Chinese Messaging App Users

THN Daily Updates
Newsletter
cover

Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time

This desk reference handbook gives a hands-on experience on various algorithms and popular techniques used in real-time in data science to all researchers working in various domains.

Download Now Sponsored
LATEST NEWS Aug 28, 2024

BlackByte Ransomware Exploits VMware ESXi Flaw in Latest Attack Wave

The threat actors behind the BlackByte ransomware group have been observed likely exploiting a recently patched security flaw impacting VMware ESXi hypervisors, while also leveraging various ...

Read More
Twitter Facebook LinkedIn

CISA Flags Critical Apache OFBiz Flaw Amid Active Exploitation Reports

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw affecting the Apache OFBiz open-source enterprise resource planning (ERP) system to its ...

Read More
Twitter Facebook LinkedIn

Save Time and Money Updating Your Cloud Security Posture

Tired of manually patching your operating systems in the cloud? CIS® not only performs the initial hardening of the CIS Hardened Images® but also updates them on a regular basis. That way, you can spend your time and money ...

Read More
Twitter Facebook LinkedIn

New QR Code Phishing Campaign Exploits Microsoft Sway to Steal Credentials

Cybersecurity researchers are calling attention to a new QR code phishing (aka quishing) campaign that leverages Microsoft Sway infrastructure to host fake pages, once again highlighting the abuse ...

Read More
Twitter Facebook LinkedIn

Critical WPML Plugin Flaw Exposes WordPress Sites to Remote Code Execution

A critical security flaw has been disclosed in the WPML WordPress multilingual plugin that could allow authenticated users to execute arbitrary code remotely under certain circumstances. The ...

Read More
Twitter Facebook LinkedIn

macOS Version of HZ RAT Backdoor Targets Chinese Messaging App Users

Users of Chinese instant messaging apps like DingTalk and WeChat are the target of an Apple macOS version of a backdoor named HZ RAT. The artifacts "almost exactly replicate the functionality of the ...

Read More
Twitter Facebook LinkedIn

Chinese Volt Typhoon Exploits Versa Director Flaw, Targets U.S. and Global IT Sectors

The China-nexus cyber espionage group tracked as Volt Typhoon has been attributed with moderate confidence to the zero-day exploitation of a recently disclosed high-severity security flaw impacting ...

Read More
Twitter Facebook LinkedIn

CTEM in the Spotlight: How Gartner's New Categories Help to Manage Exposures

Want to know what’s the latest and greatest in SecOps for 2024? Gartner’s recently released Hype Cycle for Security Operations report takes important steps to organize and mature the domain of ...

Read More
Twitter Facebook LinkedIn
cover

Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time

This desk reference handbook gives a hands-on experience on various algorithms and popular techniques used in real-time in data science to all researchers working in various domains.

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | 2nd Floor, 219, K.P BLock, Pitampura, Delhi

Older messages

Google Warns of CVE-2024-7965 Chrome Security Flaw Under Active Exploitation

Tuesday, August 27, 2024

THN Daily Updates Newsletter cover Cybersecurity Strategies and Best Practices ($39.99 Value) FREE for a Limited Time A comprehensive guide to mastering enterprise cyber defense tactics and techniques

New Android Malware NGate Steals NFC Data to Clone Contactless Payment Cards

Monday, August 26, 2024

THN Daily Updates Newsletter cover The Ultimate Kali Linux Book: Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting, Third Edition ($43.99 Value) FREE for a Limited Time

Beware - New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data

Saturday, August 24, 2024

THN Daily Updates Newsletter cover The Ultimate Kali Linux Book: Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting, Third Edition ($43.99 Value) FREE for a Limited Time

Beware - New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data

Friday, August 23, 2024

THN Daily Updates Newsletter cover Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time This desk reference handbook gives a hands-on experience on various algorithms and

Urgent - Google Fixes High-Severity Chrome Flaw Actively Exploited in the Wild

Thursday, August 22, 2024

THN Daily Updates Newsletter cover Cybersecurity Strategies and Best Practices ($39.99 Value) FREE for a Limited Time A comprehensive guide to mastering enterprise cyber defense tactics and techniques

You Might Also Like

📧 Introduction to Dapr for .NET Developers

Saturday, March 1, 2025

​ Introduction to Dapr for .NET Developers Read on: m​y website / Read time: 10 minutes The .NET Weekly is brought to you by: ​Get every Dometrain Course at 40% off! Dometrain is an educational courses

This Week in Rust #588

Saturday, March 1, 2025

Email isn't displaying correctly? Read this e-mail on the Web This Week in Rust issue 588 — 26 FEB 2025 Hello and welcome to another issue of This Week in Rust! Rust is a programming language

WebAIM February 2025 Newsletter

Friday, February 28, 2025

WebAIM February 2025 Newsletter Read this newsletter online at https://webaim.org/newsletter/2025/february Feature Global Digital Accessibility Salary Survey Results The results of the WebAIM and GAAD

JSK Daily for Feb 28, 2025

Friday, February 28, 2025

JSK Daily for Feb 28, 2025 View this email in your browser A community curated daily e-mail of JavaScript news Introducing the New Angular TextArea Component It is a robust and flexible user interface

Daily Coding Problem: Problem #1704 [Medium]

Friday, February 28, 2025

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Amazon. At a popular bar, each customer has a set of favorite drinks, and will happily

iOS Dev Weekly – Issue 701

Friday, February 28, 2025

What does Dave write about when he has a fever? 🤒 Let's find out! ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

Feature | The Best Visualizations from February on Voronoi 🏆

Friday, February 28, 2025

See the most popular, most discussed, and most liked visualizations on our new data storytelling app Voronoi from February. View Online | Subscribe About a year ago, we launched Voronoi, our free new

Issue #582: Phaser Launcher, DOOM in TypeScript types, and A Prison for Dreams

Friday, February 28, 2025

View this email in your browser Issue #582 - February 28th 2025 Weekly newsletter about Web Game Development. If you have anything you want to share with our community please let me know by replying to

Stop Android photo surveillance 🔍

Friday, February 28, 2025

Cheaper streaming 📺; 1Password nightmare 💀 -- ZDNET ZDNET Week in Review - US February 28, 2025 machine eye A new Android feature is scanning your photos for 'sensitive content' - how to stop

Why Natural Language Coding Isn’t for Everyone—Yet

Friday, February 28, 2025

Top Tech Content sent at Noon! Boost Your Article on HackerNoon for $159.99! Read this email in your browser How are you, @newsletterest1? 🪐 What's happening in tech today, February 28, 2025? The