Hackers Use Fake GlobalProtect VPN Software in New WikiLoader Malware Attack

THN Daily Updates
Newsletter
cover

2024 LevelBlue Futures™ Report: Cyber Resilience

Computing has changed so fast that most IT leaders no longer have real visibility into their IT estate. Both proprietary and open sources of software are combined with legacy solutions, cloud computing, and digital transformation.

Download Now Sponsored
LATEST NEWS Sep 4, 2024

The New Effective Way to Prevent Account Takeovers

Account takeover attacks have emerged as one of the most persistent and damaging threats to cloud-based SaaS environments. Yet despite significant investments in traditional security measures, many ...

Read More
Twitter Facebook LinkedIn

Zyxel Patches Critical OS Command Injection Flaw in Access Points and Routers

Zyxel has released software updates to address a critical security flaw impacting certain access point (AP) and security router versions that could result in the execution of unauthorized commands. ...

Read More
Twitter Facebook LinkedIn

Organizations Require a New Approach to Handle Investigation and Response in the Cloud)

This survey report released by Cado Security examines the critical role and challenges of performing incident response in the cloud.

Read More
Twitter Facebook LinkedIn

Clearview AI Faces €30.5M Fine for Building Illegal Facial Recognition Database

The Dutch Data Protection Authority (Dutch DPA) has imposed a fine of €30.5 million ($33.7 million) against facial recognition firm Clearview AI for violating the General Data Protection Regulation ...

Read More
Twitter Facebook LinkedIn

Hackers Use Fake GlobalProtect VPN Software in New WikiLoader Malware Attack

A new malware campaign is spoofing Palo Alto Networks' GlobalProtect VPN software to deliver a variant of the WikiLoader (aka WailingCrab) loader by means of a search engine optimization (SEO) ...

Read More
Twitter Facebook LinkedIn

Hacktivists Exploits WinRAR Vulnerability in Attacks Against Russia and Belarus

A hacktivist group known as Head Mare has been linked to cyber attacks that exclusively target organizations located in Russia and Belarus. "Head Mare uses more up-to-date methods for obtaining ...

Read More
Twitter Facebook LinkedIn

New Rust-Based Ransomware Cicada3301 Targets Windows and Linux Systems

Cybersecurity researchers have unpacked the inner workings of a new ransomware variant called Cicada3301 that shares similarities with the now-defunct BlackCat (aka ALPHV) operation. "It appears ...

Read More
Twitter Facebook LinkedIn

Rocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android Users

Mobile users in Brazil are the target of a new malware campaign that delivers a new Android banking trojan named Rocinante. "This malware family is capable of performing keylogging using the ...

Read More
Twitter Facebook LinkedIn
cover

2024 LevelBlue Futures™ Report: Cyber Resilience

Computing has changed so fast that most IT leaders no longer have real visibility into their IT estate. Both proprietary and open sources of software are combined with legacy solutions, cloud computing, and digital transformation.

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | 2nd Floor, 219, K.P BLock, Pitampura, Delhi

Older messages

eBook: Eliminating the Lateral Movement Blind Spot with ITDR

Wednesday, September 4, 2024

Eliminate the Lateral Movement Blind Spot with ITDR ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access

Tuesday, September 3, 2024

THN Daily Updates Newsletter cover Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time This desk reference handbook gives a hands-on experience on various algorithms and

Malicious npm Packages Mimicking 'noblox.js' Compromise Roblox Developers' Systems

Monday, September 2, 2024

THN Daily Updates Newsletter cover Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time This desk reference handbook gives a hands-on experience on various algorithms and

Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign

Saturday, August 31, 2024

THN Daily Updates Newsletter cover Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time This desk reference handbook gives a hands-on experience on various algorithms and

New Malware Masquerades as Palo Alto VPN Targeting Middle East Users

Friday, August 30, 2024

THN Daily Updates Newsletter cover Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time This desk reference handbook gives a hands-on experience on various algorithms and

You Might Also Like

Exclusive: Top SaaS Security Threats of 2025—And How to Eliminate Them

Wednesday, September 18, 2024

Learn how 39% of companies are stepping up their defenses. ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

📳 Your Smart Home Needs Vibration Sensors — 7 Ways to Change How iOS 18 Looks

Wednesday, September 18, 2024

Also: Should You Use AI Photo Editors? How-To Geek Logo September 18, 2024 Did You Know The safety lever on a hand grenade, the lever the soldier holds down after removing the pin, but before throwing

JSK Daily for Sep 18, 2024

Wednesday, September 18, 2024

JSK Daily for Sep 18, 2024 View this email in your browser A community curated daily e-mail of JavaScript news Top 8 React Libraries for Building Beautiful and Functional UIs This article will look at

Daily Coding Problem: Problem #1560 [Medium]

Wednesday, September 18, 2024

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Google. Given a set of closed intervals, find the smallest set of numbers that covers

Nature is Healing

Wednesday, September 18, 2024

Over-Optimized Apple, John Wick AI, Snap's New Reality Nature is Healing Over-Optimized Apple, John Wick AI, Snap's New Reality By MG Siegler • 18 Sept 2024 View in browser View in browser

We tested every iPhone 16 model - buy this one

Wednesday, September 18, 2024

What I love about Pixel 9 Pro; October Prime Day; Best fitness rings -- ZDNET ZDNET Tech Today - US September 18, 2024 placeholder We've used every iPhone 16 model and here's our best buying

Charted | Visualizing S&P 500 Returns After Interest Rate Cuts 📈

Wednesday, September 18, 2024

In the past 50 years, S&P 500 returns following interest rate cuts have varied widely, from +36.5% to -36% a year later. View Online | Subscribe | Download Our App Presented by: The economy is

Top Tech Deals 👀 Garmin Smartwatch, $20 Fire TV Stick, Power Banks, and More!

Wednesday, September 18, 2024

Get a discounted mechanical RGB keyboard, Sony FE lens, portable chargers, and other must-haves. How-To Geek Logo September 18, 2024 Top Tech Deals: Garmin Smartwatch, $20 Fire TV Stick, Power Banks,

⚙️ Intel is trying to make a comeback

Wednesday, September 18, 2024

Plus: Microsoft is launching new AI centers in the Middle East ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

Whiskey: The Tangible Asset for Your Portfolio

Wednesday, September 18, 2024

Most people fail to diversify their investments. They invest all their money in intangible assets like stocks, bonds, and crypto. The solution - fine whiskey. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏