Malware Attackers Using MacroPack to Deliver Havoc, Brute Ratel, and PhantomCore

THN Daily Updates
Newsletter
cover

2024 LevelBlue Futures™ Report: Cyber Resilience

Computing has changed so fast that most IT leaders no longer have real visibility into their IT estate. Both proprietary and open sources of software are combined with legacy solutions, cloud computing, and digital transformation.

Download Now Sponsored
LATEST NEWS Sep 5, 2024

U.S. Seizes 32 Pro-Russian Propaganda Domains in Major Disinformation Crackdown

The U.S. Department of Justice (DoJ) on Wednesday announced the seizure of 32 internet domains used by a pro-Russian propaganda operation called Doppelganger as part of a sweeping set of actions. ...

Read More
Twitter Facebook LinkedIn

NIST Cybersecurity Framework (CSF) and CTEM – Better Together

It’s been a decade since the National Institute of Standards and Technology (NIST) introduced its Cybersecurity Framework (CSF) 1.0. Created following a 2013 Executive Order, NIST was tasked with ...

Read More
Twitter Facebook LinkedIn

Simplify Your Use of CIS Security Best Practices)

Looking to streamline your implementation of the CIS Critical Security Controls® and CIS Benchmarks™? A CIS SecureSuite® Membership has what you need to help you save time and money when enacting these security best ...

Read More
Twitter Facebook LinkedIn

Malware Attackers Using MacroPack to Deliver Havoc, Brute Ratel, and PhantomCore

Threat actors are likely employing a tool designated for red teaming exercises to serve malware, according to new findings from Cisco Talos. The program in question is a payload generation ...

Read More
Twitter Facebook LinkedIn

New Cross-Platform Malware KTLVdoor Discovered in Attack on Chinese Trading Firm

The Chinese-speaking threat actor known as Earth Lusca has been observed using a new backdoor dubbed KTLVdoor as part of a cyber attack targeting an unnamed trading company based in China. The ...

Read More
Twitter Facebook LinkedIn

Cisco Fixes Two Critical Flaws in Smart Licensing Utility to Prevent Remote Attacks

Cisco has released security updates for two critical security flaws impacting its Smart Licensing Utility that could allow unauthenticated, remote attackers to elevate their privileges or access ...

Read More
Twitter Facebook LinkedIn

North Korean Hackers Targets Job Seekers with Fake FreeConference App

North Korean threat actors have leveraged a fake Windows video conferencing application impersonating FreeConference.com to backdoor developer systems as part of an ongoing financially-driven ...

Read More
Twitter Facebook LinkedIn

Android Users Urged to Install Latest Security Updates to Fix Actively Exploited Flaw

Google has released its monthly security updates for the Android operating system to address a known security flaw that it said has come under active exploitation in the wild. The high-severity ...

Read More
Twitter Facebook LinkedIn
cover

2024 LevelBlue Futures™ Report: Cyber Resilience

Computing has changed so fast that most IT leaders no longer have real visibility into their IT estate. Both proprietary and open sources of software are combined with legacy solutions, cloud computing, and digital transformation.

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | 2nd Floor, 219, K.P BLock, Pitampura, Delhi

Older messages

Hackers Use Fake GlobalProtect VPN Software in New WikiLoader Malware Attack

Wednesday, September 4, 2024

THN Daily Updates Newsletter cover 2024 LevelBlue Futures™ Report: Cyber Resilience Computing has changed so fast that most IT leaders no longer have real visibility into their IT estate. Both

eBook: Eliminating the Lateral Movement Blind Spot with ITDR

Wednesday, September 4, 2024

Eliminate the Lateral Movement Blind Spot with ITDR ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access

Tuesday, September 3, 2024

THN Daily Updates Newsletter cover Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time This desk reference handbook gives a hands-on experience on various algorithms and

Malicious npm Packages Mimicking 'noblox.js' Compromise Roblox Developers' Systems

Monday, September 2, 2024

THN Daily Updates Newsletter cover Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time This desk reference handbook gives a hands-on experience on various algorithms and

Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign

Saturday, August 31, 2024

THN Daily Updates Newsletter cover Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time This desk reference handbook gives a hands-on experience on various algorithms and

You Might Also Like

The Sequence Opinion #465: Agentic AI and Darwinism

Thursday, January 9, 2025

Some ideas about Open-Endedness AI. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

ALERT: Ivanti Flaw CVE-2025-0282 Actively Exploited, Impacts Connect Secure and Policy Secure

Thursday, January 9, 2025

THN Daily Updates Newsletter cover The Kubernetes Book: Navigate the world of Kubernetes with expertise , Second Edition ($39.99 Value) FREE for a Limited Time Containers transformed how we package and

500 weeks later

Thursday, January 9, 2025

Reflections on a decade-long and looking ahead to 2025 ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

JSK Daily for Jan 8, 2025

Wednesday, January 8, 2025

JSK Daily for Jan 8, 2025 View this email in your browser A community curated daily e-mail of JavaScript news Advanced Query Building Techniques in Angular: Queries with Different Connectors The Query

👍 The Coolest Tech at CES 2025 — How to Access Your Mac's Screen from Windows

Wednesday, January 8, 2025

Also: These Are My Best and Worst Smart Home Decisions, and More! How-To Geek Logo January 8, 2025 Did You Know The one and only number retired across all teams in Major League Baseball is 42, Jackie

Daily Coding Problem: Problem #1662 [Hard]

Wednesday, January 8, 2025

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Google. Implement an LFU (Least Frequently Used) cache. It should be able to be

The latest Go dev survey results

Wednesday, January 8, 2025

Plus it's time to say goodbye to the Go Time podcast. | #​537 — January 8, 2025 Unsub | Web Version Happy New Year to all. In case you missed our note prior to the Christmas break, Go Weekly is now

Ranked | Visualizing Major Asset Class Returns in 2024 📈

Wednesday, January 8, 2025

From bitcoin to the US dollar, asset class returns in 2024 were stellar, in a year marked by elevated rates and a robust US economy. View Online | Subscribe | Download Our App FEATURED STORY

Spyglass Dispatch: Meta Miscues

Wednesday, January 8, 2025

Meta's Social AI Content • Anthropic at $60B • Bluesky at $700M • Dick Wolf's 30 Minute Show • NVIDIA's CPU Aspirations The Spyglass Dispatch is a newsletter sent on weekdays featuring

Top Tech Deals 💰 Anker Power Station, GoPro, 8BitDo Controller, and More!

Wednesday, January 8, 2025

Upgrade your life with a new power station, Wi-Fi 7 router, or AirTags at a big discount. How-To Geek Logo January 8, 2025 Top Tech Deals: Anker Power Station, GoPro Hero, 8BitDo Controller, and More!