Largest-Ever DDoS Attack Just Occurred—3.8 Tbps in Just 65 Seconds!

THN Daily Updates
Newsletter
cover

Mastering PowerShell Scripting, Fifth Edition ($35.99 Value) FREE for a Limited Time

Automate repetitive tasks and simplify complex administrative tasks using PowerShell

Download Now Sponsored
LATEST NEWS Oct 4, 2024

How to Get Going with CTEM When You Don't Know Where to Start

Continuous Threat Exposure Management (CTEM) is a strategic framework that helps organizations continuously assess and manage cyber risk. It breaks down the complex task of managing security threats into five distinct s...

Read More
Twitter Facebook LinkedIn

Cloudflare Thwarts Largest-Ever 3.8 Tbps DDoS Attack Targeting Global Sectors

Cloudflare has disclosed that it mitigated a record-breaking distributed denial-of-service (DDoS) attack that peaked at 3.8 terabits per second (Tbps) and lasted 65 seconds. The web infrastructure and security company s...

Read More
Twitter Facebook LinkedIn

Last chance to be part of Snyk's DevSeccon 2024 Oct 8-9!

Don't miss out on your chance to register for DevSecCon 2024! From the exciting lineup of 20+ sessions, here's one that you can't skip: Ali Diamond, from Hak5: "I'm A Software Engineer, and I Have to Make Bad Security Decisions—why?" Save your spot!

Read More
Twitter Facebook LinkedIn

WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks

A new high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could enable malicious actors to execute arbitrary JavaScript code under certain conditions. The flaw, tracked as CVE...

Read More
Twitter Facebook LinkedIn

Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks

Google has revealed the various security guardrails that have been incorporated into its latest Pixel devices to counter the rising threat posed by baseband security attacks. The cellular baseband (i.e., modem) refers t...

Read More
Twitter Facebook LinkedIn

The Secret Weakness Execs Are Overlooking: Non-Human Identities

For years, securing a company’s systems was synonymous with securing its “perimeter.” There was what was safe “inside” and the unsafe outside world. We built sturdy firewalls and deployed sophisticated detection systems...

Read More
Twitter Facebook LinkedIn

New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking

Misconfigured and vulnerable Linux servers are the target of an ongoing campaign that delivers a stealthy malware dubbed perfctl with the primary aim of running a cryptocurrency miner and proxyjacking software. "Perfctl...

Read More
Twitter Facebook LinkedIn

North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks

Threat actors with ties to North Korea have been observed delivering a previously undocumented backdoor and remote access trojan (RAT) called VeilShell as part of a campaign targeting Cambodia and likely other Southeast...

Read More
Twitter Facebook LinkedIn
cover

Mastering PowerShell Scripting, Fifth Edition ($35.99 Value) FREE for a Limited Time

Automate repetitive tasks and simplify complex administrative tasks using PowerShell

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | 2nd Floor, 219, K.P BLock, Pitampura, Delhi

Older messages

LockBit Ransomware and Evil Corp Members Arrested and Sanctioned in Joint Global Effort

Thursday, October 3, 2024

THN Daily Updates Newsletter cover Kubernetes Anti-Patterns ($39.99 Value) FREE for a Limited Time As the popularity of Kubernetes continues to grow, it's essential to understand and navigate the

eBook: Overcoming the Security Blind Spots of Service Accounts

Wednesday, October 2, 2024

Discover how to secure overlooked service accounts that pose hidden cybersecurity risks ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

Researchers Warn of Ongoing Attacks Exploiting Critical Zimbra Postjournal Flaw

Wednesday, October 2, 2024

THN Daily Updates Newsletter cover [Watch LIVE] Modernization of Authentication: Passwords vs Passwordless and MFA Discover the Future of Cybersecurity: Understand the Role of MFA and Passwords in a

Beware- Hackers Exploit Docker API to Launch Malicious Cryptojacking Botnet!

Tuesday, October 1, 2024

THN Daily Updates Newsletter cover [Watch LIVE] Building a Successful Data Security Posture Management Program Learn From the Leaders: Early DSPM Adopters Reveal Their Data Security Success Secrets

THN Cybersecurity Recap: Last Week's Top Threats and Trends (September 23-29)

Monday, September 30, 2024

Catch up on last week's top cybersecurity stories. ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

You Might Also Like

Ranked | The Worst Cities for Rush Hour Traffic 🚗

Saturday, October 5, 2024

We look at the worst cities for rush hour traffic, both globally and in the US specifically. View Online | Subscribe | Download Our App Presented by Voronoi: The App Where Data Tells the Story FEATURED

⚙️ Special Edition: Eric Xing and the Age of AI Empowerment

Saturday, October 5, 2024

We met up with Dr. Eric Xing to talk about the realities of AI. ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

🐍 New Python tutorials on Real Python

Saturday, October 5, 2024

Hey there, There's always something going on over at Real Python as far as Python tutorials go. Here's what you may have missed this past week: Python 3.13: Cool New Features for You to Try In

Hooked On Clarendon 💡

Saturday, October 5, 2024

The very common font that kicked off a redesign. Here's a version for your browser. Hunting for the end of the long tail • October 05, 2024 Hooked On Clarendon I saw a font recently, and it

Largest-Ever DDoS Attack Just Occurred—3.8 Tbps in Just 65 Seconds!

Saturday, October 5, 2024

THN Daily Updates Newsletter cover Mastering Spring Boot 3.0 ($31.99 Value) FREE for a Limited Time A comprehensive guide to building scalable and efficient backend systems with Java and Spring

Re: No more spam!

Saturday, October 5, 2024

If you are tired of getting spam texts and phone calls, I have a new discovery that you need to read about. It's a service called Incogni, and I'd recommend it to any iPhone Life reader

📧 Implementing the Outbox Pattern

Saturday, October 5, 2024

​ Implementing the Outbox Pattern Read on: m​y website / Read time: 8 minutes The .NET Weekly is brought to you by: Visually Building API-Driven Applications with Postman Flows ​ Explore how Postman

JSK Daily for Oct 4, 2024

Friday, October 4, 2024

JSK Daily for Oct 4, 2024 View this email in your browser A community curated daily e-mail of JavaScript news Understanding CommonJS vs. ES Modules in JavaScript JavaScript has undergone significant

🕹️ 10 Tips for When PSN Isn't Working — Should You Buy Office 2024?

Friday, October 4, 2024

Also: What to Know About eSims, and More! How-To Geek Logo October 4, 2024 Did You Know It's true, in space no one can hear you scream; sound travels via the vibration of atoms (such as the atoms

iOS Dev Weekly - Issue 681

Friday, October 4, 2024

Back to our regular scheduled programming this week! ⌚ View on the Web Archives ISSUE 681 October 4th 2024 Comment Last week's downtime on Curated set me thinking about this newsletter and about