OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77

THN Daily Updates
Newsletter
cover

⚡ LIVE WEBINAR ➟ ASPM: The Future of AppSec -- Boom or Bust?

Discover How ASPM is Redefining Application Security with Smarter, Unified Solutions.

Download Now Sponsored
LATEST NEWS Mar 14, 2025

Live Ransomware Demo: See How Hackers Breach Networks and Demand a Ransom

Cyber threats evolve daily. In this live webinar, learn exactly how ransomware attacks unfold—from the initial breach to the moment hackers demand payment. Join Joseph Carson, Delinea’s Chief Security Scientist and Advi...

Read More
Twitter Facebook LinkedIn

Why Most Microsegmentation Projects Fail—And How Andelyn Biosciences Got It Right

Most microsegmentation projects fail before they even get off the ground—too complex, too slow, too disruptive. But Andelyn Biosciences proved it doesn’t have to be that way. Microsegmentation: The Missing Piece i...

Read More
Twitter Facebook LinkedIn

Fulfill Your Organization's Security Needs with CIS SecureSuite®

Want to optimize your use of security controls? CIS SecureSuite® provides tools that save you time and money when evaluating your systems' conformance to the CIS Benchmarks® and prioritizing your CIS Critical Security Controls implementation efforts. Learn more.

Read More
Twitter Facebook LinkedIn

New MassJacker Malware Targets Piracy Users, Hijacking Cryptocurrency Transactions

Users searching for pirated software are the target of a new malware campaign that delivers a previously undocumented clipper malware called MassJacker, according to findings from CyberArk. Clipper malware is a type of ...

Read More
Twitter Facebook LinkedIn

OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection

A new malware campaign has been observed leveraging social engineering tactics to deliver an open-source rootkit called r77. The activity, condemned OBSCURE#BAT by Securonix, enables threat actors to establish persisten...

Read More
Twitter Facebook LinkedIn

Microsoft Warns of ClickFix Phishing Campaign Targeting Hospitality Sector via Fake Booking[.]com Emails

Microsoft has shed light on an ongoing phishing campaign that targeted the hospitality sector by impersonating online travel agency Booking.com using an increasingly popular social engineering technique called ClickFix ...

Read More
Twitter Facebook LinkedIn

North Korea’s ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps

The North Korea-linked threat actor known as ScarCruft is said to have been behind a never-before-seen Android surveillance tool named KoSpy targeting Korean and English-speaking users. Lookout, which shared details of ...

Read More
Twitter Facebook LinkedIn

GitHub Uncovers New ruby-saml Vulnerabilities Allowing Account Takeover Attacks

Two high-severity security flaws have been disclosed in the open-source ruby-saml library that could allow malicious actors to bypass Security Assertion Markup Language (SAML) authentication protections. SAML is an XML-...

Read More
Twitter Facebook LinkedIn
cover

⚡ LIVE WEBINAR ➟ ASPM: The Future of AppSec -- Boom or Bust?

Discover How ASPM is Redefining Application Security with Smarter, Unified Solutions.

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | 2nd Floor, 219, K.P BLock, Pitampura, Delhi

Older messages

Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before Removal

Tuesday, March 18, 2025

THN Daily Updates Newsletter cover ⚡ LIVE WEBINAR ➟ AI Uncovered: Re-Shaping Security Strategies for Resilience in the Era of AI AI Is Changing the Cybersecurity Game -- Learn the Secrets to Outsmart

ALERT: GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories

Tuesday, March 18, 2025

THN Daily Updates Newsletter cover ⚡ LIVE WEBINAR ➟ Your AI is Outrunning Your Security. Here's How to Keep Up, with Reco Don't let hidden AI threats derail your success--learn how to empower

⚡ THN Weekly Recap: Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More

Tuesday, March 18, 2025

Critical router breaches, stealthy PyPI malware, powerful new ransomware decryptors—this week's top cyber threats decoded. ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏

ALERT: New Polymorphic Attack Clones Browser Extensions to Steal Credentials

Tuesday, March 11, 2025

THN Daily Updates Newsletter cover ⚡ LIVE WEBINAR ➟ ASPM: The Future of AppSec -- Boom or Bust? Discover How ASPM is Redefining Application Security with Smarter, Unified Solutions. Download Now

⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

Monday, March 10, 2025

State-sponsored hacking, IoT botnets, ransomware shifts—this week's cyber roundup covers it all. Stay informed, stay secure. Read now ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌

You Might Also Like

Report Available: The Age of Data 📈

Tuesday, March 18, 2025

Explore the world's most critical resource with Visual Capitalist's latest report. ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏

LW 174 - Interview with Shopify's Head of Engineering

Tuesday, March 18, 2025

Interview with Shopify's Head of Engineering ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ Shopify Development news and articles Issue 174

WEBINAR - Streamline Your DNS Management with DNSimple's Terraform Integration

Tuesday, March 18, 2025

Join the team at DNSimple for an exclusive webinar in collaboration with Hashicorp and DNSimple, on April 2, 2025 at 1:30 PM EST. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

Vibe coding isn't for everyone

Tuesday, March 18, 2025

5 Chromecast tips; Handy USB-C; Free iPhone 16 deal -- ZDNET ZDNET Tech Today - US March 18, 2025 colorful LED diodes close-up What is AI vibe coding? It's all the rage but it's not for

⚙️ Can Nvidia rebound?

Tuesday, March 18, 2025

Plus: China's latest bit of AI competition ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure

Tuesday, March 18, 2025

THN Daily Updates Newsletter cover ChatGPT Prompts Book - Precision Prompts, Priming, Training & AI Writing Techniques for Mortals:Crafting Precision Prompts and Exploring AI Writing with ChatGPT (

Post from Syncfusion Blogs on 03/18/2025

Tuesday, March 18, 2025

New blogs from Syncfusion ® How to Use Dual-Axis Charts for Effective Data Visualization? By Easwaran Azhagesan Learn when and how to use dual-axis charts with best practices, use cases, and

🦾 Robots That Could Save Your Life One Day — I Finally Ditched NVIDIA for AMD

Tuesday, March 18, 2025

Also: MacBook Air M4 Review: As Good as it Gets! How-To Geek Logo March 18, 2025 Did You Know Fastnet Rock is the southernmost point in Ireland. The tiny islet is scarcely large enough to hold the

The Sequence Knowledge #512: RAG vs. Fine-Tuning

Tuesday, March 18, 2025

Exploring some of the key similarities and differences between these approaches. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

📱 I Wish More Companies Made Phones This Bonkers — How to Check the Age of Your Hard Drive

Tuesday, March 18, 2025

Also: The 10 Best Apple TV+ Shows You're Missing Out On, and More! How-To Geek Logo March 12, 2025 Did You Know The weekday that falls most frequently on the 13th day of the month in the Gregorian