Microsoft Warns of 'Ice Phishing' Threat on Web3 and Decentralized Networks

The Hacker News Daily Updates
Newsletter
cover

Infosec Strategies and Best Practices ($27.99 Value) FREE for a Limited Time

Information security and risk management best practices enable professionals to plan, implement, measure, and test their organization's systems and ensure that they're adequately protected against threats.

Download Now Sponsored
LATEST NEWS Feb 18, 2022

Microsoft Warns of 'Ice Phishing' Threat on Web3 and Decentralized Networks

Microsoft has warned of emerging threats in the Web3 landscape, including "ice phishing" campaigns, as a surge in adoption of blockchain and DeFi technologies emphasizes the need to build security into the decentralized web while it's still in its early stages. The company's Microsoft 365 Defender ...

Read More
Twitter Facebook LinkedIn

PseudoManuscrypt Malware Spreading the Same Way as CryptBot Targets Koreans

Numerous Windows machines located in South Korea have been targeted by a botnet tracked as PseudoManuscrypt since at least May 2021 by employing the same delivery tactics of another malware called CryptBot. "PseudoManuscrypt is disguised as an installer that is similar to a form of CryptBot, and ...

Read More
Twitter Facebook LinkedIn

New Linux Privilege Escalation Flaw Uncovered in Snap Package Manager

Multiple security vulnerabilities have been disclosed in Canonical's Snap software packaging and deployment system, the most critical of which can be exploited to escalate privilege to gain root privileges. Snaps are self-contained application packages that are designed to work on operating ...

Read More
Twitter Facebook LinkedIn

Iranian Hackers Targeting VMware Horizon Log4j Flaws to Deploy Ransomware

A "potentially destructive actor" aligned with the government of Iran is actively exploiting the well-known Log4j vulnerability to infect unpatched VMware Horizon servers with ransomware. Cybersecurity firm SentinelOne dubbed the group "TunnelVision" owing to their heavy reliance on tunneling ...

Read More
Twitter Facebook LinkedIn

4 Cloud Data Security Best Practices All Businesses Should Follow Today

These days, businesses all around the world have come to depend on cloud platforms for a variety of mission-critical workflows. They keep their CRM data in the cloud. They process their payrolls in the cloud. They even manage their HR processes through the cloud. And all of that means they're ...

Read More
Twitter Facebook LinkedIn
cover

Infosec Strategies and Best Practices ($27.99 Value) FREE for a Limited Time

Information security and risk management best practices enable professionals to plan, implement, measure, and test their organization's systems and ensure that they're adequately protected against threats.

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

Older messages

Google Bringing Privacy Sandbox to Android to Limit Sharing of User Data

Thursday, February 17, 2022

The Hacker News Daily Updates Newsletter cover Threat Detection & Response: 25 Critical Questions You Need to be Able to Answer MDR, EDR, NDR, XDR...there are a lot of ways to detect and respond to

Infosec Strategies and Best Practices ($27.99 Value) FREE for a Limited Time

Wednesday, February 16, 2022

The Hacker News eBook Update Newsletter Infosec Strategies and Best Practices ($27.99 Value) FREE for a Limited Time Download For Free Information security and risk management best practices enable

Researchers Link ShadowPad Malware Attacks to Chinese Ministry and PLA

Tuesday, February 15, 2022

The Hacker News Daily Updates Newsletter cover The Deep and Dark Web Guide Stay safe on the hidden web. Download Now Sponsored LATEST NEWS Feb 15, 2022 Researchers Link ShadowPad Malware Attacks to

Spanish Police Arrest SIM Swappers Who Stole Money from Victims Bank Accounts

Monday, February 14, 2022

The Hacker News Daily Updates Newsletter cover Migrate 100% of your data platform to the cloud successfully Seamlessly migrate your data platform to the cloud and see tangible business outcomes within

France Rules That Using Google Analytics Violates GDPR Data Protection Law

Friday, February 11, 2022

The Hacker News Daily Updates Newsletter cover Mitigating Cloud Security Risks in AWS: A Checklist for 2022 Join us on February 17, 2022 at 11:00 AM ET to learn how to reduce misconfigurations in your

You Might Also Like

You’re invited: See how Cypris scaled AI search

Thursday, March 20, 2025

Join our virtual event to learn how Cypris built a scalable AI research platform with Elastic.ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ

JSK Daily for Mar 19, 2025

Wednesday, March 19, 2025

JSK Daily for Mar 19, 2025 View this email in your browser A community curated daily e-mail of JavaScript news Hope AI By Bit. - Developer teams build with AI and composable software. ✅ Build full-

Forget TypeScript, how about porting Doom to Go?

Wednesday, March 19, 2025

Plus should Go have tuples? | #​546 — March 19, 2025 Unsub | Web Version Together with Frontend Masters logo Go Weekly Traversal-Resistant File APIs — Among the lesser known new features in recent

Daily Coding Problem: Problem #1722 [Medium]

Wednesday, March 19, 2025

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Dropbox. Create an algorithm to efficiently compute the approximate median of a list of

Ranked | The World's Fastest Growing Economies in 2025 📊

Wednesday, March 19, 2025

The fastest growing economies of 2025 are primarily located in Africa and Asia, according to the latest IMF forecasts. View Online | Subscribe | Download Our App Presented by: Defiance ETFs FEATURED

Web Almanac: JS; syntactic quirks; Parcel v2.14.0; Bun v1.2.5; Node.js on Discord; Node v20.19.0

Wednesday, March 19, 2025

We have 9 links for you - the latest on JavaScript and tools The easiest security tool you will ever install. socket.dev Sponsor Socket's developer-first platform detects and blocks malicious

Microservices rules #7: Design loosely design-time coupled services - part 1

Wednesday, March 19, 2025

You are receiving this email because you subscribed to microservices.io. Considering migrating a monolith to microservices? Struggling with the microservice architecture? I can help: architecture

[Report] 69% of Attacks Bypass Defenses

Wednesday, March 19, 2025

69% of attacks go undetected. Breach and Attack Simulation pinpoints you where your defenses fail—before attackers do. ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏ ‌ ͏

11 Windows apps I always trash 🗑️

Wednesday, March 19, 2025

Forget SaaS; Change this TV setting; Amazon Spring Sale deals -- ZDNET ZDNET Tech Today - US March 19, 2025 delete key The 11 Microsoft apps I ditch on every new Windows install - and the 11 I keep A

⚙️ Nvidia's 'incredible' demand

Wednesday, March 19, 2025

Plus: The DNA of organized crime ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌