The Hacker News

Newsletter Image

Messages

7/11/2024
12 : 54

[Critical] PHP Vulnerability Exploited to Spread Malware and Launch DDoS Attacks

THN Daily Updates Newsletter cover AI for Absolute Beginners ($9.99 Value) FREE for a Limited Time The course begins with an engaging introduction to the world of Artificial Intelligence, making it
7/11/2024
6 : 24

Cutting-Edge Cyber Protection for Modern Day Threats

Identity Zero Trust Framework Traditional cyber solutions have served us well, but the landscape of cyber threats is changing rapidly. Content Disarm & Reconstruction is designed to tackle these
7/11/2024
6 : 24

Alert - New OpenSSH Vulnerability Discovered: Potential Remote Code Execution Risk

THN Daily Updates Newsletter cover Cloud Identity Patterns and Strategies ($28.99 Value) FREE for a Limited Time Identity is paramount for every architecture design, making it crucial for enterprise
7/9/2024
13 : 14

Cybersecurity Agencies Warn of China-linked APT40's Rapid Exploit Adaptation

THN Daily Updates Newsletter cover [Watch LIVE] Keys to Your Kingdom: Why Compromised Credentials Are the #1 Attack Vector in 2024 From Data Breaches to Identity Theft: The Ripple Effects of
7/8/2024
12 : 24

Apple Removes VPN Apps from Russian App Store Amid Government Pressure

THN Daily Updates Newsletter cover Cloud Identity Patterns and Strategies ($28.99 Value) FREE for a Limited Time Identity is paramount for every architecture design, making it crucial for enterprise
7/6/2024
12 : 44

OVHcloud Hit with Record 840 Million PPS DDoS Attack Using MikroTik Routers

THN Daily Updates Newsletter cover Cloud Identity Patterns and Strategies ($28.99 Value) FREE for a Limited Time Identity is paramount for every architecture design, making it crucial for enterprise
7/5/2024
12 : 34

Polyfill[.]io Attack Impacts Over 380,000 Hosts, Including Major Companies

THN Daily Updates Newsletter cover [Watch LIVE] Keys to Your Kingdom: Why Compromised Credentials Are the #1 Attack Vector in 2024 From Data Breaches to Identity Theft: The Ripple Effects of
7/4/2024
13 : 4

Twilio's Authy App Breach Exposes Millions of Phone Numbers

THN Daily Updates Newsletter cover Cloud Identity Patterns and Strategies ($28.99 Value) FREE for a Limited Time Identity is paramount for every architecture design, making it crucial for enterprise
7/3/2024
12 : 44

FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks

THN Daily Updates Newsletter cover Artificial Intelligence Programming with Python: From Zero to Hero ($24.00 Value) FREE for a Limited Time A hands-on roadmap to using Python for artificial
7/2/2024
12 : 54

Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware

THN Daily Updates Newsletter cover [Watch LIVE] The AI Revolution in Vulnerability Management: 2025 Trends for Security Leaders Transform Your Team: Learn How Security Champions Turn Developers into
7/2/2024
12 : 24

A Comprehensive Guide to DORA Readiness for Financial Services

Identity Zero Trust Framework A down-to-earth, honest exploration of how to meet the compliance regulations of the EU's Digital Operational Resilience Act (DORA). If you are doing business in the
7/1/2024
12 : 34

New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems

THN Daily Updates Newsletter cover Mastering Linux Administration - Second Edition ($39.99 Value) FREE for a Limited Time Harness the power of Linux in modern data center management, leveraging its
6/29/2024
12 : 44

Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data

THN Daily Updates Newsletter cover Mastering Linux Administration - Second Edition ($39.99 Value) FREE for a Limited Time Harness the power of Linux in modern data center management, leveraging its
6/28/2024
12 : 44

Warning: TeamViewer Detects Security Breach in Corporate IT Environment

THN Daily Updates Newsletter cover Multi-Cloud Handbook for Developers ($39.99 Value) FREE for a Limited Time Unleash the power of cloud computing with Multi-Cloud Handbook for Developers, your guide
6/27/2024
12 : 54

Exploit Attempts Recorded Against New MOVEit Transfer Vulnerability - Patch ASAP!

THN Daily Updates Newsletter cover [Watch LIVE] Turn Developers into Allies: The Power of Security Champion Programs Transform Your Team: Learn How Security Champions Turn Developers into Security
6/26/2024
12 : 44

Apple Issues Patches for AirPods Bluetooth Vulnerability That Could Allow Eavesdropping

THN Daily Updates Newsletter cover [Watch LIVE] Keys to Your Kingdom: Why Compromised Credentials Are the #1 Attack Vector in 2024 From Data Breaches to Identity Theft: The Ripple Effects of
6/25/2024
12 : 34

4 FIN9-linked Vietnamese Hackers Indicted in $71M U.S. Cybercrime Spree

THN Daily Updates Newsletter cover Mastering Linux Administration - Second Edition ($39.99 Value) FREE for a Limited Time Harness the power of Linux in modern data center management, leveraging its
6/25/2024
11 : 54

Register to Lead The Way to Actionable Exposure Management

Invitation to Webinar Hosting Gartner VP analyst Pete Shoard ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌
6/24/2024
12 : 14

Multiple Threat Actors Deploying Open-Source Rafel RAT to Target Android Devices

THN Daily Updates Newsletter cover Cybersecurity Architect's Handbook ($47.99 Value) FREE for a Limited Time Stepping into the role of a Cybersecurity Architect (CSA) is no mean feat, as it
6/22/2024
12 : 24

U.S. Treasury Sanctions 12 Kaspersky Executives Amid Software Ban

THN Daily Updates Newsletter cover Cybersecurity Architect's Handbook ($47.99 Value) FREE for a Limited Time Stepping into the role of a Cybersecurity Architect (CSA) is no mean feat, as it