The Hacker News

Newsletter Image

Messages

9/10/2024
11 : 44

New RAMBO Attack Uses RAM Radio Signals to Steal Data from Air-Gapped Networks

THN Daily Updates Newsletter cover Backups: The Key to Cybersecurity How Much Cybersecurity is Enough? Recovery + Resistance = Resilience Download Now Sponsored LATEST NEWS Sep 10, 2024 Shining a Light
9/9/2024
12 : 4

New Android SpyAgent Malware Uses OCR to Steal Crypto Wallet Recovery Keys

THN Daily Updates Newsletter cover Backups: The Key to Cybersecurity How Much Cybersecurity is Enough? Recovery + Resistance = Resilience Download Now Sponsored LATEST NEWS Sep 9, 2024 Webinar: How to
9/7/2024
13 : 4

North Korean Threat Actors Deploy COVERTCATCH Malware via LinkedIn Job Scams

THN Daily Updates Newsletter cover Backups: The Key to Cybersecurity How Much Cybersecurity is Enough? Recovery + Resistance = Resilience Download Now Sponsored LATEST NEWS Sep 7, 2024 North Korean
9/6/2024
14 : 14

Pavel Durov Criticizes Outdated Laws After Arrest Over Telegram Criminal Activity

THN Daily Updates Newsletter cover 2024 LevelBlue Futures™ Report: Cyber Resilience Computing has changed so fast that most IT leaders no longer have real visibility into their IT estate. Both
9/5/2024
13 : 4

Malware Attackers Using MacroPack to Deliver Havoc, Brute Ratel, and PhantomCore

THN Daily Updates Newsletter cover 2024 LevelBlue Futures™ Report: Cyber Resilience Computing has changed so fast that most IT leaders no longer have real visibility into their IT estate. Both
9/4/2024
12 : 54

Hackers Use Fake GlobalProtect VPN Software in New WikiLoader Malware Attack

THN Daily Updates Newsletter cover 2024 LevelBlue Futures™ Report: Cyber Resilience Computing has changed so fast that most IT leaders no longer have real visibility into their IT estate. Both
9/4/2024
12 : 24

eBook: Eliminating the Lateral Movement Blind Spot with ITDR

Eliminate the Lateral Movement Blind Spot with ITDR ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌
9/3/2024
13 : 4

New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access

THN Daily Updates Newsletter cover Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time This desk reference handbook gives a hands-on experience on various algorithms and
9/2/2024
13 : 4

Malicious npm Packages Mimicking 'noblox.js' Compromise Roblox Developers' Systems

THN Daily Updates Newsletter cover Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time This desk reference handbook gives a hands-on experience on various algorithms and
8/31/2024
11 : 44

Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign

THN Daily Updates Newsletter cover Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time This desk reference handbook gives a hands-on experience on various algorithms and
8/30/2024
11 : 44

New Malware Masquerades as Palo Alto VPN Targeting Middle East Users

THN Daily Updates Newsletter cover Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time This desk reference handbook gives a hands-on experience on various algorithms and
8/29/2024
12 : 4

French Authorities Charge Telegram CEO with Facilitating Criminal Activities on Platform

THN Daily Updates Newsletter cover Cybersecurity Strategies and Best Practices ($39.99 Value) FREE for a Limited Time A comprehensive guide to mastering enterprise cyber defense tactics and techniques
8/28/2024
12 : 24

XPOSURE, The Virtual CTEM Summit on September 10th!

Join XPOSURE 2024 where you'll explore real-world use cases and best practices for implementing CTEM in your organization. ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌
8/28/2024
12 : 4

macOS Version of HZ RAT Backdoor Targets Chinese Messaging App Users

THN Daily Updates Newsletter cover Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time This desk reference handbook gives a hands-on experience on various algorithms and
8/27/2024
12 : 4

Google Warns of CVE-2024-7965 Chrome Security Flaw Under Active Exploitation

THN Daily Updates Newsletter cover Cybersecurity Strategies and Best Practices ($39.99 Value) FREE for a Limited Time A comprehensive guide to mastering enterprise cyber defense tactics and techniques
8/26/2024
12 : 4

New Android Malware NGate Steals NFC Data to Clone Contactless Payment Cards

THN Daily Updates Newsletter cover The Ultimate Kali Linux Book: Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting, Third Edition ($43.99 Value) FREE for a Limited Time
8/24/2024
12 : 4

Beware - New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data

THN Daily Updates Newsletter cover The Ultimate Kali Linux Book: Harness Nmap, Metasploit, Aircrack-ng, and Empire for cutting-edge pentesting, Third Edition ($43.99 Value) FREE for a Limited Time
8/23/2024
11 : 44

Beware - New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data

THN Daily Updates Newsletter cover Data Science Handbook: A Practical Approach ($156.00 Value) FREE for a Limited Time This desk reference handbook gives a hands-on experience on various algorithms and
8/22/2024
12 : 4

Urgent - Google Fixes High-Severity Chrome Flaw Actively Exploited in the Wild

THN Daily Updates Newsletter cover Cybersecurity Strategies and Best Practices ($39.99 Value) FREE for a Limited Time A comprehensive guide to mastering enterprise cyber defense tactics and techniques
8/21/2024
12 : 24

Join Your Infosec Peers at Audit & Beyond!

#8 - hero-min.png You're invited to this year's premier event for risk and compliance leaders, Audit & Beyond. The event will feature thought leadership from Infosec leaders across all