FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices

THN Daily Updates
Newsletter
cover

JavaScript: Mastering JavaScript from Basics to Advanced Topics ($54.99 Value) FREE for a Limited Time

This book provides a comprehensive introduction to JavaScript and web development, starting with the basics of programming and progressing through advanced topics.

Download Now Sponsored
LATEST NEWS Jan 6, 2025

From $22M in Ransom to +100M Stolen Records: 2025's All-Star SaaS Threat Actors to Watch

In 2024, cyber threats targeting SaaS surged, with 7,000 password attacks blocked per second (just in Entra ID)—a 75% increase from last year—and phishing attempts up by 58%, causing $3.5 billion in losses (source: Micr...

Read More
Twitter Facebook LinkedIn

FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices

An Android information stealing malware named FireScam has been found masquerading as a premium version of the Telegram messaging app to steal data and maintain persistent remote control over compromised devices. "Disgu...

Read More
Twitter Facebook LinkedIn

Help Shape the Future of Tech! Join the Developer Nation Panel Today

As a member, you'll share insights on tools, trends, and the developer ecosystem with a global community. Earn exciting rewards like gadgets, Bitcoin, vouchers, and more for your contributions. Help shape the world of developers and the products you use—your voice matters! Click here to join.

Read More
Twitter Facebook LinkedIn

Cybercriminals Target Ethereum Developers with Fake Hardhat npm Packages

Cybersecurity researchers have revealed several malicious packages on the npm registry that have been found impersonating the Nomic Foundation's Hardhat tool in order to steal sensitive data from developer systems. "By...

Read More
Twitter Facebook LinkedIn

Researchers Uncover Nuclei Vulnerability Enabling Signature Bypass and Code Execution

A high-severity security flaw has been disclosed in ProjectDiscovery's Nuclei, a widely-used open-source vulnerability scanner that, if successfully exploited, could allow attackers to bypass signature checks and potent...

Read More
Twitter Facebook LinkedIn

PLAYFULGHOST Delivered via Phishing and SEO Poisoning in Trojanized VPN Apps

Cybersecurity researchers have flagged a new malware called PLAYFULGHOST that comes with a wide range of information-gathering features like keylogging, screen capture, audio capture, remote shell, and file transfer/exe...

Read More
Twitter Facebook LinkedIn

U.S. Sanctions Chinese Cybersecurity Firm for State-Backed Hacking Campaigns

The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) on Friday issued sanctions against a Beijing-based cybersecurity company known as Integrity Technology Group, Incorporated for orchestrating several...

Read More
Twitter Facebook LinkedIn

New AI Jailbreak Method 'Bad Likert Judge' Boosts Attack Success Rates by Over 60%

Cybersecurity researchers have shed light on a new jailbreak technique that could be used to get past a large language model's (LLM) safety guardrails and produce potentially harmful or malicious responses. The multi-tu...

Read More
Twitter Facebook LinkedIn
cover

JavaScript: Mastering JavaScript from Basics to Advanced Topics ($54.99 Value) FREE for a Limited Time

This book provides a comprehensive introduction to JavaScript and web development, starting with the basics of programming and progressing through advanced topics.

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | 2nd Floor, 219, K.P BLock, Pitampura, Delhi