PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers

THN Daily Updates
Newsletter
cover

Deep Learning For Dummies ($21.00 Value) FREE for a Limited Time

Take a deep dive into deep learning

Download Now Sponsored
LATEST NEWS Jan 21, 2025

Ex-CIA Analyst Pleads Guilty to Sharing Top-Secret Data with Unauthorized Parties

A former analyst working for the U.S. Central Intelligence Agency (CIA) pleaded guilty to transmitting top secret National Defense Information (NDI) to individuals who did not have the necessary authorization to receiv...

Read More
Twitter Facebook LinkedIn

HackGATE: Setting New Standards for Visibility and Control in Penetration Testing Projects

Imagine receiving a penetration test report that leaves you with more questions than answers. Questions like, "Were all functionalities of the web app tested?" or " Were there any security issues that could have been id...

Read More
Twitter Facebook LinkedIn

Prepare for Tomorrow's Cyberattack, Today

Earn a Master's in Cybersecurity Risk Management from Georgetown. Attend our Feb. 6 webinar.

Read More
Twitter Facebook LinkedIn

PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers

Cybersecurity researchers are calling attention to a series of cyber attacks that have targeted Chinese-speaking regions like Hong Kong, Taiwan, and Mainland China with a known malware called ValleyRAT. The attacks leve...

Read More
Twitter Facebook LinkedIn

CERT-UA Warns of Cyber Scams Using Fake AnyDesk Requests for Fraudulent Security Audits

The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of ongoing attempts by unknown threat actors to impersonate the cybersecurity agency by sending AnyDesk connection requests. The AnyDesk requests cla...

Read More
Twitter Facebook LinkedIn

Download the Network Penetration Testing Buyer's Guide

This guide provides a comprehensive understanding of what it is, what to look out for, and ultimately help you become an informed buyer.

Read More
Twitter Facebook LinkedIn

Unsecured Tunneling Protocols Expose 4.2 Million Hosts, Including VPNs and Routers

New research has uncovered security vulnerabilities in multiple tunneling protocols that could allow attackers to perform a wide range of attacks. "Internet hosts that accept tunneling packets without verifying the sen...

Read More
Twitter Facebook LinkedIn

DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection

The Threat actor known as DoNot Team has been linked to a new Android malware as part of highly targeted cyber attacks. The artifacts in question, named Tanzeem (meaning "organization" in Urdu) and Tanzeem Update, were ...

Read More
Twitter Facebook LinkedIn
cover

Deep Learning For Dummies ($21.00 Value) FREE for a Limited Time

Take a deep dive into deep learning

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | 2nd Floor, 219, K.P BLock, Pitampura, Delhi