ALERT: Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication

THN Daily Updates
Newsletter
cover

⚡ LIVE WEBINAR ➟ How to Eliminate Identity-Based Threats

From Phishing to Device Risks: Learn to Remove Entire Threat Classes Effortlessly

Download Now Sponsored
LATEST NEWS Mar 25, 2025

AI-Powered SaaS Security: Keeping Pace with an Expanding Attack Surface

Organizations now use an average of 112 SaaS applications—a number that keeps growing. In a 2024 study, 49% of 644 respondents who frequently used Microsoft 365 believed that they had less than 10 apps connected to the ...

Read More
Twitter Facebook LinkedIn

Hackers Use .NET MAUI to Target Indian and Chinese Users with Fake Banking, Social Apps

Cybersecurity researchers are calling attention to an Android malware campaign that leverages Microsoft's .NET Multi-platform App UI (.NET MAUI) framework to create bogus banking and social media apps targeting Indian a...

Read More
Twitter Facebook LinkedIn

Top Priorities & Challenges for Security Teams: Overcoming Workloads, AI Barriers & Tool Gaps

Get the full IDC Voice of Security 2025 white paper, sponsored by Tines and AWS, for a deep dive into what's holding security teams back – from growing workloads and AI adoption barriers, to inadequate tool stacks and flawed performance metrics.

Read More
Twitter Facebook LinkedIn

INTERPOL Arrests 306 Suspects, Seizes 1,842 Devices in Cross-Border Cybercrime Bust

Law enforcement authorities in seven African countries have arrested 306 suspects and confiscated 1,842 devices as part of an international operation codenamed Red Card that took place between November 2024 and February...

Read More
Twitter Facebook LinkedIn

Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication

A set of five critical security shortcomings have been disclosed in the Ingress NGINX Controller for Kubernetes that could result in unauthenticated remote code execution, putting over 6,500 clusters at immediate risk b...

Read More
Twitter Facebook LinkedIn

The Surprising Gap in DDoS Protections: How Attackers Continue to Exploit DDoS Vulnerabilities

25M+ DDoS attacks in 2024 expose vulnerable protections; flawed policies force costly manual interventions.

Read More
Twitter Facebook LinkedIn

Microsoft Adds Inline Data Protection to Edge for Business to Block GenAI Data Leaks

Microsoft on Monday announced a new feature called inline data protection for its enterprise-focused Edge for Business web browser. The native data security control is designed to prevent employees from sharing sensit...

Read More
Twitter Facebook LinkedIn

VanHelsing RaaS Launch: 3 Victims, $5K Entry Fee, Multi-OS, and Double Extortion Tactics

A ransomware-as-a-service (RaaS) operation called VanHelsing has already claimed three victims since it launched on March 7, 2025, demanding ransoms as high as $500,000. "The RaaS model allows a wide range of participa...

Read More
Twitter Facebook LinkedIn
cover

⚡ LIVE WEBINAR ➟ How to Eliminate Identity-Based Threats

From Phishing to Device Risks: Learn to Remove Entire Threat Classes Effortlessly

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | 2nd Floor, 219, K.P BLock, Pitampura, Delhi