ALERT: New Polymorphic Attack Clones Browser Extensions to Steal Credentials

THN Daily Updates
Newsletter
cover

⚡ LIVE WEBINAR ➟ ASPM: The Future of AppSec -- Boom or Bust?

Discover How ASPM is Redefining Application Security with Smarter, Unified Solutions.

Download Now Sponsored
LATEST NEWS Mar 11, 2025

Steganography Explained: How XWorm Hides Inside Images

Inside the most innocent-looking image, a breathtaking landscape, or a funny meme, something dangerous could be hiding, waiting for its moment to strike. No strange file names. No antivirus warnings. Just a harmless pic...

Read More
Twitter Facebook LinkedIn

SideWinder APT Targets Maritime, Nuclear, and IT Sectors Across Asia, Middle East, and Africa

Maritime and logistics companies in South and Southeast Asia, the Middle East, and Africa have become the target of an advanced persistent threat (APT) group dubbed SideWinder. The attacks, observed by Kaspersky in 2024...

Read More
Twitter Facebook LinkedIn

Secure the Future with a Georgetown Master's

Register for March 26 webinar on our programs in cybersecurity risk management.

Read More
Twitter Facebook LinkedIn

Moxa Issues Fix for Critical Authentication Bypass Vulnerability in PT Switches

Taiwanese company Moxa has released a security update to address a critical security flaw impacting its PT switches that could permit an attacker to bypass authentication guarantees. The vulnerability, tracked as CVE-2...

Read More
Twitter Facebook LinkedIn

CTM360 Uncovers a Large-Scale Fake Play Store Scam Targeting Global Users: PlayPraetor Trojan

CTM360 detects 6,000+ fake Google Play pages spreading PlayPraetor malware, stealing banking credentials and MFA codes for financial fraud

Read More
Twitter Facebook LinkedIn

CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV List

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws impacting Advantive VeraCore and Ivanti Endpoint Manager (EPM) to its Known Exploited Vulnerabilities (KEV) catalog, b...

Read More
Twitter Facebook LinkedIn

Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials

Cybersecurity researchers have demonstrated a novel technique that allows a malicious web browser extension to impersonate any installed add-on. "The polymorphic extensions create a pixel perfect replica of the target's...

Read More
Twitter Facebook LinkedIn

Desert Dexter Targets 900 Victims Using Facebook Ads and Telegram Malware Links

The Middle East and North Africa have become the target of a new campaign that delivers a modified version of a known malware called AsyncRAT since September 2024. "The campaign, which leverages social media to distribu...

Read More
Twitter Facebook LinkedIn
cover

⚡ LIVE WEBINAR ➟ ASPM: The Future of AppSec -- Boom or Bust?

Discover How ASPM is Redefining Application Security with Smarter, Unified Solutions.

Download Now Sponsored

This email was sent to sikubaycom.s3cr3tz@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from THN. To manage your email newsletter preferences, please click here.

Contact THN: info@thehackernews.com
Unsubscribe

THN | 2nd Floor, 219, K.P BLock, Pitampura, Delhi